WO2013178174A1 - 实现终端设备即插即用管理的能力开放平台、方法及网关 - Google Patents

实现终端设备即插即用管理的能力开放平台、方法及网关 Download PDF

Info

Publication number
WO2013178174A1
WO2013178174A1 PCT/CN2013/080240 CN2013080240W WO2013178174A1 WO 2013178174 A1 WO2013178174 A1 WO 2013178174A1 CN 2013080240 W CN2013080240 W CN 2013080240W WO 2013178174 A1 WO2013178174 A1 WO 2013178174A1
Authority
WO
WIPO (PCT)
Prior art keywords
gateway
module
terminal device
download
information
Prior art date
Application number
PCT/CN2013/080240
Other languages
English (en)
French (fr)
Inventor
于长健
邓硕
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to US14/439,971 priority Critical patent/US20150295763A1/en
Priority to EP13796276.7A priority patent/EP2919437A4/en
Publication of WO2013178174A1 publication Critical patent/WO2013178174A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0806Configuration setting for initial configuration or provisioning, e.g. plug-and-play
    • H04L41/0809Plug-and-play configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2807Exchanging configuration information on appliance services in a home automation network
    • H04L12/2809Exchanging configuration information on appliance services in a home automation network indicating that an appliance service is present in a home automation network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2816Controlling appliance services of a home automation network by calling their functionalities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2823Reporting information sensed by appliance or service execution status of appliance services in a home automation network
    • H04L12/2825Reporting to a device located outside the home and the home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/283Processing of data at an internetworking point of a home automation network
    • H04L12/2834Switching of information between an external network and a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services

Definitions

  • the present invention relates to a technology for access terminal device management in an Internet of Things, and in particular to a capability open platform, device identification method and gateway for implementing plug-and-play management of a terminal device. Background technique
  • IoT gateways such as home gateways.
  • IoT gateways have high mobility characteristics. For example, when someone goes to a friend's house, they may carry portable devices such as a blood pressure monitor and a blood glucose monitor. This makes the IoT gateway need to face various new technologies at any time. Access to the device.
  • IoT gateways have become more than just access and data transmission for terminal devices, but have become local control centers for device access, management, control and services.
  • existing high-end IoT home gateways have been With a touch screen control interface, the operating status of various devices in the home will be displayed on the gateway interface and the lighting, air conditioning and TV in the home can be controlled through the gateway control interface.
  • the WMMP protocol is a data communication between the China Mobile for standardizing the Internet of Things terminal and the machine-to-Machine (M2M) platform, and implementing the M2M platform for the Internet of Things terminal. Norms developed by unified management. M2M is used to represent machine-to-machine connection and communication. M2M is the basis of the Internet of Things.
  • the main purpose of the embodiments of the present invention is to provide a capability open platform, a device identification method, and a gateway for implementing plug-and-play management of a terminal device, so that the gateway can identify a terminal that needs to be accessed but not supported by the gateway itself.
  • the device type of the device to be compatible with plug-and-play management and provisioning of all terminal devices.
  • An open capability platform for implementing plug-and-play management of a terminal device wherein the capability open platform is configured to identify a terminal device that does not access the gateway according to the label information uploaded by the gateway, and realize that the gateway does not support the plug-in of the terminal device. use.
  • the capability openness platform includes a device identification service unit configured to identify, according to the label information of the terminal device that is not accessed by the gateway, the device type of the terminal device that is not connected to the gateway, and match the information of the gateway itself.
  • the gateway performs the modules and files required for device identification, management, and service, and feeds back the required modules and files or the download addresses of the required modules and files to the gateway.
  • the capability open platform further includes an authentication service unit and a label information registration service ticket. Yuan, address registration service unit, upload service unit;
  • the authentication service unit is configured to authenticate the manufacturer of the terminal device, and after the authentication succeeds, perform registration, uploading, and downloading services;
  • the tag information registration service unit is configured to register tag information of the terminal device;
  • the address registration service unit is configured to register a download address of a module and a file required for device identification, management, and service of the gateway;
  • the uploading service unit is configured to provide an uploading service of modules and files required for device identification, management, and service of the gateway.
  • a device identification method for implementing plug-and-play management of a terminal device comprising: the gateway obtaining the label information of the terminal device by using the terminal authorization mechanism, and calling the device identification service of the capability open platform to identify the terminal device not connected to the gateway.
  • the gateway obtains the label information of the terminal device by using the terminal authorization mechanism: the terminal device that has accessed the gateway has the capability of reading the tag information, and the gateway authorizes the terminal device that has accessed the gateway, The terminal device is authorized to read the tag information of the terminal device that is not connected to the gateway to obtain the tag information of the terminal device.
  • the terminal device that identifies the non-access gateway is: the authorized terminal device sends the read label information of the terminal device that is not the access gateway to the gateway, and the gateway will invoke the label information sent by the authorized terminal device.
  • the device identification service of the capability open platform, the data uploaded by the gateway to the capability open platform includes at least the obtained tag information of the terminal device of the non-access gateway and the gateway itself information.
  • the tag information includes: any one of a barcode, a two-dimensional code, and a radio frequency identification RFID tag.
  • the method further includes: the capability opening platform acquiring the label information of the terminal device of the non-access gateway uploaded by the gateway and the gateway self information; After the capability-opening platform identifies the device type of the terminal device that does not access the gateway according to the label information of the terminal device that does not access the gateway, the device identifies and manages the device according to the device type and the gateway information.
  • the modules and files required by the service feed back the required modules and files or the download addresses of the required modules and files to the gateway.
  • the method further includes: the gateway directly performing device identification, management, and service according to the required modules and files; or
  • the gateway first downloads the required modules and files according to the download address, and then performs device identification, management, and service.
  • a gateway for implementing plug-and-play management of a terminal device where the gateway includes: a device authorization module, a device identification module, and an expandable framework;
  • the device authorization module is configured to authorize an external device as a label information collection device of the gateway, and is further configured to implement authorization, deauthorization, and maintenance authorization information of the device;
  • the device identification module is configured to invoke a device identification service of the capability open platform and send the obtained tag information of the terminal device and the gateway information to the capability open platform;
  • the extensible framework is configured to enable the gateway to dynamically load the downloaded module through the extensible framework to implement the function extension.
  • the tag information includes: any one of a barcode, a two-dimensional code, and an RFID tag.
  • the gateway further includes: a wireless module, a download module, and a download management module; wherein the wireless module is configured to be authorized by at least one of wireless communication including Wifi, Bluetooth, Zigbee, RF433, RF779, or infrared External devices interact to enable authorization of external devices and receipt of barcodes, QR codes or RFID;
  • a wireless module configured to be authorized by at least one of wireless communication including Wifi, Bluetooth, Zigbee, RF433, RF779, or infrared External devices interact to enable authorization of external devices and receipt of barcodes, QR codes or RFID;
  • the download module is configured to download, from the external network, a module or a file required for implementing terminal device management and service according to the download address fed back by the capability open platform;
  • Download a management module configured to manage modules or files downloaded from an external network; download a management module, It is also configured to save or delete downloaded modules or files according to policies.
  • a gateway for implementing plug-and-play management of a terminal device comprising: a tag reading module with a camera, a device identification module, and an expandable frame;
  • the camera-equipped tag reading module has a good mobility by connecting to the gateway host in a wireless manner, configured to read tag information and wirelessly transmit the tag information;
  • the device identification module is configured to invoke a device identification service of the capability open platform and send the obtained tag information of the terminal device and the gateway information to the capability open platform;
  • the extensible framework is configured to enable the gateway to dynamically load the downloaded module through the extensible framework to implement the function extension.
  • the tag information includes: any one of a barcode, a two-dimensional code, and an RFID tag.
  • the gateway further includes: a wireless module, a download module, and a download management module; wherein the wireless module is configured to be authorized by at least one of wireless communication including Wifi, Bluetooth, Zigbee, RF433, RF779, or infrared External devices interact to enable authorization of external devices and receipt of barcodes, QR codes or RFID;
  • a wireless module configured to be authorized by at least one of wireless communication including Wifi, Bluetooth, Zigbee, RF433, RF779, or infrared External devices interact to enable authorization of external devices and receipt of barcodes, QR codes or RFID;
  • the download module is configured to download, from the external network, a module or a file required for implementing terminal device management and service according to the download address fed back by the capability open platform;
  • the download management module is configured to manage modules or files downloaded from the external network; the download management module is further configured to save or delete the downloaded modules or files according to the policy.
  • the capability open platform of the embodiment of the present invention is configured to identify the terminal device that does not access the gateway according to the label information uploaded by the gateway, and implement the plug-and-play operation of the gateway device that does not support the terminal device.
  • the identification of the terminal device that does not access the gateway is performed by using the label information, so that the gateway can identify the device type of the terminal device that is not supported by the gateway but needs to be accessed, so as to be compatible with the insertion and insertion of all the terminal devices.
  • FIG. 1 is a schematic structural diagram of a capability open platform according to an embodiment of the present invention.
  • FIG. 2 is a schematic diagram of an implementation process of an embodiment of a method according to the present invention.
  • FIG. 3 is a schematic structural diagram of a gateway according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of another embodiment of a gateway according to the present invention.
  • FIG. 5 is a schematic diagram of a network architecture when an interaction between a capability open platform and a gateway is performed according to an embodiment of the present invention
  • FIG. 6 is a schematic diagram of external interaction based on a capability open platform according to an embodiment of the present invention
  • FIG. 7 is a flowchart of controlling device B through a gateway according to an example of the present invention. detailed description
  • the gateway obtains the label information of the terminal device by using the terminal authorization mechanism, and invokes the device identification service of the capability open platform to identify the terminal device that is not connected to the gateway.
  • a scheme for identifying a terminal device that does not access the gateway by using the tag information is: the gateway authorizes the terminal device that has the tag information reading capability and has accessed the gateway as the alternative gateway to collect the tag information.
  • the device by using the terminal device with the tag information reading capability and having accessed the gateway, performs identification of other terminal devices that are not connected to the gateway (may
  • the terminal device having the tag information reading capability and having accessed the gateway reads the barcode, the two-dimensional code or the RFID tag information of the terminal device that is not the access gateway, and sends the read tag information to the gateway, the gateway.
  • the identification of other terminal devices that are not connected to the gateway is implemented, and the management and provision of services such as access and control for the identified devices are bound to greatly improve the ease of use of the solution, where
  • the information read-capable terminal device that has access to the gateway is actually a device that the gateway can currently support the protocol.
  • the device that supports the protocol through the limited gateway can pass the tag information to more than the current gateway protocol.
  • the device recognizes, so that the gateway can identify the device type of the terminal device that is outside the support protocol of the gateway but needs to be accessed, so as to be compatible with the plug-and-play management and service for all terminal devices, and the solution does not have the gateway itself. Changes have reduced the manufacturing cost of modifying the gateway.
  • the gateway can support the protocol through the tag information to identify more devices that do not support the current gateway protocol, so that the gateway can identify the gateway itself but not the access protocol.
  • the device type of the terminal device to facilitate plug-and-play management and service for all terminal devices.
  • FIG. 1 is a schematic structural diagram of a capability open platform according to an embodiment of the present invention.
  • the capability open platform is configured to identify a terminal device that is not connected to the gateway according to the label information uploaded by the gateway.
  • the capability open platform is as shown in FIG. 1, and includes a device identification service unit, an authentication service unit, a tag information registration service unit, an address registration service unit, and an upload service unit.
  • the Open Capability Platform provides device identification services, vendor certification services, tag information registration services, module and file download address registration services, modules and file upload services.
  • the device identification service unit is configured to be based on the label of the terminal device of the gateway that is not connected to the gateway uploaded by the gateway.
  • the sign information identifies the device type of the terminal device that is not connected to the gateway, and matches the device type and the gateway self-information (such as the gateway model, software version number, etc.) uploaded by the gateway to match the gateway for device identification, management, and service.
  • the required modules and files directly feedback the required modules and files to the gateway, or feed back the download addresses of the required modules and files to the gateway, and the gateway then downloads the modules and files according to the download address, preferably The way the feedback address is fed back to the gateway.
  • the modules and files required by the gateway for device identification, management, and service include an access protocol module, a management module, a device control module, a control interface, and a service module and files required by the gateway.
  • the device identification service unit also feeds back the device basic information description file to the gateway.
  • the authentication service unit is configured to authenticate the manufacturer of the terminal device.
  • the certified manufacturer can register the tag information, register the required module or file download address of the gateway, and upload the required modules or files of the gateway to the public download server. After the authentication is successful, the device can be registered. , upload and download services.
  • the tag information registration service unit is configured to register the tag information of the terminal device.
  • the registered tag information will be used as the sole basis for identifying the terminal device.
  • the address registration service unit is configured to register the download addresses of the modules and files required for device identification, management, and service of the gateway. Since some modules and files that are connected to or managed by the terminal device are provided and maintained by various vendors, the manufacturer registers the download address of the module or file to the capability open platform through the address registration service provided by the unit, and the capability is open. The platform then feeds back the registered download address to the required gateway.
  • the upload service unit is configured to provide uploading of modules and files required for device identification, management, and service to the gateway.
  • the uploaded modules and files are uniformly deployed to the public download server, and the download address of the modules and files is fed back to the required gateway by the capability open platform.
  • FIG. 2 is a schematic diagram of an implementation process of an embodiment of a method according to the present invention. As shown in FIG. 2, the method includes the following steps:
  • the gateway authorizes the device A.
  • the authorized device A may be a camera-equipped terminal device such as a camera-equipped mobile phone having a barcode reading function, a two-dimensional code reading function, or an RFID tag reading function.
  • the barcode information such as barcode, QR code or RFID sent by the device A to the gateway will be used as the basis for downloading the required module or file by the gateway; for the label information sent by the unauthorized device or the device that has been revoked, the gateway is only used as the ordinary data processing.
  • the authorization implementation of the device A by the gateway can be:
  • the authorized application is pre-installed on the device A, and the authorization process may be initiated by the device authorization module of the gateway or the authorized application of the device A.
  • the device A sends an authorization request to the gateway and carries the basic information of the device A.
  • the gateway device authorization module determines whether to approve the authorization according to the request information of the device A. If the authorization is authorized, the gateway device authorization module sends the authorization confirmation information.
  • the session key is carried. After the device A receives the authorization confirmation information sent by the gateway, the authorization process ends, and the tag data encrypted by the session key is sent subsequently.
  • the tag information sent by device A to the gateway during the authorization period will serve as the basis for the gateway to download the required modules or files.
  • the device A is required to provide the label reading service, and the gateway selects the device A as the authorized device; the gateway device authorization module records the authorization relationship and the authorization information and invokes the device A tag reading service; after receiving the gateway request, the device A reads the device.
  • the tag information is sent to the gateway; the tag information sent by the device A to the gateway during the authorization period will serve as the basis for the gateway to download the required module or file.
  • Step 102 Device A reads the barcode, QR code or RFID tag information of device B and sends the information to the gateway.
  • Step 103 The gateway invokes the device identification service of the capability open platform according to the label information of the device B.
  • the gateway After receiving the label information of the device B, the gateway will know that the device B is a device that needs to access, manage, control or service.
  • the gateway invokes the capabilities of the external network to open the device identification service of the platform and The device B's tag information and the gateway's own information are sent to the capability open platform.
  • Step 104 The capability open platform feeds back the module or file download address required by the gateway.
  • the capability open platform matches the module or file required by the gateway according to the device B tag information and the gateway information sent by the gateway.
  • the content of the capability open platform feedback includes: the gateway to implement the protocol module or file download address accessed by device B, the module or file download address for implementing device B management and control, and the module or file required to implement the control interface controlled by device B.
  • the advantage of the capability open platform to preferably use the feedback download address instead of directly feeding back the required modules or files is: On the one hand, considering the network traffic factor, whether to download and when to download will be determined by the gateway; on the other hand, considering the actual application scenario Some of the modules are provided and maintained by the terminal equipment manufacturer. The equipment manufacturer registers the download address to the capability open platform and then provides the service to the outside through the platform. The platform feeds back the download address to the gateway according to the gateway request, and the gateway then proceeds from the vendor's server. Download the required module or file.
  • Step 105 The gateway downloads the required module or file according to the address fed back by the capability open platform.
  • the gateway downloads the required module or file according to the download address fed back by the capability open platform (as described in the content of the capability open platform feedback in step 104, which is not described herein).
  • the gateway can save the download address fed back by the capability open platform, the software module or file downloaded from the external network, and the gateway can preferentially use the saved download address, software module or file to implement device access, management, control or service.
  • Step 106 The gateway loads the downloaded module or file to implement access, management, control, and service to the device B.
  • the manner in which the gateway implements device access includes:
  • the gateway In the first mode, after the gateway loads the downloaded device access protocol module or file, if the protocol includes a handshake (device discovery) protocol, the gateway sends a handshake request by itself (can be sent every once in a while) A handshake request is sent or a handshake request from the listening device is performed, and then the handshake process is completed according to the protocol to implement device access.
  • a handshake device discovery
  • the gateway when the gateway receives the data packet sent by the device, the gateway automatically adapts to the downloaded access protocol according to the received packet protocol header or the gateway according to the data.
  • the underlying protocol information of the packet (such as the MAC address) and the downloaded device basic information description file are automatically adapted to the access protocol.
  • the read RFID tag information includes the underlying protocol information (such as the MAC address)
  • the protocol can be automatically adapted according to the underlying protocol information of the received data packet and the information read in the RFID.
  • the gateway displays the unidentified device in the interface after receiving the data packet sent by the device. You need to match the previously downloaded module (the module displays the information in the interface, including the basic information of the device, such as the manufacturer, product name, etc.) with the unidentified device.
  • the matching method can be to drag the downloaded module icon to the unidentified device. After the device is matched, the gateway can manage and control the device through the downloaded module and the recorded communication address.
  • FIG. 3 is a schematic structural diagram of a gateway according to an embodiment of the present invention.
  • the gateway is configured to authorize a terminal device that has accessed the gateway, and the terminal device that has accessed the gateway reads the label information of the terminal device that is not connected to the gateway. , to identify the terminal device that is not connected to the gateway.
  • the terminal device that has accessed the gateway has the capability of reading tag information.
  • the gateway includes the following modules:
  • the device authorization module of the gateway is configured to authorize the external device as the label information collection device of the gateway.
  • the device authorization module is also configured to implement authorization, deauthorization, and maintenance authorization information of the device.
  • the device identification module of the gateway is configured to request the device identification service of the capability open platform and send the obtained terminal tag information and the gateway self information to the capability open platform.
  • Wireless module The gateway interacts with the authorized device through the wireless module, including through the wireless module Implement device authorization and device barcode, QR code or RFID tag information reception.
  • the wireless module generally includes a variety of wireless communication methods such as Wifi, Bluetooth, Zigbee, RF433, RF779 or infrared.
  • the gateway extends the functionality by dynamically loading the downloaded modules through the extensible framework.
  • the extensible framework can be selected from the OSGI framework.
  • the OSGi is an abbreviation of Open Service Gateway Initiative, which is a dynamic model for Java.
  • the OSGi framework defines a standard, component-oriented computing environment in which software components (bundles) can be installed, upgraded, or removed from the run without interrupting the operation of the device. With this OSGi framework, terminal devices can be accessed, managed, controlled, and serviced by downloading the required bundles from the download server.
  • the gateway download module downloads the software modules or files required for device access, management, control and service from the external network according to the download address fed back from the capability open platform.
  • the download management module manages the software modules or files downloaded from the external network.
  • the download management module can save or delete the downloaded modules or files according to the policy. For example, depending on the device connection or the usage of the downloaded software module, decide whether to delete the corresponding module or file.
  • External network interface Configured to connect to an external network, generally configured to connect to the Internet.
  • the advantages of adopting this gateway are as follows:
  • the gateway adopts the authorization of the device with tag reading capability to realize the acquisition of bar code, two-dimensional code or RFID tag information of other devices, small changes to the gateway and make full use of the existing devices in the network (such as Mobile phone) to obtain other device tag information, can better reduce the implementation cost of the gateway, which is conducive to its promotion and implementation.
  • the method proposed by the gateway of the embodiment of the present invention does not need to modify the existing terminal device, and only needs a barcode, a two-dimensional code or an RFID tag that is present on the device, and then the gateway passes the existing wireless module.
  • Authorize devices such as mobile phones to obtain device tag information.
  • the modification of the existing device is small, so that the embodiment of the present invention has high feasibility; from the ease of use, the user only needs to read the barcode, the two-dimensional code of a certain device or the like through an authorized mobile phone or the like.
  • RFID tag information can be used to access, manage, control and provide services to the device. Often convenient.
  • FIG. 4 is a schematic structural diagram of another embodiment of a gateway according to the present invention.
  • the gateway is configured to read label information of a terminal device that is not connected to the gateway, and implement identification of the terminal device that is not connected to the gateway.
  • the gateway itself has the ability to read tag information.
  • the gateway includes the following modules: a tag reading module with a camera:
  • the gateway includes a tag reading module with a camera, which can read the barcode and QR code information of the device and send the information to the gateway through the antenna.
  • Wireless module Wireless module.
  • the device identification module requests the device identification service of the capability open platform and sends the obtained terminal tag information and the gateway self information to the capability open platform.
  • Wireless module The gateway interacts with the tag reading module with camera through the wireless module to obtain the barcode, QR code or RFID tag information of the device.
  • the wireless module generally includes a variety of wireless communication methods such as Wifi, Bluetooth, Zigbee, RF433, RF779 or infrared.
  • the gateway extends the functionality by dynamically loading the downloaded modules through the extensible framework.
  • the extensible framework can be selected from the OSGI framework.
  • the gateway download module downloads the software modules or files required for device access, management, control and service from the external network according to the download address fed back from the capability open platform.
  • the download management module manages the software modules or files downloaded from the external network.
  • the download management module can save or delete the downloaded modules or files according to the policy. For example, depending on the device connection or the usage of the downloaded software module, decide whether to delete the corresponding module or file.
  • External network interface Configured to connect to an external network, generally configured to connect to the Internet.
  • This gateway is different from the gateway shown in Figure 3. There is no device authorization module. Unlike the above method, the device authorization process is not required, but the gateway itself has a tag reading capability, which is implemented by a tag reading module with a camera.
  • the two implementations of the above-mentioned gateways can solve the plug-and-play of the terminal device in any way, thereby solving the problems of various device protocols and standards, and enabling the gateway to It is sufficient to identify the device type of the terminal device that is outside the support protocol of the gateway but needs to be accessed, so as to be compatible with the plug-and-play management and service for all terminal devices.
  • FIG. 5 is a schematic diagram of a network architecture when an interaction between a capability open platform and a gateway is performed according to an embodiment of the present invention, and the network architecture includes the following modules:
  • Gateway Provides access to various protocol devices, and also provides management, control, and provision of services for the access device.
  • the gateway implements access to various devices downwards, and implements an interactive interface with the capability open platform.
  • Device A A device that has access to the gateway and has barcode, QR code or RFID tag reading capabilities.
  • Device B A device that does not access the gateway. Because the gateway does not support its protocol, it fails to access the gateway and cannot be managed, controlled, and served by the gateway.
  • Capability Open Platform The capability open platform provides device identification services, vendor authentication services, tag information registration services, module and file download address registration services, modules and file upload services.
  • Public download server Provides the download service of the module or file required by the gateway.
  • the public download server receives the module or file uploaded by the vendor download server.
  • Vendor download server Provided and maintained by each terminal manufacturer.
  • the vendor download server registers the download address of the module or file to the capability open platform or directly uploads the module or file directly to the public download server.
  • the gateway can download the required download from the vendor download server. Module or file.
  • FIG. 6 is a schematic diagram of external interaction based on a capability open platform according to an embodiment of the present invention.
  • the capability open platform interacts with a public download server and a vendor download server to provide a device identification service for the gateway, thereby implementing device plug and play.
  • the interaction process includes:
  • Step 201 The capability open platform interacts with the vendor download server, and the vendor download server registers the device tag information, the module or the file download address through the interface provided by the capability open platform, or directly uploads the module or file to the public download server.
  • Step 202 The gateway invokes the capability open platform device identification service, and the gateway sends the device label letter. Information and gateway information to the platform.
  • Step 203 The capability open platform feeds back the required module or file download address of the gateway and the device basic information description file.
  • Step 204 The gateway downloads the required module or file from the public download server or the vendor download server through the download address fed back by the platform.
  • the gateway can also send the control interface of the device B to the device C, so that the device B can control the device B through the control interface.
  • FIG. 7 is a flowchart of an example of device C controlling a device B through a gateway according to an embodiment of the present invention, including: 1.
  • a control interface of device B to device C (device C may be a mobile phone, a tablet computer, etc., and device C Can be the same as device A); Second, the user's operation message on the control interface of device C will be sent to the gateway first; Third, the gateway will convert the received operation message into a local operation message; Fourth, the gateway calls the downloaded device B Controlling the module, and generating a device control command that satisfies the control protocol of the device B; 5. The gateway sends the device control command to the device B through the wireless interface of the gateway (eg, Wifi, Bluetooth, Zigbee, RF433, RF779, infrared, etc.); Device B returns the execution result.
  • the wireless interface of the gateway eg, Wifi, Bluetooth, Zigbee, RF433, RF779, infrared, etc.
  • a gateway has been deployed in the home and the gateway is connected to the external network, and the mobile phone owned by the family member has been connected to the gateway.
  • the newly added refrigerator in the home adopts the manufacturer's own agreement, and the gateway supports China Telecom's MDMP protocol.
  • the gateway needs to be able to realize the access of the refrigerator, manage and control it, and support the conversion of the refrigerator to the MDMP protocol. Realizing the communication between the refrigerator and other home appliances in the home, including the following steps:
  • Step 301 The gateway authorizes the mobile phone.
  • the mobile phone is connected to the gateway through Wifi; the required application software is installed on the mobile phone in advance, and the authorization option is selected in the software, and the mobile phone sends an authorization request packet to the gateway with the mobile phone model information; the gateway displays the reception in the interface after receiving the authorization request packet.
  • the gateway displays the device information (phone model) that initiated the authorization request and ask whether to approve the authorization; the user is at the gateway man-machine boundary Select the consent authorization in the face; the gateway records the authorization information and feeds back the authorization success message and the session key to the mobile phone; after the mobile phone receives the authorization confirmation information, the entire authorization process ends.
  • the device tag information sent to the gateway will serve as the basis for the gateway to download the required module, and the tag information gateway sent to the gateway for the unauthorized device or the revoked device is only processed as normal data.
  • Step 302 The mobile phone reads the two-dimensional code of the refrigerator that needs to be accessed and sends the two-dimensional code information to the gateway.
  • the mobile phone reads the QR code information on the refrigerator through the camera and encrypts the information through the previous session key and sends it to the gateway.
  • Step 303 The gateway obtains the required module download address from the capability open platform according to the obtained two-dimensional code information of the refrigerator.
  • the gateway receives the QR code information of the refrigerator and invokes the capability open platform to send the device identification service and sends the QR code information of the refrigerator and the gateway device model to the capability open platform.
  • Step 304 The capability opening platform matches the software module required by the gateway according to the QR code information of the refrigerator and the gateway model, and feeds back the download address of the software module to the gateway.
  • the feedback information includes: the download address of the device access module of the protocol adopted by the refrigerator, the download address of the device management module based on the protocol adopted by the refrigerator, and the protocol adopted by the refrigerator to the M2M Device Management Protocol (MDMP)
  • MDMP M2M Device Management Protocol
  • Step 305 The gateway downloads the required module from the download server.
  • the gateway downloads the required modules from the public download server and the download server maintained by the vendor according to the download address fed back from the capability open platform.
  • the gateway downloads the device access module and the conversion module to the MDMP protocol from the public download server, and downloads the refrigerator management/control module and the control interface from the download server provided by the manufacturer.
  • Step 306 The gateway loads the downloaded module to implement access, management, control, and service of the refrigerator.
  • the modules downloaded by the gateway are packaged in bundles.
  • the gateway loads the downloaded bundles through its own OSGI framework to implement the extension of the gateway function.
  • the gateway accesses the bundle to send the device discovery packet through the device.
  • the refrigerator feeds back the corresponding information to complete the communication handshake.
  • the user can control the refrigerator through the refrigerator control interface bundle loaded on the gateway, including setting the temperature and time.
  • Step 307 select the home appliance control function in the mobile application and select the refrigerator device to be controlled.
  • the gateway sends the control interface bundle of the selected refrigerator to the mobile phone.
  • the refrigerator control interface displayed on the phone is now the same as the display interface on the gateway display.
  • the user can set the temperature and time of the refrigerator through the refrigerator control interface on the mobile phone, and the operation message of the user on the refrigerator control interface of the mobile phone will be first sent to the gateway and converted by the refrigerator control module of the gateway into a control command for the refrigerator, and finally Send control commands to the refrigerator through the gateway.
  • the capability open platform of the embodiment of the present invention is configured to identify a terminal device that is not connected to the gateway according to the label information uploaded by the gateway, and implement the plug-and-play operation of the gateway device that does not support the terminal device.
  • the identification of the terminal device that does not access the gateway is performed by using the label information, so that the gateway can identify the device type of the terminal device that is not supported by the gateway but needs to be accessed, so as to be compatible with the insertion and insertion of all the terminal devices. Manage and provide services immediately.

Abstract

本发明公开了一种实现终端设备即插即用管理的能力开放平台、设备识别方法及网关,其中,该平台用于根据网关上传的标签信息对未接入网关的终端设备进行识别,实现网关对不支持终端设备的即插即用。该方法包括:网关通过终端授权机制来获取终端设备的标签信息,调用能力开放平台的设备识别服务识别未接入网关的终端设备。采用本发明,使网关能够识别网关自身支持协议之外但需要接入的终端设备的设备类型,以便兼容对所有终端设备的即插即用管理和提供服务。

Description

实现终端设备即插即用管理的能力开放平台、 方法及网关 技术领域
本发明涉及物联网中接入终端设备管理的技术, 尤其涉及一种实现终 端设备即插即用管理的能力开放平台、 设备识别方法及网关。 背景技术
物联网中一大难题就是终端设备协议和标准繁多, 各终端设备厂家、 联盟和组织都制定了各自的通信协议和标准, 这为物联网网关 (例如家庭 网关) 实现终端设备的接入和管理等带来了巨大的困难。 更糟糕的是在物 联网应用中设备具有高移动性特点, 例如某人去朋友家串门时可能随身携 带血压监测仪、 血糖监测仪等便携设备, 这使得物联网网关需要随时面对 各种新设备的接入。 随着物联网应用的发展, 物联网网关已经不单只是实 现终端设备的接入和数据传输而是成为实现设备接入、 管理、 控制和服务 的本地控制中心, 例如现有的高档物联网家庭网关已经带有触屏控制界面, 在网关界面上会显示家庭内各种设备的运行状态并且通过网关控制界面可 以控制家庭内的照明、 空调和电视等设备。
显然为了实现所有设备的接入、 管理、 控制和服务而在一个网关中实 现成百上千种并且还在不断增加中的协议是不可行的。 而现有的网关一般 都只实现一种或少数几种协议, 对于采用其它协议的设备将不能接入网关 和被网关控制。 例如中国移动在宜居通应用中推出的物联网家庭网关, 其 网关只支持满足中移制定的 WMMP协议的终端设备接入和控制,用户通过 网关可以查看家庭门窗开关情况、 控制空调和进行家庭布 /撤防。 其中, 所 述 WMMP 协议是中国移动为规范物联网终端与机器到机器 (M2M, Machine-to-Machine )平台间的数据通信、 实现 M2M平台对物联网终端的 统一管理而制订的规范。 M2M 用来表示机器对机器之间的连接与通信, M2M是物联网的构成基础。
综上所述, 为了解决上述设备协议和标准繁多难题, 通过对网关应用 场景进行分析可以发现。 从宏观上看物联网网关需要实现成百上千种不同 协议, 但从微观上看单个网关在应用中同时只需要支持几种或十几种协议, 这是单台网关能力所能够实现的。 所以解决协议和标准繁多难题的关键就 是实现网关能够动态的根据其有效范围内需要接入和控制的设备类型加载 需要的模块来实现设备的即插即用。 而要实现设备即插即用其中一个重点 就是找到一种可用性好的方法使得网关能够识别其需要接入的设备类型, 然而目前并未有这样的方案。 发明内容
有鉴于此, 本发明实施例的主要目的在于提供一种实现终端设备即插 即用管理的能力开放平台、 设备识别方法及网关, 使网关能够识别网关自 身支持协议之外但需要接入的终端设备的设备类型, 以便兼容对所有终端 设备的即插即用管理和提供服务。
为达到上述目的, 本发明实施例的技术方案是这样实现的:
一种实现终端设备即插即用管理的能力开放平台, 所述能力开放平台 配置为根据网关上传的标签信息对未接入网关的终端设备进行识别, 实现 网关对不支持终端设备的即插即用。
其中, 所述能力开放平台包括设备识别服务单元, 配置为根据网关上 传的未接入网关的终端设备的标签信息识别出所述未接入网关的终端设备 的设备类型, 并结合网关自身信息匹配出网关进行设备识别、 管理和服务 所需的模块和文件, 将所需的模块和文件或者所需的模块和文件的下载地 址反馈给所述网关。
其中, 所述能力开放平台还包括认证服务单元、 标签信息注册服务单 元、 地址注册服务单元、 上传服务单元; 其中,
所述认证服务单元, 配置为对终端设备的厂商进行认证, 认证成功后 进行注册、 上传和下载服务;
所述标签信息注册服务单元, 配置为对终端设备的标签信息进行注册; 所述地址注册服务单元, 配置为对网关进行设备识别、 管理和服务所 需的模块和文件的下载地址进行注册;
所述上传服务单元, 配置为提供对网关进行设备识别、 管理和服务所 需的模块和文件的上传服务。
一种实现终端设备即插即用管理的设备识别方法, 该方法包括: 网关 通过终端授权机制来获取终端设备的标签信息, 调用能力开放平台的设备 识别服务识别未接入网关的终端设备。
其中, 所述网关通过终端授权机制来获取终端设备的标签信息为: 已 接入网关的终端设备具备标签信息读取能力, 所述网关通过对所述已接入 网关的终端设备进行授权, 由已授权终端设备读取未接入网关的终端设备 的标签信息来获取终端设备的标签信息。
其中, 所述识别未接入网关的终端设备为: 已授权终端设备将读取的 未接入网关的终端设备的标签信息发送给网关, 网关收到已授权终端设备 发送的标签信息后将调用能力开放平台的设备识别服务, 网关上传给能力 开放平台的数据至少包括获得的未接入网关的终端设备的标签信息和网关 自身信息。
其中, 所述标签信息包括: 条形码、 二维码、 射频识别 RFID标签中的 任意一种信息。
其中, 网关调用能力开放平台的设备识别服务后, 该方法还包括: 能力开放平台获取所述网关上传的所述未接入网关的终端设备的标签 信息和网关自身信息; 能力开放平台根据所述未接入网关的终端设备的标签信息识别出未接 入网关的终端设备的设备类型后, 结合所述设备类型和所述网关自身信息 匹配出网关进行设备识别、 管理和服务所需的模块和文件, 将所需的模块 和文件或者所需的模块和文件的下载地址反馈给所述网关。
其中, 该方法还包括: 所述网关直接根据所述所需的模块和文件执行 设备识别、 管理和服务; 或者,
所述网关先根据所述下载地址下载到所述所需的模块和文件, 再执行 设备识别、 管理和服务。
一种实现终端设备即插即用管理的网关, 所述网关包括: 设备授权模 块、 设备识别模块、 可扩展框架; 其中,
所述设备授权模块, 配置为授权外部设备作为网关的标签信息采集设 备, 还配置为实现设备的授权、 撤销授权并维护授权信息;
所述设备识别模块, 配置为调用能力开放平台的设备识别服务并将获 得的终端设备的标签信息和网关自身信息发送给能力开放平台;
所述可扩展框架, 配置为使网关通过可扩展框架动态加载下载的模块 来实现功能扩展。
其中, 所述标签信息包括: 条形码、 二维码、 RFID标签中的任意一种 信息。
其中, 所述网关还包括: 无线模块、 下载模块、 下载管理模块; 其中, 所述无线模块, 配置为以包括 Wifi、 蓝牙、 Zigbee、 RF433、 RF779或 红外中至少一种无线通讯方式与被授权的外部设备进行交互, 实现对外部 设备的授权和条形码、 二维码或 RFID的接收;
下载模块, 配置为根据能力开放平台反馈的下载地址从外网下载实现 终端设备管理和服务所需的模块或文件;
下载管理模块, 配置为管理从外网下载的模块或文件; 下载管理模块, 还配置为根据策略保存或删除所下载的模块或文件。
一种实现终端设备即插即用管理的网关, 所述网关包括: 带摄像头的 标签读取模块、 设备识别模块、 可扩展框架; 其中,
所述带摄像头的标签读取模块通过无线方式与网关主机相连接具有很 好的移动性, 配置为读取标签信息并以无线方式发送所述标签信息;
所述设备识别模块, 配置为调用能力开放平台的设备识别服务并将获 得的终端设备的标签信息和网关自身信息发送给能力开放平台;
所述可扩展框架, 配置为使网关通过可扩展框架动态加载下载的模块 来实现功能扩展。
其中, 所述标签信息包括: 条形码、 二维码、 RFID标签中的任意一种 信息。
其中, 所述网关还包括: 无线模块、 下载模块、 下载管理模块; 其中, 所述无线模块, 配置为以包括 Wifi、 蓝牙、 Zigbee、 RF433、 RF779或 红外中至少一种无线通讯方式与被授权的外部设备进行交互, 实现对外部 设备的授权和条形码、 二维码或 RFID的接收;
下载模块, 配置为根据能力开放平台反馈的下载地址从外网下载实现 终端设备管理和服务所需的模块或文件;
下载管理模块, 配置为管理从外网下载的模块或文件; 下载管理模块, 还配置为根据策略保存或删除所下载的模块或文件。
本发明实施例的能力开放平台配置为根据网关上传的标签信息对未接 入网关的终端设备进行识别, 实现网关对不支持终端设备的即插即用。 采 用本发明实施例, 通过标签信息进行未接入网关的终端设备的识别, 使网 关能够识别网关自身支持协议之外但需要接入的终端设备的设备类型, 以 便兼容对所有终端设备的即插即用管理和提供服务。 附图说明
图 1为本发明实施例能力开放平台的组成结构示意图;
图 2为本发明方法实施例的实现流程示意图;
图 3为本发明网关一实施例的组成结构示意图;
图 4为本发明网关另一实施例的组成结构示意图;
图 5为本发明实施例能力开放平台和网关的交互时的网络架构示意图; 图 6为本发明实施例基于能力开放平台对外交互的示意图;
图 7为本发明一实例的设备 C通过网关对设备 B进行控制的流程图。 具体实施方式
在本发明实施例中: 网关通过终端授权机制来获取终端设备的标签信 息, 调用能力开放平台的设备识别服务识别未接入网关的终端设备。
以下简单对本发明的方案及其优越性做一总结描述, 后续再对方案具 体阐述。
由于条形码、 二维码和射频识别( RFID )标签越来越多的被用户使用, 这些标签信息的应用技术都可以作为终端设备的唯一标识, 而且智能终端 已经具有条形码和二维码的扫描功能, 不久的将来, 智能终端还会普及 RFID标签读取能力, 可以说除了现有的智能手机这种终端设备之外, 只要 具有摄像头的设备都可以配置为读取条形码、 二维码, 因此, 利用条形码、 二维码和射频识别 (RFID )标签这些标签信息的应用技术成为可能, 且例 如广泛使用的智能手机等移动设备, 相比位置固定的物联网网关设备具有 不受位置限制和使用方便的优势。
一、 本发明实施例中, 一种利用标签信息识别未接入网关的终端设备 的方案为: 网关授权具有标签信息读取能力的且已经接入网关的终端设备 作为替代网关进行标签信息采集的设备, 通过该具有标签信息读取能力的 且已经接入网关的终端设备进行其他未接入网关的终端设备的识别 (可以 由该具有标签信息读取能力的且已经接入网关的终端设备读取其他未接入 网关的终端设备的条形码、二维码或 RFID标签信息, 并将读取的标签信息 发给网关, 网关根据该标签信息实现对其他未接入网关的终端设备的识 别), 进而对识别的设备进行诸如接入和控制的管理及提供服务势必会大的 提高本方案的易用性, 这里, 带标签信息读取能力的、 已经接入网关的终 端设备实际上是网关目前能支持协议的设备, 这样, 通过有限的、 网关目 前能支持协议的设备通过标签信息对更多的不支持目前网关协议的设备进 行识别, 从而使网关能够识别网关自身支持协议之外但需要接入的终端设 备的设备类型, 以便兼容对所有终端设备的即插即用管理和提供服务, 而 且这种方案对网关自身没有改动, 减少了修改网关的制造成本。
二、 本发明实施例还有一种利用标签信息识别未接入网关的终端设备 的方案, 是对网关自身进行改动, 增加了网关的标签信息读取能力, 也可 以达到方案一区别于现有技术的优越性, 即: 通过有限的、 网关目前能支 持协议的设备通过标签信息对更多的不支持目前网关协议的设备进行识 别, 从而使网关能够识别网关自身支持协议之外但需要接入的终端设备的 设备类型, 以便兼容对所有终端设备的即插即用管理和提供服务。 但是, 会额外增加修改网关的制造成本。
下面结合附图对技术方案的实施作进一步的详细描述。
图 1 为本发明实施例能力开放平台的组成结构示意图, 该能力开放平 台配置为根据网关上传的标签信息对未接入网关的终端设备进行识别。 具 体的, 该能力开放平台如图 1 所示, 包括设备识别服务单元、 认证服务单 元、 标签信息注册服务单元、 地址注册服务单元、 上传服务单元。 通过这 些单元, 能力开放平台能提供设备识别服务、 厂商认证服务、 标签信息注 册服务、 模块和文件下载地址注册服务、 模块和文件上传服务。
设备识别服务单元配置为根据网关上传的未接入网关的终端设备的标 签信息识别出未接入网关的终端设备的设备类型, 并结合所述设备类型和 所述网关上传的网关自身信息 (例如网关型号、 软件版本号等) 匹配出网 关进行设备识别、 管理和服务所需的模块和文件, 将该所需的模块和文件 直接反馈给网关、 或者将该所需的模块和文件的下载地址反馈给网关, 由 网关后续根据下载地址自行下载模块和文件, 优选是将下载地址反馈给网 关的方式。 其中, 所述网关进行设备识别、 管理和服务所需的模块和文件 包括网关所需的接入协议模块、 管理模块、 设备控制模块、 控制界面和服 务模块和文件。 同时, 设备识别服务单元还会反馈设备基本信息描述文件 给网关。
认证服务单元配置为对终端设备的厂商进行认证, 通过认证的厂商可 以注册标签信息、 注册网关所需模块或文件下载地址以及上传网关所需模 块或文件到公共下载服务器, 认证成功后才能进行注册、 上传和下载服务。
标签信息注册服务单元配置为对终端设备的标签信息进行注册。 注册 的标签信息将作为对终端设备进行识别的唯一依据。
地址注册服务单元配置为对网关进行设备识别、 管理和服务所需的模 块和文件的下载地址进行注册。 由于一些对终端设备接入或管理的模块和 文件, 是由各个厂商提供和维护的, 因此, 厂商通过此项单元提供的地址 注册服务将模块或文件的下载地址注册到能力开放平台, 能力开放平台再 将注册的下载地址反馈给需要的网关。
上传服务单元配置为提供对网关进行设备识别、 管理和服务所需的模 块和文件的上传服务。 上传的模块和文件统一部署到公共下载服务器, 并 由能力开放平台将模块和文件的下载地址反馈给需要的网关。
图 2为本发明方法实施例的实现流程示意图, 如图 2所示, 该方法包 括以下步骤:
步骤 101, 网关对设备 A授权。 这里, 授权的设备 A可以是带摄像头的终端设备, 如具有条形码读取 功能、二维码读取功能或 RFID标签读取功能的带摄像头的手机。授权成功 后设备 A发送给网关的条形码、 二维码或 RFID等标签信息将作为网关下 载所需模块或文件的依据; 对于未授权设备或已撤销授权的设备发送的标 签信息, 网关只作为普通数据处理。
这里, 网关对设备 A的授权实现可以通过:
方式一, 设备 A上预先安装授权应用程序, 授权流程可以由网关的设 备授权模块或设备 A的授权应用程序发起。 以设备 A发起授权为例, 设备 A发送授权请求给网关同时携带设备 A基本信息; 网关设备授权模块根据 设备 A的请求信息判断是否同意授权; 如果同意授权则网关设备授权模块 发送授权确认信息同时携带会话密钥; 设备 A接收到网关发送的授权确认 信息后授权流程结束, 后续将发送采用会话密钥加密的标签数据。 在授权 有效期内设备 A发送给网关的标签信息将作为网关下载所需模块或文件的 依据。
方式二, 要求设备 A能够提供标签读取服务, 网关选择设备 A作为授 权设备; 网关设备授权模块记录授权关系和授权信息并调用设备 A标签读 取服务; 设备 A接收到网关请求后会将读取的标签信息发送给网关; 在授 权有效期内设备 A发送给网关的标签信息将作为网关下载所需模块或文件 的依据。
步骤 102, 设备 A读取设备 B的条形码、 二维码或 RFID标签信息并 将信息发送给网关。
步骤 103, 网关根据设备 B的标签信息调用能力开放平台的设备识别 服务。
这里, 网关接收到设备 B的标签信息后将知道设备 B为需要接入、 管 理、 控制或服务的设备。 网关调用外网的能力开放平台的设备识别服务并 将设备 B的标签信息和网关自身信息发送给能力开放平台。
步骤 104, 能力开放平台反馈网关所需的模块或文件下载地址。
这里, 能力开放平台根据网关发送的设备 B标签信息和网关信息匹配 网关所需的模块或文件。 能力开放平台反馈的内容包括: 网关实现设备 B 接入的协议模块或文件的下载地址、 实现设备 B管理和控制的模块或文件 下载地址、 实现对设备 B控制的控制界面所需的模块或文件下载地址、 为 设备 B提供服务所需的模块或文件的下载地址以及设备 B的基本信息描述 文件。
这里, 能力开放平台优选采用反馈下载地址而非直接反馈所需模块或 文件的好处是: 一方面考虑到网络流量因素, 是否下载以及何时下载将由 网关决定; 另一方面考虑到实际的应用场景中某些模块是由终端设备厂商 提供和维护, 设备厂商通过将下载地址注册到能力开放平台然后由平台对 外统一提供服务, 平台根据网关请求将下载地址反馈给网关, 网关再从厂 商的服务器中下载所需模块或文件。
步骤 105, 网关根据能力开放平台反馈的地址下载所需的模块或文件。 这里, 网关根据能力开放平台反馈的下载地址下载所需的模块或文件 (如步骤 104中涉及能力开放平台反馈的内容所述, 此处不做赘述)。 网关 可以保存能力开放平台反馈的下载地址、 从外网下载的软件模块或文件, 网关可以优先采用保存的下载地址、 软件模块或文件实现设备的接入、 管 理、 控制或服务。
步骤 106, 网关加载下载的模块或文件, 实现对设备 B的接入、 管理、 控制和服务。
这里, 网关实现设备接入的方式包括:
方式一, 网关加载下载的设备接入协议模块或文件后, 如果协议中包 括握手 (设备探寻)协议则网关通过主动发送握手请求(可每隔一段时间 发送一次握手请求)或监听设备发出的握手请求再根据协议完成握手过程 即可实现设备接入。
方式二, 对于协议中不含有握手 (设备探寻) 过程的, 当网关接收到 设备发出的数据包后网关根据收到的数据包协议头进行与下载的接入协议 的自动适配或者网关根据数据包的底层协议信息(例如 MAC地址)与下载 的设备基本信息描述文件进行接入协议的自动适配。如果读取的 RFID标签 信息中包括底层协议信息(例如 MAC地址 )也可根据接收到的数据包的底 层协议信息和 RFID中读取的信息进行协议的自动适配。
方式三, 对于上述两种方式不能进行协议自动适配或适配后匹配出多 个接入协议的, 网关在接收到设备发出的数据包后在界面中显示为未识别 设备, 此时用户只需将之前下载的模块(模块在界面中显示信息包括设备 基本信息, 例如厂商, 产品名称等) 与未识别设备匹配即可, 匹配方式可 以是将下载的模块图标拖动到未识别设备上。 设备匹配后网关可以通过下 载的模块和记录的通信地址对设备进行管理和控制等。
图 3为本发明网关一实施例的组成结构示意图, 该网关配置为通过对 已接入网关的终端设备进行授权, 由已接入网关的终端设备读取未接入网 关的终端设备的标签信息, 实现对未接入网关的终端设备的识别。 其中, 已接入网关的终端设备具备标签信息读取能力。 具体的, 网关包括以下模 块:
设备授权模块: 网关的设备授权模块配置为授权外部设备作为网关的 标签信息采集设备, 设备授权模块还配置为实现设备的授权、 撤销授权并 维护授权信息。
设备识别模块: 网关的设备识别模块配置为请求能力开放平台的设备 识别服务并将获得的终端标签信息和网关自身信息发送给能力开放平台。
无线模块: 网关通过无线模块与被授权设备交互, 包括通过无线模块 实现设备的授权和设备条形码、二维码或 RFID标签信息的接收。无线模块 一般包括 Wifi、蓝牙、 Zigbee、 RF433、 RF779或红外等多种无线通讯方式。
可扩展框架: 网关通过可扩展框架动态加载所下载的模块来实现功能 扩展。可扩展框架可以选用 OSGI框架等。其中,所述 OSGi是 Open Service Gateway Initiative的缩写, 该技术是面向 Java的动态模型。 OSGi框架定义 了一个标准的、 面向组件的计算环境, 软件组件(bundle )可以从运行中被 安装、升级或者移除而不需要中断设备的操作。采用此 OSGi框架可以通过 从下载服务器中下载所需的 bundle从而实现终端设备的接入、 管理、 控制 和服务。
下载模块: 网关下载模块根据能力开放平台反馈的下载地址从外网下 载实现设备接入、 管理、 控制和服务所需的软件模块或文件。
下载管理模块: 下载管理模块管理从外网下载的软件模块或文件, 下 载管理模块可以根据策略保存或删除所下载的模块或文件。 例如根据设备 连接情况或下载的软件模块的使用情况决定是否删除相应模块或文件。
外网接口: 配置为连接外部网络, 一般地配置为连接互联网。
采用本网关的好处是: 网关采用了对具有标签读取能力的设备授权来 实现其它设备条形码、二维码或 RFID标签信息的获取,对网关改动小并且 充分利用网络中已有的设备(如手机) 来获取其它设备标签信息, 能更好 的降低网关的实现成本, 从而有利于其推广实施。 更进一步的, 利用本发 明实施例的网关所提出的方法不需要对现有终端设备进行改造, 需要的只 是设备上都会有的条形码、二维码或 RFID标签, 然后网关通过已有的无线 模块对手机等设备授权来实现设备标签信息的获取。 采用本发明实施例, 对现有设备改动小, 使得本发明实施例具有较高可行性; 从易用性考虑用 户只需要拿通过授权的手机等读取某个设备的条形码、二维码或 RFID标签 信息就能实现此设备的接入、 管理、 控制和对设备提供服务, 用户使用非 常方便。
图 4为本发明网关另一实施例的组成结构示意图, 该网关配置为读取 未接入网关的终端设备的标签信息, 实现对未接入网关的终端设备的识别。 其中, 网关自身具备标签信息读取能力。 具体的, 该网关包括以下模块: 带摄像头的标签读取模块: 网关中包括一个带摄像头的标签读取模块, 此模块可以读取设备的条形码和二维码信息并将信息通过天线发送给网关 的无线模块。
设备识别模块: 设备识别模块请求能力开放平台的设备识别服务并将 获得的终端标签信息和网关自身信息发送给能力开放平台。
无线模块: 网关通过无线模块与带摄像头的标签读取模块交互获取设 备的条形码、 二维码或 RFID标签信息。 无线模块一般包括 Wifi、 蓝牙、 Zigbee、 RF433、 RF779或红外等多种无线通讯方式。
可扩展框架: 网关通过可扩展框架动态加载所下载的模块来实现功能 扩展。 可扩展框架可以选用 OSGI框架等。
下载模块: 网关下载模块根据能力开放平台反馈的下载地址从外网下 载实现设备接入、 管理、 控制和服务所需的软件模块或文件。
下载管理模块: 下载管理模块管理从外网下载的软件模块或文件, 下 载管理模块可以根据策略保存或删除所下载的模块或文件。 例如根据设备 连接情况或下载的软件模块的使用情况决定是否删除相应模块或文件。
外网接口: 配置为连接外部网络, 一般地配置为连接互联网。
本网关区别于图 3 所示的网关, 没有设备授权模块, 与前述方法不同 就是不需要设备授权流程, 但是网关自身带有标签读取能力, 通过带摄像 头的标签读取模块实现。
综上所述, 采用上述网关的两种实现方式, 无论哪种方式, 都可以解 决终端设备的即插即用, 从而解决设备协议和标准繁多的问题, 使网关能 够识别网关自身支持协议之外但需要接入的终端设备的设备类型, 以便兼 容对所有终端设备的即插即用管理和提供服务。
图 5为本发明实施例能力开放平台和网关的交互时的网络架构示意图, 该网络架构包括以下模块:
网关: 实现各种协议设备的接入, 还提供对接入设备的管理、 控制并 为设备提供所需要的服务。 本系统中网关向下实现各种设备的接入, 向上 实现与能力开放平台的交互接口。
设备 A: 已经接入网关的设备, 具有条形码、 二维码或 RFID标签读取 能力。
设备 B: 未接入网关的设备, 由于网关不支持其协议所以未能接入网 关更不能被网关管理、 控制和服务。
能力开放平台: 能力开放平台提供设备识别服务、 厂商认证服务、 标 签信息注册服务、 模块和文件下载地址注册服务、 模块和文件上传服务。
公共下载服务器: 提供网关所需模块或文件的下载服务, 公共下载服 务器接收厂商下载服务器上传的模块或文件。
厂商下载服务器: 由各终端厂商提供和维护, 厂商下载服务器将模块 或文件的下载地址注册到能力开放平台或者直接将模块或文件直接上传到 公共下载服务器, 网关可以从厂商下载服务器下载所需的模块或文件。
图 6为本发明实施例基于能力开放平台对外交互的示意图, 能力开放 平台与公共下载服务器、 厂商下载服务器等交互为网关提供设备识别服务, 从而实现设备即插即用, 该交互流程包括:
步骤 201, 能力开放平台与厂商下载服务器交互, 厂商下载服务器通过 能力开放平台提供的接口注册设备标签信息、 模块或文件下载地址或者直 接将模块或文件上传到公共下载服务器。
步骤 202, 网关调用能力开放平台设备识别服务, 网关发送设备标签信 息和网关信息给平台。
步骤 203,能力开放平台反馈网关所需模块或文件下载地址以及设备基 本信息描述文件。
步骤 204,网关通过平台反馈的下载地址从公共下载服务器或厂商下载 服务器下载所需的模块或文件。
本发明实施例网关还可以将设备 B的控制界面发送给设备 C, 使得设 备 C中能够通过此控制界面对设备 B进行控制。 图 7为本发明实施例设备 C通过网关对设备 B进行控制的一实例的流程图, 包括: 一、 将设备 B的 控制界面发送给设备 C (设备 C可以是手机、 平板电脑等并且设备 C可以 与设备 A相同); 二、用户在设备 C的控制界面上的操作消息将首先发送给 网关; 三、 网关将收到的操作消息转换为本地操作消息; 四、 网关调用下 载的设备 B的控制模块, 并生成满足设备 B的控制协议的设备控制命令; 五、 网关通过网关的无线接口(例如: Wifi、蓝牙、 Zigbee、 RF433、 RF779、 红外等)发送设备控制命令给设备 B; 六、 设备 B返回执行结果。
以下为本发明实施例的一个物联网家庭应用的应用实例。
在物联网家庭应用中, 家庭内已经部署了网关并且网关与外网相连, 家庭成员拥有的手机已经连接到网关。 这时家庭内新添置的冰箱采用的是 厂家自有协议, 而网关支持中国电信的 MDMP协议, 网关需要能实现冰箱 的接入、 能够对其进行管理和控制并支持冰箱到 MDMP协议的转换从而实 现冰箱与家里其它家电的通信, 包括以下步骤:
步骤 301, 网关对手机授权。
手机通过 Wifi与网关相连; 预先在手机上安装需要的应用软件, 在软 件中选择授权选项, 手机将向网关发送授权请求包并附带手机型号信息; 网关接收到授权请求包后在界面中显示接收到授权请求, 同时显示发起授 权请求的设备信息 (手机型号) 并询问是否同意授权; 用户在网关人机界 面中选择同意授权; 网关记录授权信息并反馈授权成功消息和会话密钥给 手机; 手机接收到授权确认信息后整个授权流程结束。 手机被授权后其发 送给网关的设备标签信息将作为网关下载所需模块的依据, 而对于未授权 设备或已撤销授权的设备其发送给网关的标签信息网关只作为普通数据处 理。
步骤 302, 手机读取需要接入的冰箱二维码并将二维码信息发送给网 关。
选择手机应用软件上的扫描二维码选项并将手机摄像头靠近冰箱的二 维码。 手机通过摄像头读取冰箱上的二维码信息并将信息通过前面的会话 密钥加密后发送给网关。
步骤 303,网关根据获得的冰箱二维码信息从能力开放平台获得所需模 块下载地址。 网关收到冰箱二维码信息调用能力开放平台发送设备识别服 务并将冰箱二维码信息和网关设备型号发送给能力开放平台。
步骤 304,能力开放平台根据冰箱二维码信息和网关型号匹配网关所需 的软件模块并将软件模块的下载地址反馈给网关。
反馈的信息具体包括: 冰箱所采用协议的设备接入模块下载地址、 基 于冰箱所采用协议的设备管理模块下载地址、冰箱所采用协议到 M2M终端 监测控制协议(MDMP, M2M Device Management Protocol )转换模块的下 载地址、 由冰箱厂商提供的冰箱控制界面下载地址和冰箱基本信息描述 XML文件。
步骤 305, 网关从下载服务器中下载所需模块。 网关根据能力开放平台 反馈的下载地址分别从公共下载服务器和厂商维护的下载服务器中下载所 需模块。 网关从公共下载服务器中下载设备接入模块和到 MDMP协议的转 换模块, 从厂商提供的下载服务器中下载冰箱管理 /控制模块和控制界面。
步骤 306, 网关加载所下载的模块实现冰箱的接入、管理、控制和服务。 网关所下载的模块采用 bundle封装。 网关通过自身的 OSGI框架加载所下 载的 bundles 实现网关功能的扩展。 bundle加载完成后网关通过设备接入 bundle发送设备探寻包, 冰箱接收到探寻包后反馈相应信息完成通信握手。 用户可以通过网关上加载的冰箱控制界面 bundle对冰箱进行控制, 包括设 置温度和时间等。
步骤 307,在手机应用程序中选择家电控制功能并选择需要控制的冰箱 设备。 网关将所选择冰箱的控制界面 bundle发送给手机。 现在手机上显示 的冰箱控制界面与网关显示器上的显示界面相同。 用户可以通过手机上的 冰箱控制界面对冰箱的温度和时间进行设置, 用户在手机的冰箱控制界面 上的操作消息将首先发送给网关并由网关的冰箱控制模块转换为对冰箱的 控制命令, 最终通过网关将控制命令发送给冰箱。
以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的保 护范围。 工业实用性
本发明实施例的能力开放平台配置为根据网关上传的标签信息对未接 入网关的终端设备进行识别, 实现网关对不支持终端设备的即插即用。 采 用本发明实施例, 通过标签信息进行未接入网关的终端设备的识别, 使网 关能够识别网关自身支持协议之外但需要接入的终端设备的设备类型, 以 便兼容对所有终端设备的即插即用管理和提供服务。

Claims

权利要求书
1、 一种实现终端设备即插即用管理的能力开放平台, 所述能力开放平 台配置为根据网关上传的标签信息对未接入网关的终端设备进行识别, 实 现网关对不支持终端设备的即插即用。
2、 根据权利要求 1所述的能力开放平台, 其中, 所述能力开放平台包 括设备识别服务单元, 配置为根据网关上传的未接入网关的终端设备的标 签信息识别出所述未接入网关的终端设备的设备类型, 并结合网关自身信 息匹配出网关进行设备识别、 管理和服务所需的模块和文件, 将所需的模 块和文件或者所需的模块和文件的下载地址反馈给所述网关。
3、 根据权利要求 2所述的能力开放平台, 其中, 所述能力开放平台还 包括认证服务单元、 标签信息注册服务单元、 地址注册服务单元、 上传服 务单元; 其中,
所述认证服务单元, 配置为对终端设备的厂商进行认证, 认证成功后 进行注册、 上传和下载服务;
所述标签信息注册服务单元, 配置为对终端设备的标签信息进行注册; 所述地址注册服务单元, 配置为对网关进行设备识别、 管理和服务所 需的模块和文件的下载地址进行注册;
所述上传服务单元, 配置为提供对网关进行设备识别、 管理和服务所 需的模块和文件的上传服务。
4、 一种实现终端设备即插即用管理的设备识别方法, 该方法包括: 网 关通过终端授权机制来获取终端设备的标签信息, 调用能力开放平台的设 备识别服务识别未接入网关的终端设备。
5、 根据权利要求 4所述的方法, 其中, 所述网关通过终端授权机制来 获取终端设备的标签信息为: 已接入网关的终端设备具备标签信息读取能 力, 所述网关通过对所述已接入网关的终端设备进行授权, 由已授权终端 设备读取未接入网关的终端设备的标签信息来获取终端设备的标签信息。
6、 根据权利要求 4所述的方法, 其中, 所述识别未接入网关的终端设 备为: 已授权终端设备将读取的未接入网关的终端设备的标签信息发送给 网关, 网关收到已授权终端设备发送的标签信息后将调用能力开放平台的 设备识别服务, 网关上传给能力开放平台的数据至少包括获得的未接入网 关的终端设备的标签信息和网关自身信息。
7、 根据权利要求 4、 5或 6所述的方法, 其中, 所述标签信息包括: 条形码、 二维码、 射频识别 RFID标签中的任意一种信息。
8、 根据权利要求 4所述的方法, 其中, 网关调用能力开放平台的设备 识别服务后, 该方法还包括:
能力开放平台获取所述网关上传的所述未接入网关的终端设备的标签 信息和网关自身信息;
能力开放平台根据所述未接入网关的终端设备的标签信息识别出未接 入网关的终端设备的设备类型后, 结合所述设备类型和所述网关自身信息 匹配出网关进行设备识别、 管理和服务所需的模块和文件, 将所需的模块 和文件或者所需的模块和文件的下载地址反馈给所述网关。
9、 根据权利要求 8所述的方法, 其中, 该方法还包括: 所述网关直接 根据所述所需的模块和文件执行设备识别、 管理和服务; 或者,
所述网关先根据所述下载地址下载到所述所需的模块和文件, 再执行 设备识别、 管理和服务。
10、 一种实现终端设备即插即用管理的网关, 所述网关包括: 设备授 权模块、 设备识别模块、 可扩展框架; 其中,
所述设备授权模块, 配置为授权外部设备作为网关的标签信息采集设 备, 还配置为实现设备的授权、 撤销授权并维护授权信息;
所述设备识别模块, 配置为调用能力开放平台的设备识别服务并将获 得的终端设备的标签信息和网关自身信息发送给能力开放平台; 所述可扩展框架, 配置为使网关通过可扩展框架动态加载下载的模块 来实现功能扩展。
11、根据权利要求 10所述的网关, 其中, 所述标签信息包括: 条形码、 二维码、 RFID标签中的任意一种信息。
12、根据权利要求 10所述的网关, 其中, 所述网关还包括: 无线模块、 下载模块、 下载管理模块; 其中,
所述无线模块, 配置为以包括 Wifi、 蓝牙、 Zigbee、 RF433、 RF779或 红外中至少一种无线通讯方式与被授权的外部设备进行交互, 实现对外部 设备的授权和条形码、 二维码或 RFID的接收;
下载模块, 配置为根据能力开放平台反馈的下载地址从外网下载实现 终端设备管理和服务所需的模块或文件;
下载管理模块, 配置为管理从外网下载的模块或文件; 下载管理模块, 还配置为根据策略保存或删除所下载的模块或文件。
13、 一种实现终端设备即插即用管理的网关, 所述网关包括: 带摄像 头的标签读取模块、 设备识别模块、 可扩展框架; 其中,
所述带摄像头的标签读取模块通过无线方式与网关主机相连接具有很 好的移动性, 配置为读取标签信息并以无线方式发送所述标签信息;
所述设备识别模块, 配置为调用能力开放平台的设备识别服务并将获 得的终端设备的标签信息和网关自身信息发送给能力开放平台;
所述可扩展框架, 配置为使网关通过可扩展框架动态加载下载的模块 来实现功能扩展。
14、根据权利要求 13所述的网关, 其中, 所述标签信息包括: 条形码、 二维码、 RFID标签中的任意一种信息。
15、根据权利要求 13所述的网关, 其中, 所述网关还包括: 无线模块、 下载模块、 下载管理模块; 其中,
所述无线模块, 配置为以包括 Wifi、 蓝牙、 Zigbee、 RF433、 RF779或 红外中至少一种无线通讯方式与被授权的外部设备进行交互, 实现对外部 设备的授权和条形码、 二维码或 RFID的接收;
下载模块, 配置为根据能力开放平台反馈的下载地址从外网下载实现 终端设备管理和服务所需的模块或文件;
下载管理模块, 配置为管理从外网下载的模块或文件; 下载管理模块, 还配置为根据策略保存或删除所下载的模块或文件。
PCT/CN2013/080240 2012-11-12 2013-07-26 实现终端设备即插即用管理的能力开放平台、方法及网关 WO2013178174A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US14/439,971 US20150295763A1 (en) 2012-11-12 2013-07-26 Capability open platform, method and gateway for implementing PNP management of terminal device
EP13796276.7A EP2919437A4 (en) 2012-11-12 2013-07-26 OPEN CAPACITY PLATFORM, METHOD AND GATEWAY FOR PLUG-AND-PLAY MANAGEMENT OF A TERMINAL

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210450307.2A CN103312760B (zh) 2012-11-12 2012-11-12 实现终端设备即插即用管理的能力开放平台、方法及网关
CN201210450307.2 2012-11-12

Publications (1)

Publication Number Publication Date
WO2013178174A1 true WO2013178174A1 (zh) 2013-12-05

Family

ID=49137543

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/080240 WO2013178174A1 (zh) 2012-11-12 2013-07-26 实现终端设备即插即用管理的能力开放平台、方法及网关

Country Status (4)

Country Link
US (1) US20150295763A1 (zh)
EP (1) EP2919437A4 (zh)
CN (1) CN103312760B (zh)
WO (1) WO2013178174A1 (zh)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104717225A (zh) * 2015-03-30 2015-06-17 中国联合网络通信集团有限公司 一种物联网网关接入认证方法及系统
CN104796966A (zh) * 2015-03-24 2015-07-22 广东欧珀移动通信有限公司 一种终端连接无线设备的方法及装置
CN107959621A (zh) * 2018-01-10 2018-04-24 洲际云智能科技(深圳)有限公司 一种用zigBee和RF433无线双频率控制的主控
CN111343020A (zh) * 2020-02-26 2020-06-26 杭州物源科技有限公司 多协议物联网设备的统一管理方法和装置
CN114513412A (zh) * 2021-12-30 2022-05-17 电子科技大学 物联网外设即插即用系统
CN115119286A (zh) * 2022-06-13 2022-09-27 京东科技信息技术有限公司 一种设备入网的方法和装置

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104426750A (zh) * 2013-09-11 2015-03-18 腾讯科技(深圳)有限公司 即时通信方法、设备及系统
US9372597B2 (en) * 2014-01-13 2016-06-21 General Electric Company Appliance systems providing user-friendly shared music playlist editing
US10601825B2 (en) * 2014-04-01 2020-03-24 Snowshoefood Inc. Methods for enabling real-time digital object and tangible object interactions
US10425414B1 (en) * 2015-08-31 2019-09-24 United Services Automobile Association (Usaa) Security platform
JP6766337B2 (ja) * 2015-10-27 2020-10-14 日本電気株式会社 ゲートウェイ装置、通信制御方法、通信制御システム、および、プログラム
CN105376309B (zh) * 2015-10-30 2021-08-13 青岛海尔智能家电科技有限公司 接入网关分配方法及装置
KR102403117B1 (ko) * 2016-02-22 2022-05-27 삼성전자주식회사 동글 및 그의 제어 방법
CN107239350B (zh) * 2016-03-28 2020-07-07 中国电信股份有限公司 用于调用网关能力的方法和系统
US20200304990A1 (en) * 2016-03-30 2020-09-24 Hewlett-Packard Development Company, L.P. Bluetooth device pairing
US10299091B2 (en) * 2016-06-22 2019-05-21 Intel Corporation Internet of things protocol handler
US11256828B1 (en) * 2016-07-05 2022-02-22 Wells Fargo Bank, N.A. Method and apparatus for controlling IoT devices by agent device
US11076024B2 (en) * 2016-12-27 2021-07-27 Intel Corporation Framework for IoT protocol identification and management
US10333733B2 (en) * 2017-03-20 2019-06-25 Vmware, Inc. Controlling proxy devices through a managed gateway
US10756924B2 (en) 2017-04-12 2020-08-25 Denso International America, Inc. System and method for encoding data within a vehicle communication network
GB2568871B (en) * 2017-11-23 2021-09-22 Advanced Risc Mach Ltd Devices and methods for control of internet of things (IoT) devices
JP7338475B2 (ja) * 2017-12-19 2023-09-05 ソニーグループ株式会社 端末管理装置及び端末装置
CN109995570A (zh) * 2018-01-02 2019-07-09 中国移动通信有限公司研究院 扩展未知类型终端的方法及装置、设备、存储介质
WO2019233442A1 (zh) * 2018-06-05 2019-12-12 Oppo广东移动通信有限公司 一种终端能力的获取方法及装置、计算机存储介质
US11481509B1 (en) 2018-07-10 2022-10-25 United Services Automobile Association (Usaa) Device management and security through a distributed ledger system
DE102018009911A1 (de) * 2018-12-17 2020-06-18 Giesecke+Devrient Mobile Security Gmbh Konnektierung eines Endgeräts
CN110662234A (zh) * 2019-09-29 2020-01-07 广州鲁邦通物联网科技有限公司 一种零apn配置的方法和系统
CN114584542A (zh) * 2020-11-18 2022-06-03 中移物联网有限公司 一种在通信模组集成物联卡服务能力的方法及系统
CN114006754A (zh) * 2021-10-29 2022-02-01 重庆长安汽车股份有限公司 一种防护api接口配置安全策略数据的方法及基于网关调用开放平台服务的方法及系统
CN114301941B (zh) * 2021-12-27 2024-03-22 广东电网有限责任公司 一种电力设备的管理方法、装置和存储介质
US20230308467A1 (en) * 2022-03-24 2023-09-28 At&T Intellectual Property I, L.P. Home Gateway Monitoring for Vulnerable Home Internet of Things Devices
CN115408329B (zh) * 2022-08-26 2023-07-25 上海玫克生储能科技有限公司 即插即用型边缘计算终端硬件系统架构

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309188A (zh) * 2008-03-27 2008-11-19 广州中国科学院工业技术研究院 射频设备的接入方法、接入服务器及射频设备的应用系统
CN101635642A (zh) * 2009-08-04 2010-01-27 中兴通讯股份有限公司 一种远程管理个人终端的方法及系统
CN101667926A (zh) * 2008-09-02 2010-03-10 中兴通讯股份有限公司 终端设备的远程管理方法和系统、代理设备
CN102223733A (zh) * 2011-04-08 2011-10-19 南京邮电大学 无线传感器网络下基于射频识别的智能园区方法

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5982282A (en) * 1998-09-16 1999-11-09 Sensormatic Electronics Corporation Product authentication indicia concealed in magnetomechanical EAS marker
US20020178241A1 (en) * 2001-04-03 2002-11-28 Par Eriksson Framework for a dynamic management system
JP4465353B2 (ja) * 2004-06-07 2010-05-19 日本電信電話株式会社 宅内ネットワーク設定方法、ホームゲートウェイ装置、ホームゲートウェイプログラム、記録媒体
US7904712B2 (en) * 2004-08-10 2011-03-08 Cisco Technology, Inc. Service licensing and maintenance for networks
US20070254634A1 (en) * 2006-04-27 2007-11-01 Jose Costa-Requena Configuring a local network device using a wireless provider network
WO2008082441A1 (en) * 2006-12-29 2008-07-10 Prodea Systems, Inc. Display inserts, overlays, and graphical user interfaces for multimedia systems
CN102301353A (zh) * 2009-11-30 2011-12-28 松下电器产业株式会社 便携型通信装置、通信方法、集成电路、程序
US20120044088A1 (en) * 2010-08-23 2012-02-23 Ricoh Americas Corporation Device management system, method and apparatus
EP2523107B1 (en) * 2011-04-19 2018-11-07 LG Electronics Inc. Mobile terminal and system for managing applications using the same
WO2013003813A1 (en) * 2011-06-30 2013-01-03 Lutron Electronics Co., Inc. Device and method of optically transmitting digital information from a smart phone to a load control device
US20140175165A1 (en) * 2012-12-21 2014-06-26 Honeywell Scanning And Mobility Bar code scanner with integrated surface authentication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309188A (zh) * 2008-03-27 2008-11-19 广州中国科学院工业技术研究院 射频设备的接入方法、接入服务器及射频设备的应用系统
CN101667926A (zh) * 2008-09-02 2010-03-10 中兴通讯股份有限公司 终端设备的远程管理方法和系统、代理设备
CN101635642A (zh) * 2009-08-04 2010-01-27 中兴通讯股份有限公司 一种远程管理个人终端的方法及系统
CN102223733A (zh) * 2011-04-08 2011-10-19 南京邮电大学 无线传感器网络下基于射频识别的智能园区方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2919437A4 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104796966A (zh) * 2015-03-24 2015-07-22 广东欧珀移动通信有限公司 一种终端连接无线设备的方法及装置
CN104717225A (zh) * 2015-03-30 2015-06-17 中国联合网络通信集团有限公司 一种物联网网关接入认证方法及系统
CN107959621A (zh) * 2018-01-10 2018-04-24 洲际云智能科技(深圳)有限公司 一种用zigBee和RF433无线双频率控制的主控
CN111343020A (zh) * 2020-02-26 2020-06-26 杭州物源科技有限公司 多协议物联网设备的统一管理方法和装置
CN114513412A (zh) * 2021-12-30 2022-05-17 电子科技大学 物联网外设即插即用系统
CN114513412B (zh) * 2021-12-30 2023-05-16 电子科技大学 物联网外设即插即用系统
CN115119286A (zh) * 2022-06-13 2022-09-27 京东科技信息技术有限公司 一种设备入网的方法和装置

Also Published As

Publication number Publication date
CN103312760B (zh) 2015-10-21
CN103312760A (zh) 2013-09-18
US20150295763A1 (en) 2015-10-15
EP2919437A4 (en) 2015-11-25
EP2919437A1 (en) 2015-09-16

Similar Documents

Publication Publication Date Title
WO2013178174A1 (zh) 实现终端设备即插即用管理的能力开放平台、方法及网关
US11395213B2 (en) Systems and methods for implementing multiple band service discovery
US9826438B2 (en) Electronic device and method for operating an electronic device
CN109150568B (zh) 一种网络管理方法、装置、系统、设备和存储介质
EP3484196B1 (en) Method and apparatus for registering wireless device in wireless communication system
CN102172009B (zh) 在利用通用即插即用的家庭网络中提供输入的方法和系统
WO2019206201A1 (zh) 一种配置文件传输方法及相关设备和存储介质
KR20100098260A (ko) 원격 사용자 인터페이스 디바이스를 제어하는 장치 및 방법
US11422786B2 (en) Method for interoperating between bundle download process and eSIM profile download process by SSP terminal
Koo et al. R-URC: RF4CE-based universal remote control framework using smartphone
US11695635B2 (en) Rapid install of IoT devices
KR20140117107A (ko) 근거리 통신용 태그를 이용한 사물 인터넷 서비스 실행 방법 및 시스템
KR102214940B1 (ko) 무선 통신 시스템에서 무선 기기 등록 방법 및 장치
JP2013085050A (ja) 無線接続方法ならびに装置および端末
CN113132997B (zh) 一种智能家居设备的通信方法、设备及系统
CN104797004A (zh) 主从设备间实现自动组网的方法
KR102390887B1 (ko) 무선 통신 시스템에서 무선 기기 등록 방법 및 장치
KR20140017427A (ko) 장치의 초기 구성 방법 및 초기 구성 기능을 구비한 장치
JP4866930B2 (ja) 通信システム、通信サーバ、アクセス制御方法、アクセス制御プログラム、およびアクセス制御プログラムを記録した記録媒体
CN113273231A (zh) 用于处理iSSP设备的eSIM配置文件的装置和方法
CN113455025A (zh) Ssp终端在捆绑包下载过程和esim配置文件下载过程之间进行互操作的方法
CN111263422A (zh) 一种发现智能设备的方法及装置
CN113728609A (zh) 用于提供捆绑包信息的方法和装置
JP2016181854A (ja) 宅内装置、サービス提供装置、システム、及びサービス提供方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13796276

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 14439971

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2013796276

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE