CN114902611A - Method and device for configuring client and communication system - Google Patents

Method and device for configuring client and communication system Download PDF

Info

Publication number
CN114902611A
CN114902611A CN202080091231.1A CN202080091231A CN114902611A CN 114902611 A CN114902611 A CN 114902611A CN 202080091231 A CN202080091231 A CN 202080091231A CN 114902611 A CN114902611 A CN 114902611A
Authority
CN
China
Prior art keywords
stack
security domain
client
target security
configuring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202080091231.1A
Other languages
Chinese (zh)
Other versions
CN114902611B (en
Inventor
茹昭
张军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN114902611A publication Critical patent/CN114902611A/en
Application granted granted Critical
Publication of CN114902611B publication Critical patent/CN114902611B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • H04W4/08User group management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Computer And Data Communications (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a method and a device for configuring a client and a communication system. The method comprises the following steps: determining a target security domain added by a client; and switching the current stack in an active state on the client based on the matching relationship between the target security domain and the mapping relationship set, wherein the mapping relationship set is used for storing the mapping relationship between the security domain and the stack. The invention solves the technical problems that the client needs to be manually configured in the process of adding the security domain in the related technology, the operation is complex and the configuration efficiency is low.

Description

Method and device for configuring client and communication system Technical Field
The present invention relates to the field of communications, and in particular, to a method and an apparatus for configuring a client, and a communication system.
Background
In the current internet of things technology architecture, after a new client APP connects to a network, a security domain existing in the network can be acquired, and a process of the client APP joining the security domain is as follows: the client APP establishes a stack applied to the security domain; and loading the created stack into the security domain through a client APP which creates the security domain. In the whole process, manual configuration is needed, the operation is complex, and the configuration efficiency is low.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
At least some embodiments of the present invention provide a method and an apparatus for configuring a client, and a communication system, so as to at least solve the technical problems that, in the related art, a client needs to be configured manually in a security domain joining process, operation is complex, and configuration efficiency is low.
According to an embodiment of the present invention, there is provided a method for configuring a client, including: determining a target security domain added by a client; and switching the current stack in an active state on the client based on the matching relationship between the target security domain and the mapping relationship set, wherein the mapping relationship set is used for storing the mapping relationship between the security domain and the stack.
According to an embodiment of the present invention, there is also provided an apparatus for configuring a client, including: the first determining module is used for determining a target security domain added by the client; and the switching module is used for switching the current stack in an active state on the client based on the matching relationship between the target security domain and the mapping relationship set, wherein the mapping relationship set is used for storing the mapping relationship between the security domain and the stack.
According to an embodiment of the present invention, there is also provided a communication system including: the client is used for switching a current stack in an active state on the client based on a matching relation between a target security domain added by the client and a mapping relation set, wherein the mapping relation set is used for storing the mapping relation between the security domain and the stack; and the configuration equipment is positioned in the target security domain and used for configuring the stack after the client is switched.
There is further provided, according to an embodiment of the present invention, a storage medium, in which a computer program is stored, where the computer program is configured to execute, when running, any one of the above methods for configuring a client.
There is further provided, according to an embodiment of the present invention, a processor configured to execute a program, where the program is configured to perform, when executed, any one of the above methods for configuring a client.
There is further provided, according to an embodiment of the present invention, a mobile terminal including a memory and a processor, the memory having a computer program stored therein, the processor being configured to execute the computer program to perform any one of the above methods for configuring a client.
According to an embodiment of the present invention, there is also provided a chip including: and the processor is used for calling and running the computer program from the memory so that the equipment provided with the chip executes any one of the method for configuring the client.
There is also provided, in accordance with an embodiment of the present invention, a computer program product including computer program instructions for causing a computer to perform the method of configuring a client in any one of the above.
There is also provided, according to an embodiment of the present invention, a computer program for causing a computer to execute the method of configuring a client in any one of the above.
In at least some embodiments of the present invention, after determining a target security domain added by a client, a current stack in an active state on the client may be switched based on a matching relationship between the target security domain and a mapping relationship set, so that after discovering security domain information in a network, the client may conveniently switch the stack based on the mapping relationship set without performing manual operation, thereby achieving technical effects of reducing operation complexity and improving configuration efficiency, and further solving technical problems in related technologies that the client needs to perform manual configuration in a security domain adding process, and the operation is complex and the configuration efficiency is low.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention. In the drawings:
FIG. 1 is a flow diagram of an activation tool configuration device according to the prior art;
FIG. 2 is a schematic diagram of an activation tool configuration device application scenario according to the prior art;
fig. 3 is a schematic flow diagram of a client APP creating multiple security domains according to the prior art;
fig. 4 is a schematic flow diagram of a client APP configured to a plurality of different security domains, according to the prior art;
FIG. 5 is a flow diagram of a method of configuring a client according to one embodiment of the invention;
fig. 6 is a schematic diagram of existing security domains in an office network according to one embodiment of the present invention;
fig. 7 is a flowchart of the operation of a client entering a security domain according to a first embodiment of the present invention;
fig. 8 is a flowchart of the operation of a client entering a security domain according to a second embodiment of the present invention;
fig. 9 is an operation flowchart of a client entering a security domain according to a third embodiment of the present invention;
FIG. 10 is a block diagram of an apparatus for configuring a client according to an embodiment of the present invention;
FIG. 11 is a schematic block diagram of a communication system in accordance with one embodiment of the present invention;
fig. 12 is a schematic structural diagram of a communication device according to an embodiment of the present invention;
FIG. 13 is a diagram of a chip structure according to an embodiment of the invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In the field of internet of things, a new device needs to be activated before it can operate in a network or interact with other devices. The first step in activating a new device is to configure device ownership. Legitimate users establish device ownership using an Owner Transfer Method (OTM) by activating a Tool (on board). After ownership is established, the new device is configured by using the OBT, and finally the new device can normally operate and interact with other devices. The specific flow is shown in figure 1:
1. activating a tool to discover new equipment needing configuration in the network;
2. the new equipment returns to the owner transfer method supported by the new equipment;
3. the activation tool establishes a secure connection with the new device according to the selected owner transfer method;
4. the activation tool configures an Identifier (ID) of the activation tool to a deviceowneruid (Universal Unique Identifier) attribute of equipment in an oic/sec/down (equipment Owner Transfer Method) of the equipment, and establishes an Owner identity of the equipment;
5. the activation tool checks the security credential types supported by the new device, such as symmetric key, asymmetric key, certificate, etc.;
6. the activation tool selects an appropriate symmetric security credential;
7. the activation tool deploys the selected symmetric security credentials to an/oic/sec/secret (Credential) resource of the device;
8. the activation tool allocates the new device to a Credential Management Service (CMS) key Management Service, the CMS key Management Service is usually used as a part of the activation tool, and the CMS key Management Service can also be deployed separately as a Service in consideration of extensibility and modular design;
9. the activation tool configures the identifier of the activation tool to the property of a rowneruuid (Resource Owner UUID) of equipment/oic/sec/doxm, and sets the Owner of the/doxm Resource;
10. the activation tool configures an identifier of the activation tool (an identifier of the credential management service) to a rowneruuid attribute of/oic/sec/bred of the new device, and sets a master of/oic/sec/bred resources;
11. the activation tool deploys credentials for establishing a secure connection with the credential management service to the/oic/sec/bred resource of the device;
12. activating the tool/certificate management service to change the state of the new equipment into a service configuration state;
13. the activation tool/credential management service configures credentials for establishing a local area network secure connection with other devices to the device's/oic/sec/bred resource;
14. the activation tool/credential management service changes the state of the new device to a normal operating state.
The activation tool is a master of the network, and can configure the interconnection and intercommunication of a Client (Client) device and a Server (Server) device in the network. After configuration, the activation tool is the owner of the configured device. For example, a scenario for an application in a home as shown in fig. 2.
1. A client APP is installed on a mobile phone of a mother;
2. a client APP of a mother creates various user roles such as a family, an administrator (admin), a family member (family), a tenant (guest) and the like;
3. mom's client APP discovers and configures the restaurant's lights (DR-Bulb) for display;
4. the mom client APP can control the lamps of the restaurant;
5. a mobile phone of a father is provided with a client APP;
6. discovering a client APP of dad by a client APP of mom, configuring the client APP of dad, and giving the family member permission, wherein the client APP of dad can also control a lamp of a restaurant;
7. the mom client APP can also give the dad client APP administrator permission, and the dad client APP can also configure and manage the restaurant lamp;
8. for a new device, such as a Living Room light (LR-Bulb), it is configured in the same way as a restaurant light;
9. for a new client APP, its role and permissions are configured in the same way as dad's client APP.
At the step 5, after the client APP is installed on the mobile phone of dad, the APP is turned on and connected to the home network, and the client APP of mom and the light of the restaurant in the network can be found. Further, the client APP of the dad obtains the deviceuid and the deviceowneruiid in the two doxm resources, respectively. The comparison shows that: for the client APP of the mother, if the deviceduuid and deviceowerreuid in the doxm resource are the same, the client APP of the mother is an activation tool; for the lamps of the restaurant, if the deviceduuid and deviceneruid in the doxm resource are different, the lamps of the restaurant are Client devices or Server devices. Meanwhile, the deviwneruuid of the restaurant lamp and the deviceuuid of the mom client APP are compared and are the same, and then the restaurant lamp is considered to be configured by the mom client APP. Then, dad's client APP can request mom's client APP to configure into the home network, and then step 6 is entered.
If dad's client APP also wants to configure a new device to enter the home network as an activation tool, mom's client APP can configure dad's client APP as a slave activation tool, dad's client APP as a master activation tool. Thereafter, the device configured by dad's client APP can also access the home network to interconnect with the restaurant's lights. In a security domain network, there is only one master activation tool, and there may be multiple slave activation tools.
A client APP may create multiple security domains, as shown in fig. 3, the specific method is as follows:
1. a user starts a client App, which instantiates a new Open Connectivity Foundation (OCF) stack (stack 1) including an activation tool;
2. automatically creating a new open connection foundation security domain 1 through an activation tool running in the stack 1;
3. the user instructs the client to create an additional open connection foundation security domain;
4. the client instantiates a new open connection foundation stack (stack 2) including the activation tool and listens on the new port;
5. a new open connection foundation security domain 2 is automatically created by the activation tool running in stack 2.
A new security domain may be created by repeating steps 2 and 3 above.
It should be noted that the "stack" referred to in the embodiments of the present invention is not a program stack in a general sense, but is an abstraction of the open connection foundation logical device, including the core resources and attributes of the open connection foundation device.
The client APP may also be configured to multiple different security domains, as shown in fig. 4, taking a scenario in which one client APP is configured to two security domains as an example:
1. the activation tool 1 of the client APP 1 loads the stack 1 of the client APP 2 into the security domain 1;
2. the user instructs the client APP 2 to join another security domain N;
3. the client APP 2 instantiates another stack N;
4. the activation tool 1 of the client APP 1 loads the stack N of the client APP 2 into the security domain N.
It should be noted that, the client APP 2 may also be configured to join two different security domains (created by the client APP 1 and the client APP 3, respectively) through the client APP 1 and the client APP 3.
After a client APP discovers a security domain existing in a network, a user needs to participate in the process of joining the security domain, and an intelligent processing mechanism is lacked to simplify the operation of the user.
In order to solve the above problem, the present invention provides a method and an apparatus for configuring a client, and a communication system.
In accordance with one embodiment of the present invention, there is provided an embodiment of a method of configuring a client, it being noted that the steps illustrated in the flowchart of the drawings may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowchart, in some cases the steps illustrated or described may be performed in an order different than presented herein.
In this embodiment, a method for configuring a client running on the terminal device is provided, and fig. 5 is a flowchart of a method for configuring a client according to an embodiment of the present invention, as shown in fig. 5, the method includes the following steps:
step S502, determining a target security domain added by a client;
the client in the above steps may refer to a client APP installed on a new device accessing the network, and after the client accesses the network, one or more security domains already existing in the network may be discovered, where the one or more security domains may be created by one client APP or created by multiple client APPs, which is not limited in this invention.
The target security domain in the above steps may be a security domain selected by the user according to the usage requirement of the client APP, for example, the client APP may be added to a security domain in which other devices that need to operate or interact are located.
Step S504, based on the matching relationship between the target security domain and the mapping relationship set, switching the current stack in the active state on the client, where the mapping relationship set is used to store the mapping relationship between the security domain and the stack.
After joining a security domain, the client APP activates the stack corresponding to the security domain and puts it in an active state. When the client APP needs to join another security domain, the client APP needs to activate another stack, and thus, the current stack in the active state needs to be switched.
In order to ensure that the client APP can automatically switch the current stack, the client APP may maintain a mapping table (i.e., the mapping relationship set) between the open connection fund stack and the security domain ID, as shown in table 1 below, where the security domain ID is unique identification information of the security domain, and the open connection fund stack is a handle of the unique identification stack in the client APP.
TABLE 1
Security domain ID Open connection foundation stack
SDI (Security Domain Information): uuid Stack handle
Suppose that in the home network scenario shown in fig. 2, mom's client APP is used as an activation tool, and first self-activates and configures itself, and then configures dad's client APP and sets security domain information, and at this time, dad's client APP uses stack 1.
Then, dad's client APP enters the office network, finds the controllable device and finds its corresponding security domains, as shown in fig. 6, there are two security domains in the office network, named office 1 and office 2, respectively, device 1 is configured in office 1, and device 2 is configured in office 2.
If dad wishes to control device 1, it can control client APP to join the security domain named office 1 and switch stack 1 currently in use.
By adopting the embodiment of the invention, after the target security domain added by the client is determined, the current stack in the active state on the client can be switched based on the matching relationship between the target security domain and the mapping relationship set, so that the client can conveniently switch the stack based on the mapping relationship set after discovering the security domain information in the network, the technical effects of reducing the operation complexity and improving the configuration efficiency are achieved without manual operation, and the technical problems that the client needs to be manually configured in the security domain adding process, the operation is complex and the configuration efficiency is low in the related technology are solved.
In the foregoing embodiment of the present invention, based on the matching relationship between the target security domain and the mapping relationship set, switching the current stack in the active state on the client includes: under the condition that a stack matched with the target security domain exists in the mapping relation set, switching the current stack into a stack matched with the target security domain; and under the condition that a stack matched with the target security domain does not exist in the mapping relation set, creating a new stack, and switching the current stack into the new stack.
In an alternative embodiment, after determining the target security domain that needs to be added, the client APP may check whether an entry matching the target security domain exists in the maintained mapping table, and further determine whether a stack matching the target security domain exists in the created stack. If the stack exists, the stack applied to the target security domain is created, and the stack can be directly switched to; if not, indicating that a stack for application to the target security domain has not been created, a new stack may be created, made available to the target security domain, and switched to.
In the above embodiment of the present invention, after creating the new stack, the method further includes: configuring a new stack to be in an initialization state; determining the type of the new stack in the target security domain; based on the type, a new stack is configured.
The type in the above steps may refer to the role and authority of the client APP in the target security domain, and may include: a client type or an activation tool type, and the type of client APP may be selected by the user.
In an alternative embodiment, the newly created stack needs to be configured by the activation tool, so that the created new stack can be in an initialization state, that is, in a configurable state, and a user selects whether to use the client or the identity of the activation tool to enter the security domain, and further, different configuration processes can be performed for different identities.
In the above embodiment of the present invention, in the case that the type is the client type, configuring the new stack includes: determining a configuration device of a target security domain, wherein the configuration device comprises a main activation tool; the security domain of the new stack is configured as the target security domain by the configuration device.
In an optional embodiment, if the client APP enters the security domain with the identity of the client, an activation tool for creating the security domain may be found, and the new stack is configured through the activation tool, and the security domain of the new stack is configured as the target security domain, that is, the new stack and the target security domain have a mapping relationship.
In one embodiment of the present invention, in the case that the type is an activation tool type, configuring the new stack includes: configuring a security domain of the new stack as a target security domain; determining a configuration device of a target security domain, wherein the configuration device comprises a main activation tool; the new stack is configured as a slave activation tool by the configuration device. In another embodiment of the present invention, configuring the new stack comprises: determining a configuration device of a target security domain, wherein the configuration device comprises a main activation tool; the new stack is configured as a slave activation tool by the configuration device and the security domain of the new stack is configured as the target security domain.
In an optional embodiment, if the client APP enters the security domain with the identity of the activation tool, the user may directly set the security domain of the new stack as the target security domain through the client APP, that is, the new stack and the target security domain have a mapping relationship. The client APP then looks for an activation tool that creates the security domain, which acts as a master activation tool, further configures the new stack as a slave activation tool via the master activation tool, and completes other configurations.
In another optional embodiment, the client APP may directly find an activation tool that creates the security domain, where the activation tool serves as a master activation tool, and further configure the new stack as a slave activation tool through the master activation tool, and configure the security domain of the new stack as a target security domain, that is, the new stack and the target security domain have a mapping relationship.
In the above embodiment of the present invention, after configuring the security domain corresponding to the new stack as the target security domain, the mapping relationship between the new stack and the target security domain is stored in the mapping relationship set.
In order to facilitate rejoining the target security domain and avoid creating a stack multiple times, the mapping relationship between the new stack and the target security domain may be stored in a mapping table, that is, an entry is added to the mapping table to store the target security domain ID and the handle of the new stack to represent the new stack and its security domain.
In the above embodiment of the present invention, in a case that there are multiple stacks in the mapping relationship set, where the multiple stacks match the target security domain, the method further includes: acquiring attribute parameters of each stack; determining a priority of each stack based on the attribute parameters of each stack; and switching the current stack to the stack with the highest priority.
Optionally, the attribute parameter in the above step includes at least one of: time of last activation, frequency of activation, number of times of activation, duration of activity, flag information set by the user. The last time of activation may be the last time of operation in the foreground, the frequency/number of times of activation may be the frequency/number of times of activation of the stack to the active state by the client APP, the duration of the active state may be the timing time of the stack in the active state, and the flag information set by the user may be the priority stack marked by the user under the security domain.
The above attribute parameters may also be stored in a mapping table, which is shown in table 2 below, taking the last activation time as an example, where the last activation time is the stack.
TABLE 2
Security domain ID Open connection foundation stack Last time of activation
SDI:uuid Stack handle YYYY-MM-DD
In an optional embodiment, for the target security domain, there may be multiple matching items in the mapping table, that is, multiple matching stacks may be queried from the mapping table, at this time, the priority of the stack may be determined according to the last activation time, use frequency, use duration, and the like of each stack recorded by the client APP, and the stack with the highest priority is selected for switching.
In the above embodiment of the present invention, after the current stack is switched to the stack with the highest priority or the current stack is switched to a new stack, the parameter value of the attribute parameter of the current stack is updated.
In order to ensure the accuracy of the factors such as the last activation time, the use frequency, the use duration and the like which are queried when the security domain is added again, after the stack is switched, the factors such as the last activation time, the use frequency, the use duration and the like of the stack before switching may be updated, for example, the last activation time may be updated to be the current time.
In the above embodiments of the present invention, switching the current stack includes: configuring the switched stack to be in an active state; and configuring the current stack to be in an inactive state, and saving the configuration information of the current stack.
In an alternative embodiment, the stack switching process may be to bring the switched stack to the foreground, which goes to an inactive state and retains the configuration.
In the above embodiment of the present invention, the mapping relationship set stores identification information of the security domain and identification information of the stack. Optionally, determining that a stack matched with the target security domain exists in the mapping relationship set under the condition that the same identification information as the target identification information of the target security domain exists in the mapping relationship set; and under the condition that the mapping relation set does not have the identification information which is the same as the target identification information, determining that a stack which is matched with the target security domain does not exist in the mapping relation set.
The identification information of the security domain in the above step may refer to a security domain ID in the mapping table, and the identification information of the stack may be a stack handle in the mapping table.
In an optional embodiment, the client APP may search whether the mapping table stores the security domain ID of the target security domain, and if so, determine that a stack matching the target security domain exists, and directly read a stack handle in an entry where the security domain ID in the mapping table is located; if not, it is determined that a stack matching the target security domain does not exist, a new stack needs to be created.
In the above embodiments of the present invention, the detected at least one security domain is displayed before determining the target security domain that the client joins.
In an optional embodiment, after detecting one or more security domains in the local area network, the client APP may present security domain information to a user, perform selection by the user, and determine a target security domain according to a selection result of the user.
In the above embodiment of the present invention, before determining the type of the new stack in the target security domain, prompt information for prompting the user to determine the type of the new stack is output.
In an alternative embodiment, after creating the new stack, the client APP may prompt the user to enter the security domain with the identity of the client or the activation tool, make a selection by the user, and determine the type of the new stack according to the selection result of the user.
A preferred embodiment of the present invention is described in detail below with reference to fig. 7 to 9, for example, still taking the scenario shown in fig. 6 as an example, when the client APP of dad uses stack 1.
In a first embodiment, as shown in fig. 7, the operation flow of the client APP of dad to enter the office network is as follows:
1. the client APP finds a plurality of security domains in the network and presents the security domains to the user;
2. a user selects one security domain to join;
3. the client APP checks whether the maintained mapping table has an item matched with the security domain, so as to find out whether a stack matched with the security domain selected by the user exists in the existing stack;
4. if yes, activating the stack 2 and making it turn to foreground, the original foreground stack 1 turns to inactive state and keeps configuration, then turning to step 16; if not, carrying out the next step;
5. the client APP establishes a new stack 2, so that the stack is in an initialization state;
6. the client APP prompts a user to join the security domain by the identity of the client or the activation tool;
7. the user selects to enter the security domain by the identity of the client, and the step 8 is carried out; the user selects to enter the security domain by the identity of the activated tool, and the step 11 is carried out;
8. the client APP makes the stack 2 turn to the foreground and be in an initialization state, and the original foreground stack 1 turns to an inactive state and keeps configuration;
9. stack 2 is loaded by an activation tool in the network and configures a security domain;
10. adding an item in the maintained mapping table by the client APP to represent the stack 2 and the security domain thereof, and turning to the step 16;
11. the client APP makes the stack 2 turn to the foreground, set as an activation tool and in an initialization state, and the original foreground stack 1 turns to an inactive state and keeps configuration;
12. the client APP sets the security domain of the stack 2 as the security domain selected by the user;
13. the client APP adds an entry to the maintained mapping table to represent stack 2 and its security domain;
14. stack 2 looks for the master activation tool and requests configuration;
15. the master activating tool configures the stack 2 as a slave activating tool, finds that the activating tool has already configured a security domain, completes other configurations, and goes to step 16;
16. and (4) finishing.
In the second embodiment, the above activation time is taken as an example for explanation, and as shown in fig. 8, the embodiment is different from the first embodiment in that steps 4-5, 7, 12 and 16 are added, wherein:
4. if two items are matched and respectively correspond to the stack 2 and the stack 3, turning to the step 5; if not, turning to the step 8;
5. comparing the last activation times of stack 2 and stack 3, wherein stack 2 is newer;
7. updating the last activation time of the corresponding item of the stack 1 in the mapping table to be the current time, and turning to the step 21;
12. updating the last activation time of the corresponding item of the stack 1 in the mapping table to be the current time;
16. and updating the last activation time of the corresponding item of the stack 1 in the mapping table to be the current time.
In a third embodiment, as shown in fig. 9, this embodiment differs from the first embodiment in steps 12-14, in which:
12. stack 2 looks for the master activation tool and requests configuration;
13. the master activation tool configures the stack 2 as a slave activation tool and configures a security domain of the stack 2;
14. the client APP adds an entry in the maintained mapping table to represent stack 2 and its security domain.
In a fourth embodiment, the difference between this embodiment and the second embodiment is that the last activation time is replaced with the frequency/number of usage, the frequency/number of usage of the last year, the duration of usage, and the user is allowed to mark the priority stack under the security domain, etc.
In this embodiment, a device for configuring a client is further provided, and the device is used to implement the foregoing embodiments and preferred embodiments, and details of which have been already described are omitted.
Fig. 10 is a block diagram of an apparatus for configuring a client according to an embodiment of the present invention, as shown in fig. 10, the apparatus including:
a first determining module 102, configured to determine a target security domain that a client joins;
a switching module 104, configured to switch a current stack in an active state on the client based on a matching relationship between the target security domain and a mapping relationship set, where the mapping relationship set is used to store a mapping relationship between the security domain and the stack.
In the above embodiments of the present invention, the switching module includes: the first switching unit is used for switching the current stack into a stack matched with the target security domain under the condition that the stack matched with the target security domain exists in the mapping relation set; and the second switching unit is used for creating a new stack and switching the current stack to be the new stack under the condition that the stack matched with the target security domain does not exist in the mapping relation set.
In the above embodiment of the present invention, the apparatus further includes: the first configuration module is used for configuring the new stack to be in an initialization state; a second determining module for determining the type of the new stack in the target security domain; and the second configuration module is used for configuring the new stack based on the type.
In the above embodiment of the present invention, in a case that the type is a client type, the second configuration module includes: the device comprises a determining unit, a configuration unit and a processing unit, wherein the determining unit is used for determining configuration equipment of a target security domain, and the configuration equipment comprises an activation tool; and the first configuration unit is used for configuring the security domain corresponding to the new stack as the target security domain through configuration equipment.
In one embodiment of the present invention, in the case that the type is an activation tool type, the second configuration module includes: the first and second configuration units are used for configuring the security domain of the new stack as a target security domain; the device comprises a determining unit, a configuration unit and a processing unit, wherein the determining unit is used for determining configuration equipment of a target security domain, and the configuration equipment comprises a main activation tool; and the second third configuration unit is used for configuring the new stack to be the slave activation tool through the configuration equipment. In another embodiment, the second configuration module comprises: the device comprises a determining unit, a configuration unit and a processing unit, wherein the determining unit is used for determining configuration equipment of a target security domain, and the configuration equipment comprises a main activation tool; and the third and fourth configuration units are used for configuring the new stack as the slave activation tool through the configuration equipment and configuring the security domain of the new stack as the target security domain.
In the above embodiment of the present invention, the apparatus further includes: and the storage module is used for storing the mapping relation between the new stack and the target security domain to the mapping relation set.
In the above embodiment of the present invention, the apparatus further includes: the first acquisition module is used for acquiring the attribute parameters of each stack under the condition that a plurality of stacks matched with the target security domain exist in the mapping relation set; a third determining module, configured to determine a priority of each stack based on the attribute parameter of each stack; the switching module is also used for switching the current stack to the stack with the highest priority.
Optionally, the attribute parameter includes at least one of: time of last activation, frequency of activation, number of times of activation, duration of activity, flag information set by the user.
In the above embodiment of the present invention, the apparatus further includes: and the updating module is used for updating the parameter value of the attribute parameter of the current stack after the current stack is switched to be the stack with the highest priority or the current stack is switched to be a new stack.
In the above embodiments of the present invention, the switching module includes: a fourth configuration unit, configured to configure the switched stack to be in an active state; and the fifth configuration unit is used for configuring the current stack to be in an inactive state and storing the configuration information of the current stack.
In the above embodiment of the present invention, the mapping relationship set stores identification information of the security domain and identification information of the stack. Optionally, the apparatus further comprises: a fourth determining module, configured to determine that a stack matching the target security domain exists in the mapping relationship set when identification information that is the same as the target identification information of the target security domain exists in the mapping relationship set; and under the condition that the mapping relation set does not have the identification information which is the same as the target identification information, determining that a stack which is matched with the target security domain does not exist in the mapping relation set.
In the above embodiment of the present invention, the apparatus further includes: a display module for displaying the detected at least one security domain.
In the above embodiment of the present invention, the apparatus further includes: and the output module is used for outputting prompt information for prompting a user to determine the type of the new stack.
It should be noted that, the above modules may be implemented by software or hardware, and for the latter, the following may be implemented, but not limited to: the modules are all positioned in the same processor; alternatively, the modules are respectively located in different processors in any combination.
Fig. 11 is a schematic block diagram of a communication system according to one embodiment of the present invention. As shown in fig. 11, the communication system includes a client 112 and a configuration device 114.
The client 112 is configured to switch a current stack in an active state on the client based on a matching relationship between a target security domain added by the client and a mapping relationship set, where the mapping relationship set is used to store a mapping relationship between the security domain and the stack; the configuration device 114 is located in the target security domain and is used for configuring the stack after the client is switched.
Optionally, the client 112 may be configured to implement corresponding functions implemented by the client in the foregoing method, and the configuration device may be configured to implement corresponding functions implemented by the configuration device in the foregoing method, which is not described herein again for brevity.
Fig. 12 is a schematic structural diagram of a communication device according to an embodiment of the present invention. As shown in fig. 12, the communication device includes a processor that can call and run a computer program from a memory to implement the method in the embodiment of the present invention.
Optionally, as shown in fig. 12, the communication device may further include a memory. From which a processor may invoke and execute a computer program to implement the methods of embodiments of the present invention.
The memory may be a separate device from the processor or may be integrated into the processor.
Optionally, as shown in fig. 12, the communication device may further include a transceiver, and the processor may control the transceiver to communicate with other devices, and specifically, may transmit information or data to the other devices or receive information or data transmitted by the other devices.
The transceiver may include a transmitter and a receiver, among other things. The transceiver may further include an antenna, and the number of antennas may be one or more.
Optionally, the communication device may specifically be a device where the client is located in the embodiment of the present invention, and the communication device may implement a corresponding process implemented by the client in each method in the embodiment of the present invention, and for brevity, details are not described here again.
Optionally, the communication device may specifically be the configuration device in the embodiment of the present invention, and the communication device may implement the corresponding process implemented by the configuration device in each method in the embodiment of the present invention, and for brevity, details are not described here again.
Fig. 13 is a schematic diagram of a chip structure according to an embodiment of the present invention, and as shown in fig. 13, the chip includes a processor, and the processor can call and run a computer program from a memory to implement the method in the embodiment of the present invention.
Optionally, as shown in fig. 13, the chip may further include a memory. From which a processor may invoke and execute a computer program to implement the methods of embodiments of the present invention.
The memory may be a separate device from the processor or may be integrated into the processor.
Optionally, the chip may further comprise an input interface. The processor may control the input interface to communicate with other devices or chips, and specifically, may obtain information or data sent by other devices or chips.
Optionally, the chip may further include an output interface. The processor may control the output interface to communicate with other devices or chips, and in particular, may output information or data to the other devices or chips.
Optionally, the chip may be applied to a device where the client is located in the embodiment of the present invention, and the chip may implement a corresponding process implemented by the client in each method of the embodiment of the present invention, and for brevity, details are not described here again.
Optionally, the chip may be applied to the configuration device in the embodiment of the present invention, and the chip may implement the corresponding process implemented by the configuration device in each method in the embodiment of the present invention, and for brevity, details are not described here again.
It should be understood that the chips mentioned in the embodiments of the present invention may also be referred to as a system-on-chip, a system-on-chip or a system-on-chip.
It should be understood that the processor of embodiments of the present invention may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method embodiments may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, or discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
It will be appreciated that the memory in embodiments of the invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of example, but not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), Double Data Rate Synchronous Dynamic random access memory (DDR SDRAM), Enhanced Synchronous SDRAM (ESDRAM), Synchronous link SDRAM (SLDRAM), and Direct Rambus RAM (DR RAM). It should be noted that the memory of the systems and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
It should be understood that the above memories are exemplary but not limiting illustrations, for example, the memories in the embodiments of the present invention may also be Static Random Access Memory (SRAM), dynamic random access memory (dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (enhanced SDRAM, ESDRAM), Synchronous Link DRAM (SLDRAM), Direct Rambus RAM (DR RAM), and the like. That is, the memory in the embodiments of the present invention is intended to comprise, without being limited to, these and any other suitable types of memory.
The embodiment of the invention also provides a computer readable storage medium for storing the computer program.
Optionally, the computer-readable storage medium may be applied to the mobile terminal/terminal device in the embodiment of the present invention, and the computer program enables the computer to execute the corresponding process implemented by the mobile terminal/terminal device in each method in the embodiment of the present invention, which is not described herein again for brevity.
Embodiments of the present invention also provide a computer program product, which includes computer program instructions.
Optionally, the computer program product may be applied to the mobile terminal/terminal device in the embodiment of the present invention, and the computer program instruction enables the computer to execute the corresponding process implemented by the mobile terminal/terminal device in each method in the embodiment of the present invention, which is not described herein again for brevity.
The embodiment of the invention also provides a computer program.
Optionally, the computer program may be applied to the mobile terminal/terminal device in the embodiment of the present invention, and when the computer program runs on a computer, the computer executes a corresponding process implemented by the mobile terminal/terminal device in each method in the embodiment of the present invention, which is not described herein again for brevity.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one type of logical functional division, and other divisions may be realized in practice, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (37)

  1. A method of configuring a client, comprising:
    determining a target security domain added by a client;
    and switching the current stack in an active state on the client based on the matching relationship between the target security domain and a mapping relationship set, wherein the mapping relationship set is used for storing the mapping relationship between the security domain and the stack.
  2. The method of claim 1, wherein switching a current stack on the client in an active state based on a matching relationship of the target security domain to a set of mapping relationships comprises:
    under the condition that a stack matched with the target security domain exists in the mapping relation set, switching the current stack to be the stack matched with the target security domain;
    and under the condition that a stack matched with the target security domain does not exist in the mapping relation set, creating a new stack, and switching the current stack to be the new stack.
  3. The method of claim 2, wherein after creating the new stack, the method further comprises:
    configuring the new stack to be in an initialization state;
    determining a type of the new stack in the target security domain;
    based on the type, the new stack is configured.
  4. The method of claim 3, wherein, in the case that the type is a client type, configuring the new stack comprises:
    determining a configuration device of the target security domain, wherein the configuration device comprises an activation tool;
    configuring, by the configuration apparatus, the security domain of the new stack as the target security domain.
  5. The method of claim 3, wherein, in the event the type is an activation tool type, configuring the new stack comprises:
    configuring the security domain of the new stack as the target security domain;
    determining a configuration device of the target security domain, wherein the configuration device comprises a main activation tool;
    configuring the new stack as a slave activation tool by the configuration device.
  6. The method of claim 3, wherein, in the event the type is an activation tool type, configuring the new stack comprises:
    determining a configuration device of the target security domain, wherein the configuration device comprises a main activation tool;
    configuring, by the configuration device, the new stack as a slave activation tool and the security domain of the new stack as the target security domain.
  7. A method according to any one of claims 4 to 6, wherein after configuring the security domain to which the new stack corresponds as the target security domain, storing mappings of the new stack and the target security domain to the set of mappings.
  8. The method of claim 2, wherein, in the case that there are multiple stacks in the set of mappings matching the target security domain, the method further comprises:
    acquiring attribute parameters of each stack;
    determining a priority of each stack based on the attribute parameters of each stack;
    and switching the current stack to be the stack with the highest priority.
  9. The method of claim 8, wherein the parameter value of the attribute parameter of the current stack is updated after switching the current stack to the highest priority stack or switching the current stack to the new stack.
  10. The method of claim 8, wherein the attribute parameters include at least one of: time of last activation, frequency of activation, number of times of activation, duration of activity, flag information set by the user.
  11. The method of claim 1, wherein switching the current stack comprises:
    configuring the switched stack to be in an active state;
    and configuring the current stack to be in an inactive state, and saving the configuration information of the current stack.
  12. The method of claim 1, wherein the set of mapping relationships stores therein identification information of security domains and identification information of stacks.
  13. The method of claim 12, wherein,
    determining that a stack matched with the target security domain exists in the mapping relation set under the condition that identification information identical to the target identification information of the target security domain exists in the mapping relation set;
    and under the condition that the mapping relation set does not have identification information which is the same as the target identification information, determining that a stack which is matched with the target security domain does not exist in the mapping relation set.
  14. The method of claim 1, wherein the detected at least one security domain is displayed prior to determining the target security domain to which the client has joined.
  15. The method of claim 3, wherein prior to determining the type of the new stack in the target security domain, outputting prompting information for prompting a user to determine the type of the new stack.
  16. An apparatus to configure a client, comprising:
    the first determining module is used for determining a target security domain added by the client;
    and the switching module is used for switching the current stack in an active state on the client based on the matching relationship between the target security domain and a mapping relationship set, wherein the mapping relationship set is used for storing the mapping relationship between the security domain and the stack.
  17. The apparatus of claim 16, wherein the switching module comprises:
    a first switching unit, configured to switch the current stack to a stack that matches the target security domain if a stack that matches the target security domain exists in the mapping relationship set;
    and a second switching unit, configured to create a new stack and switch the current stack to the new stack when a stack matching the target security domain does not exist in the mapping relationship set.
  18. The apparatus of claim 17, wherein the apparatus further comprises:
    the first configuration module is used for configuring the new stack to be in an initialization state;
    a second determining module for determining a type of the new stack in the target security domain;
    a second configuration module to configure the new stack based on the type.
  19. The apparatus of claim 18, wherein in the case that the type is a client type, the second configuration module comprises:
    a determining unit, configured to determine a configuration device of the target security domain, where the configuration device includes an activation tool;
    a first configuration unit, configured to configure, by the configuration device, the security domain corresponding to the new stack as the target security domain.
  20. The apparatus of claim 18, wherein in the case that the type is an activation tool type, the second configuration module comprises:
    a second configuration unit, configured to configure the security domain of the new stack as the target security domain;
    a determining unit, configured to determine a configuration device of the target security domain, where the configuration device includes a master activation tool;
    a third configuration unit, configured to configure the new stack as a slave activation tool through the configuration device.
  21. The apparatus of claim 18, wherein in the case that the type is an activation tool type, the second configuration module comprises:
    a determining unit, configured to determine a configuration device of the target security domain, where the configuration device includes a master activation tool;
    a fourth configuration unit, configured to configure the new stack as a slave activation tool through the configuration device, and configure the security domain of the new stack as the target security domain.
  22. The apparatus of any one of claims 19 to 21, wherein the apparatus further comprises:
    and the storage module is used for storing the mapping relation between the new stack and the target security domain to the mapping relation set.
  23. The apparatus of claim 17, wherein the apparatus further comprises:
    a first obtaining module, configured to obtain an attribute parameter of each stack when multiple stacks matching the target security domain exist in the mapping relationship set;
    a third determining module, configured to determine a priority of each stack based on the attribute parameter of each stack;
    the switching module is further configured to switch the current stack to a stack with the highest priority.
  24. The apparatus of claim 23, wherein the apparatus further comprises:
    and the updating module is used for updating the parameter value of the attribute parameter of the current stack after the current stack is switched to be the stack with the highest priority or the current stack is switched to be the new stack.
  25. The apparatus of claim 23, wherein the attribute parameters comprise at least one of: time of last activation, frequency of activation, number of times of activation, length of time in active state, flag information set by the user.
  26. The apparatus of claim 16, wherein the switching module comprises:
    the fourth configuration unit is used for configuring the switched stack to be in an active state;
    and the fifth configuration unit is used for configuring the current stack to be in an inactive state and storing the configuration information of the current stack.
  27. The apparatus of claim 16, wherein the set of mapping relationships stores therein identification information of security domains and identification information of stacks.
  28. The apparatus of claim 27, wherein the apparatus further comprises:
    a fourth determining module, configured to determine that a stack matching the target security domain exists in the mapping relationship set when identification information that is the same as target identification information of the target security domain exists in the mapping relationship set; and under the condition that the mapping relation set does not have identification information which is the same as the target identification information, determining that a stack which is matched with the target security domain does not exist in the mapping relation set.
  29. The apparatus of claim 16, wherein the apparatus further comprises:
    a display module for displaying the detected at least one security domain.
  30. The apparatus of claim 18, wherein the apparatus further comprises:
    and the output module is used for outputting prompt information for prompting a user to determine the type of the new stack.
  31. A communication system, comprising:
    the client is used for switching a current stack in an active state on the client based on a matching relation between a target security domain and a mapping relation set, wherein the target security domain is added by the client, and the mapping relation set is used for storing the mapping relation between the security domain and the stack;
    and the configuration equipment is positioned in the target security domain and is used for configuring the stack after the client is switched.
  32. A storage medium having stored thereon a computer program, wherein the computer program is arranged to, when executed, perform a method of configuring a client as claimed in any one of claims 1 to 15.
  33. A processor for executing a program, wherein the program is arranged to perform the method of configuring a client as claimed in any one of claims 1 to 15 when executed.
  34. A mobile terminal comprising a memory having stored therein a computer program and a processor arranged to execute the computer program to perform a method of configuring a client as claimed in any one of claims 1 to 15.
  35. A chip, comprising: a processor arranged to retrieve and run a computer program from memory to cause a device on which the chip is installed to perform a method of configuring a client as claimed in any one of claims 1 to 15.
  36. A computer program product comprising computer program instructions for causing a computer to perform the method of configuring a client as claimed in any one of claims 1 to 15.
  37. A computer program for causing a computer to perform the method of configuring a client as claimed in any one of claims 1 to 15.
CN202080091231.1A 2020-03-12 2020-03-12 Method and device for configuring client and communication system Active CN114902611B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/079051 WO2021179267A1 (en) 2020-03-12 2020-03-12 Method and apparatus for configuring client, and communication system

Publications (2)

Publication Number Publication Date
CN114902611A true CN114902611A (en) 2022-08-12
CN114902611B CN114902611B (en) 2023-12-05

Family

ID=77671115

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202080091231.1A Active CN114902611B (en) 2020-03-12 2020-03-12 Method and device for configuring client and communication system

Country Status (2)

Country Link
CN (1) CN114902611B (en)
WO (1) WO2021179267A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180287951A1 (en) * 2017-04-04 2018-10-04 Netapp, Inc. Intelligent thread management across isolated network stacks
CN109219943A (en) * 2016-07-01 2019-01-15 英特尔公司 The automatic configuration of Machine To Machine system
CN109314694A (en) * 2016-07-01 2019-02-05 英特尔公司 Group management in reconfigurable Machine To Machine system
US20190394174A1 (en) * 2018-06-26 2019-12-26 Arm Limited Automatic Client Device Registration

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109219943A (en) * 2016-07-01 2019-01-15 英特尔公司 The automatic configuration of Machine To Machine system
CN109314694A (en) * 2016-07-01 2019-02-05 英特尔公司 Group management in reconfigurable Machine To Machine system
US20180287951A1 (en) * 2017-04-04 2018-10-04 Netapp, Inc. Intelligent thread management across isolated network stacks
US20190394174A1 (en) * 2018-06-26 2019-12-26 Arm Limited Automatic Client Device Registration

Also Published As

Publication number Publication date
WO2021179267A1 (en) 2021-09-16
CN114902611B (en) 2023-12-05

Similar Documents

Publication Publication Date Title
US10292027B2 (en) Zero-touch Wi-Fi
EP3116161B1 (en) Security unit management method and terminal
US10630551B2 (en) Method and apparatus for automatic networking of gateway device
US20110191484A1 (en) Hierarchical routing and interface selection for multi-processor multimode network devices
CN105376107A (en) Terminal test method and proxy server
US8665753B2 (en) Simultaneous setup of a wireless network adapter and a network host device
US8493888B2 (en) Connectivity architecture for service discovery
MX2014009070A (en) Characteristic information acquisition method, device and network equipment.
US10481812B2 (en) Storage device and information processing system
TW201906433A (en) Wireless network type detection method, device and electronic device
CN105554845B (en) A kind of method of access, router and terminal
CN114428951B (en) Method and device for controlling access authority of network file system
CN114902611B (en) Method and device for configuring client and communication system
WO2021142849A1 (en) Method and apparatus for configuring, discovering and joining security domain, and electronic device
CN114982199A (en) Security information discovery method, security information configuration method and device
CN105320560A (en) System and method for unifying the listing and launching of applications and packages spread across multiple domains
US20220116450A1 (en) Method for Provisioning Internet of Things Device and Internet of Things Device
WO2014183729A1 (en) Unlocking method, mobile terminal and computer storage medium
CN113132333B (en) Networking login method, household appliance equipment, household appliance system and storage medium
CN113918215A (en) Micro-service configuration system, equipment and medium
US10778524B2 (en) Method and system of in home wi-fi access point replication
CN114631288A (en) Device connection method, device and readable storage medium
CN113678420B (en) Method and device for configuring client and terminal equipment
WO2019062632A1 (en) Physical device configuration method and apparatus
WO2015131668A1 (en) Service execution process, execution method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant