WO2017128276A1 - 网络建立方法、控制设备及节点 - Google Patents

网络建立方法、控制设备及节点 Download PDF

Info

Publication number
WO2017128276A1
WO2017128276A1 PCT/CN2016/072673 CN2016072673W WO2017128276A1 WO 2017128276 A1 WO2017128276 A1 WO 2017128276A1 CN 2016072673 W CN2016072673 W CN 2016072673W WO 2017128276 A1 WO2017128276 A1 WO 2017128276A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
control device
network connection
identification
authentication information
Prior art date
Application number
PCT/CN2016/072673
Other languages
English (en)
French (fr)
Inventor
郑少华
黎剑辉
张圳
朱一伟
罗海彬
湛浩
Original Assignee
丰唐物联技术(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 丰唐物联技术(深圳)有限公司 filed Critical 丰唐物联技术(深圳)有限公司
Priority to PCT/CN2016/072673 priority Critical patent/WO2017128276A1/zh
Publication of WO2017128276A1 publication Critical patent/WO2017128276A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Definitions

  • the present invention belongs to the field of Internet of Things, and in particular, to a network establishment method, a control device, and a node.
  • the purpose of the embodiments of the present invention is to provide a network establishment method, a control device, and a node, which are designed to complete the rights configuration of the control device and the node by using two authentications, so that the user can configure the rights of the node.
  • a network establishment method includes:
  • control device establishes a first network connection with the node, and transmits the first identification authentication information through the first network connection;
  • control device establishes a second network connection with the node according to the authentication of the first identification authentication information, where the second network connection is different from the first network connection;
  • control device and the node transmit the second identification authentication information by using the second network connection; [0009] the control device completes the relationship with the node according to the second identification authentication information. Rights Profile.
  • control device establishes the first network connection with the node includes: [0011] the control device establishes a network connection with the node by using short-range wireless communication;
  • control device establishes a network connection with the node by radio frequency identification
  • control device establishes a network connection with the node through a wireless fidelity/wireless fidelity protection setting; [0014] The control device establishes a network connection with the node through Z-wave or ZigBee.
  • the second identification authentication information includes:
  • the present invention also provides a network establishment method, where the method includes:
  • the node establishes a first network connection with the control device, and transmits the first identification authentication information through the first network connection;
  • the node establishes a second network connection with the control device according to the authentication of the first identification authentication information, where the second network connection is different from the first network connection;
  • the node and the control device transmit second identification authentication information through the second network connection; [0022] the node completes the relationship with the control device according to the second identification authentication information Rights Profile.
  • the manner in which the node establishes the first network connection with the control device includes: [0024] the node establishes a network connection with the control device by using short-range wireless communication;
  • the node and the control device establish a network connection by radio frequency identification
  • the node establishes a network connection with the control device through a wireless fidelity/wireless fidelity protection setting; [0027] the node establishes a network connection with the control device through Z-wave or ZigBee.
  • the second identification authentication information includes:
  • the present invention also provides a control device, where the control device includes:
  • a first communication module configured to establish a first network connection with the node
  • a first sending module configured to transmit, by using the first network connection, first identification authentication information
  • a second communication module configured to establish a second network connection with the node according to the authentication of the first identification authentication information, where the second network connection is different from the first network connection;
  • a second sending module configured to transmit, by using the second network connection, a second identification authentication f ⁇ information
  • a rights configuration module configured to complete a rights match with the node according to the second identification authentication information
  • the manner in which the control device establishes the first network connection with the node includes: [0038] the control device establishes a network connection with the node by using short-range wireless communication;
  • control device establishes a network connection with the node by radio frequency identification
  • control device establishes a network connection with the node through a wireless fidelity/wireless fidelity protection setting; [0041] the control device establishes a network connection with the node through Z-wave or ZigBee.
  • the second identification authentication information includes:
  • the present invention also provides a node, where the node includes:
  • a first communication module configured to establish a first network connection with the control device
  • a first sending module configured to transmit, by using the first network connection, first identification authentication information
  • a second communication module configured to establish, according to the authentication of the first identification authentication information, the second network connection with the control device, where the second network connection is different from the first network connection ;
  • a second sending module configured to transmit, by using the second network connection, the second identification authentication information with the control device
  • a second sending module configured to complete, according to the second identification authentication information, a right between the control device and the control device
  • the manner in which the node establishes the first network connection with the control device includes: [0052] the node establishes a network connection with the control device by using short-range wireless communication;
  • the node and the control device establish a network connection by radio frequency identification
  • the node establishes a network connection with the control device by using a wireless fidelity/wireless fidelity protection setting; [0055] the node establishes a network connection with the control device through Z-wave or ZigBee.
  • the second identification authentication information includes:
  • the present invention has the following effects: By controlling two authentications between the device and the node
  • the node is added to the network where the control device is located and the control device controls the node.
  • the configuration of the control device determines the mutual control relationship between the device and the node, and gives the control device control rights to the node, facilitating the user to operate the node. It is also convenient for users to add new nodes.
  • FIG. 1 is a flowchart of a network establishment method according to Embodiment 1 of the present invention.
  • FIG. 2 is a flowchart of a network establishment method according to Embodiment 2 of the present invention.
  • FIG. 3 is a functional block diagram of a control device according to Embodiment 3 of the present invention.
  • FIG. 4 is a functional block diagram of a node to which a node according to Embodiment 4 of the present invention is applied.
  • an embodiment of the present invention provides a network establishment method, where the method includes the following steps: [0067] Step S101: A control device establishes a first network connection with a node, and transmits the data through the first network connection. The first identifies the authentication information.
  • the establishment of the first network connection between the control device and the node may be established by using a short-range wireless communication technology, or may be established by using a radio frequency identification technology, or established by using a wireless fidelity/wireless fidelity protection setting.
  • the control device and the node are devices that support the Z-wave or igBee communication protocol, and the control device and the node can also establish a network connection with the node through Z-wave or ZigBee, and the specific establishment manner is based on the control device and the node.
  • Supported network connection mode or data transmission mode to select wherein a connection is established between the control device and the node, preferably established by short-range wireless communication technology, and after the control device establishes a network connection with the node, between the control device and the node
  • the data information can be transmitted through the established network connection.
  • the control device first activates the node.
  • the specific activation mode can be the control device writing the identifier touched by the control device or the network networking identifier, for example, when controlling Device and node support Z-wave or ZigBe e communication protocol device,
  • the control device writes the network identification information in the node, and then the control device can transmit the first identification authentication information to the node, and the first identification authentication information may specifically be the network access authority of the node and the control device to establish the second network connection, for example,
  • the node is added to the account and password of the network where the control device is located, or the node is added to the identity information of the network where the control device is located.
  • the control device can also be visualized. The user is prompted to complete the transmission of the first identification information, for example, by sound, light effect, or by means of visualized graphic and text display on the control device to prompt the user to complete the transmission of the first identification information.
  • Step S102 The control device establishes a second network connection with the node according to the authentication of the first identification authentication information, where the second network connection is different from the first network connection.
  • the control device After the authentication of the first identification authentication information, the control device establishes a second network connection with the node, and the second network connection may be that the control device can establish a connection with the node through the wired or wireless manner, such as a serial port. Communication technology, short-range wireless communication technology, radio frequency identification technology, wireless fidelity/wireless fidelity protection setting technology, Z-wave communication protocol, and ZigBee communication protocol, but the second network connection is different from the first network connection, that is, The first network connection is different from the network type of the second network connection.
  • Step S103 The second identification and authentication information is transmitted between the control device and the node through the second network connection.
  • the second identification authentication information may be device identification information of the node or the control device, or may be the key information of the node and/or the control device, and the device identification information may be hardware address information or device code identification information, where After the second identification and authentication information is transmitted between the control device and the node, the control device can also prompt the user to complete the transmission of the second identification information, for example, by sound, light effect, or by visualizing on the control device. The graphic and text display manners prompt the user to complete the transmission of the second identification information.
  • Step S104 The control device completes the rights configuration with the node according to the second identification authentication information.
  • the node needs to be added to the network where the control device is located, and the manner in which the node joins the network where the control device is located may be that the node joins the network where the control device is located according to the first identification information, and is specifically added according to different nodes of the first identification authentication information.
  • the method of controlling the network where the device is located may also be different.
  • the control device and the node may directly communicate through the same network or communicate through the server.
  • Control device and node After the communication connection is established, the control device first detects the node, and detects whether the node has been added to the network where the control device is located.
  • the detection mode may be to detect whether the node device stores the network identification information, if the node has joined the control device. In the network, no operation is performed. If there is no secondary identification and authentication with the node, in some cases, the control device can perform identification and authentication of the identity with the node through the second identification authentication information, because the control device and the node have Different functions, according to the second identification authentication information, can obtain the functions and rights respectively obtained by the node and the control device, and can complete the permission configuration between the control device and the node by acquiring the obtained functions and rights; in other cases
  • the reliable identification between the control device and the node may be completed by the second identification authentication information, and then the function and the permission between the control device and the node are obtained through reliable authentication, and then the control is completed according to the obtained function and authority. Permission configuration between the standby and the node.
  • the identification and authentication of the identity between the control device and the node through the second identification authentication information is also different, when the control device and the node pass the close distance
  • the network connection between the control device and the node is a direct connection
  • the identity identification can be completed separately at the control device or the node end, or at the two ends.
  • the identification authentication is completed, and when the control device and the node establish a network connection through the wireless fidelity/wireless fidelity protection setting, Z-wave or ZigBee, the network connection that can be used between the control device and the node can be a direct connection.
  • the identity identification can be completed at the control device or the node end and any single end of the server connected to the control device and the node, or through two or three ends. Identify the authentication, for example when completing the pair of nodes on the control device side After the authentication, the node transmits the second identification information back to the control device by controlling the network connection established between the device and the node, and the control device end identifies the node after confirming that the returned information is consistent with the second identification authentication information. Certification.
  • the permission configuration between the control device and the node is completed by using the second identification authentication information
  • the permission configuration between the control device and the node may be determined according to the master-slave relationship between the node and the control device.
  • the control device and the node may be determined according to the authority of the control device.
  • the rights configuration when the second identification authentication information is the key information of the node and/or the key information of the control device, may be determined according to the key of the node and/or the control device Controls the configuration of permissions between devices and nodes.
  • the node when the control device and the node establish a network connection with the node through Z-wave or ZigBee, when the control device and the node authenticate by the second identification authentication information and fail to pass the authentication, the node is restored and set. For example, restore the node to the factory settings, or delete the network information of the node.
  • the way to restore the factory settings to the node can be performed by the control device, or the node can restore the factory settings by itself, or by connecting with the control device and the node.
  • the server performs the factory resetting of the node.
  • control device and the node can also delete the network information of the node after the network connection is made through other means, and the network information of the node can also be deleted.
  • the network access information of the node of the wrong network is cleared, which is convenient for the user to perform the next network access operation.
  • Step S201 A node establishes a first network connection with a control device, and transmits the data through the first network connection.
  • the first identifies the authentication information.
  • the establishment of the first network connection between the control device and the node may be established by using a short-range wireless communication technology, or may be established by using a radio frequency identification technology, or established by using a wireless fidelity/wireless fidelity protection setting.
  • the control device and the node are devices that support the Z-wave or igBee communication protocol, and the control device and the node can also establish a network connection with the node through Z-wave or ZigBee, and the specific establishment manner is based on the control device and the node.
  • Supported network connection mode or data transmission mode to select wherein a connection is established between the control device and the node, preferably established by short-range wireless communication technology, and after the control device establishes a network connection with the node, between the control device and the node
  • the data information can be transmitted through the established network connection.
  • the control device first activates the node.
  • the specific activation mode can be the control device writing the identifier touched by the control device or the network networking identifier, for example, when controlling Device and node support Z-wave or ZigBe
  • the device of the e-communication protocol the control device writes the network identification information in the node, and then the control device can transmit the first identification authentication information to the node, and the first identification authentication information may specifically be that the node establishes a second network with the control device.
  • the access rights of the connection such as the account and password of the network where the node is added to the control device, or the identity information of the network where the node is added to the control device, where the control device and the node transmit the first identification authentication information
  • the control device You can also visualize the user to complete the first
  • the transmission of the identification information for example, by sound, light effect, or by visualizing the graphic or text display on the control device, prompts the user to complete the transmission of the first identification information.
  • Step S202 The node establishes a second network connection with the control device according to the authentication of the first identification authentication information, where the second network connection is different from the first network connection.
  • the control device After the authentication of the first identification authentication information, the control device establishes a second network connection with the node, and the second network connection may be that the control device can establish a connection with the node through the wired or wireless manner, such as a serial port. Communication technology, short-range wireless communication technology, radio frequency identification technology, wireless fidelity/wireless fidelity protection setting technology, Z-wave communication protocol, and ZigBee communication protocol, but the second network connection is different from the first network connection, that is, The first network connection is different from the network type of the second network connection.
  • Step S203 The second identification authentication information is transmitted between the node and the control device by using the second network connection.
  • the second identification authentication information may be device identification information of the node or the control device, or may be the key information of the node and/or the control device, and the device identification information may be hardware address information or device code identification information, where After the second identification and authentication information is transmitted between the control device and the node, the control device can also prompt the user to complete the transmission of the second identification information, for example, by sound, light effect, or by visualizing on the control device. The graphic and text display manners prompt the user to complete the transmission of the second identification information.
  • Step S204 The node completes the rights configuration with the control device according to the second identification authentication information.
  • the node needs to be added to the network where the control device is located, and the manner in which the node joins the network where the control device is located may be that the node joins the network where the control device is located according to the first identification information, and specifically joins according to different nodes of the first identification authentication information.
  • the method of controlling the network where the device is located may also be different.
  • the control device and the node may directly communicate through the same network or communicate through the server.
  • the control device After the control device establishes a communication connection with the node, the control device first detects the node, and detects whether the node has been added to the network where the control device is located.
  • the detection mode may be: detecting whether the node device stores the network identification information, if the node has joined When the control device is located in the network, no operation is performed. If there is no secondary identification and authentication with the node, in some cases, the control device can perform identification and authentication of the identity with the node through the second identification authentication information.
  • Control the functions of devices and nodes Differently, according to the second identification authentication information, the functions and rights respectively obtained by the node and the control device can be obtained, and the rights and permissions between the control device and the node can be completed by obtaining the obtained functions and rights; in other cases, The reliable authentication between the control device and the node is completed by the second identification authentication information, and then the function and the permission of the control device and the node are obtained through reliable authentication, and then the control device and the node are completed according to the obtained function and authority. Permission configuration between.
  • the identification and authentication of the identity between the control device and the node through the second identification authentication information is also different, when the control device and the node pass the close distance
  • the network connection between the control device and the node is a direct connection
  • the identity identification can be completed separately at the control device or the node end, or at the two ends.
  • the identification authentication is completed, and when the control device and the node establish a network connection through the wireless fidelity/wireless fidelity protection setting, Z-wave or ZigBee, the network connection that can be used between the control device and the node can be a direct connection.
  • the identity identification can be completed at the control device or the node end and any single end of the server connected to the control device and the node, or through two or three ends. Identify the authentication, for example when completing the pair of nodes on the control device side After the authentication, the node transmits the second identification information back to the control device by controlling the network connection established between the device and the node, and the control device end identifies the node after confirming that the returned information is consistent with the second identification authentication information. Certification.
  • the permission configuration between the control device and the node is different through the second identification authentication information
  • the permission configuration between the control device and the node may be determined according to the master-slave relationship between the node and the control device.
  • the control device and the node may be determined according to the authority of the control device.
  • Rights configuration when the second identification authentication information is the key information of the node and/or the key information of the control device, the authority configuration between the control device and the node may be determined according to the key of the node and/or the control device.
  • the node is restored and set. For example, restore the node to the factory settings, or delete the network information of the node.
  • the way to restore the factory settings to the node can be performed by the control device, or the node itself. Perform factory resetting, or perform factory resetting of the node through a server connected to the control device and the node. By resetting the node to the factory settings, the control device and the node are connected to each other through other means, and the secondary identification is not performed.
  • the network information of the node can also be deleted, so that the network access information of the node entering the wrong network is cleared, which is convenient for the user to perform the next network access operation.
  • an embodiment of the present invention provides a control device, including a first communication module 11, a first sending module 12, a second communication module 13, a second sending module 14, and a rights configuration module 15.
  • the first communication module 11 is configured to establish a first network connection with the node.
  • the first sending module 12 is configured to transmit the first identification authentication information by using the first network connection.
  • the establishment of the first network connection between the control device and the node may be established by using a short-range wireless communication technology, or may be established by using a radio frequency identification technology, or established by a wireless fidelity/wireless fidelity protection setting.
  • the control device and the node are devices that support the Z-wave or igBee communication protocol, and the control device and the node can also establish a network connection with the node through Z-wave or ZigBee, and the specific establishment manner is based on the control device and the node.
  • Supported network connection mode or data transmission mode to select wherein a connection is established between the control device and the node, preferably established by short-range wireless communication technology, and after the control device establishes a network connection with the node, between the control device and the node
  • the data information can be transmitted through the established network connection.
  • the control device first activates the node.
  • the specific activation mode can be the control device writing the identifier touched by the control device or the network networking identifier, for example, when controlling Device and node support Z- The device of the wave or the ZigBee communication protocol, the control device writes the network identification information in the node, and then the control device can transmit the first identification authentication information to the node, and the first identification authentication information may be the node and the control device.
  • the access rights of the network connection for example, the node joins the account and password of the network where the control device is located, or the node adds the identification information of the network where the control device is located, wherein after the control device and the node transmit the first identification authentication information,
  • the control device can also prompt the user to complete the transmission of the first identification information by visual means, for example, by prompting the user to complete the first identification information by means of sound, light effect, or by visualizing graphic or text display on the control device. Transmission.
  • the second communication module 13 is configured to establish a second network connection with the node according to the authentication of the first identification authentication information, where the second network connection is different from the first network connection.
  • the control device After the authentication of the first identification authentication information, the control device establishes a second network connection with the node, and the second network connection may be that the control device can establish a connection with the node through the wired or wireless manner, such as a serial port. Communication technology, short-range wireless communication technology, radio frequency identification technology, wireless fidelity/wireless fidelity protection setting technology, Z-wave communication protocol, and ZigBee communication protocol, but the second network connection is different from the first network connection, that is, The first network connection is different from the network type of the second network connection.
  • the second sending module 14 is configured to transmit the second identification authentication information to the node through the second network connection.
  • the second identification authentication information may be device identification information of the node or the control device, or may be the key information of the node and/or the control device, and the device identification information may be hardware address information or device code identification information, where After the second identification and authentication information is transmitted between the control device and the node, the control device can also prompt the user to complete the transmission of the second identification information, for example, by sound, light effect, or by visualizing on the control device. The graphic and text display manners prompt the user to complete the transmission of the second identification information.
  • the rights configuration module 15 is configured to complete the rights configuration with the node according to the second identification authentication information.
  • the node needs to be added to the network where the control device is located, and the manner in which the node joins the network where the control device is located may be that the node joins the network where the control device is located according to the first identification information, and specifically joins according to different nodes of the first identification authentication information.
  • the method of controlling the network where the device is located may also be different.
  • the control device and the node may directly communicate through the same network or communicate through the server.
  • the control device After the control device establishes a communication connection with the node, the control device first detects the node, and detects whether the node has been added to the network where the control device is located.
  • the detection mode may be: detecting whether the node device stores the network identification information, if the node has joined When the control device is located in the network, no operation is performed. If there is no secondary identification and authentication with the node, in some cases, the control device can perform identification and authentication of the identity with the node through the second identification authentication information.
  • the control device and the node have different functions. According to the second identification and authentication information, the functions and permissions respectively obtained by the node and the control device can be obtained, and the rights and configurations between the control device and the node can be completed by obtaining the obtained functions and permissions.
  • the reliable authentication between the control device and the node may be completed by the second identification authentication information, and then the function and authority between the control device and the node are obtained through reliable authentication. Take, and then complete the permission configuration between the control device and the node according to the acquired functions and permissions.
  • the identification and authentication of the identity between the control device and the node through the second identification authentication information is also different, when the control device and the node pass the close distance
  • the network connection between the control device and the node is a direct connection
  • the identity identification can be completed separately at the control device or the node end, or at the two ends.
  • the identification authentication is completed, and when the control device and the node establish a network connection through the wireless fidelity/wireless fidelity protection setting, Z-wave or ZigBee, the network connection that can be used between the control device and the node can be a direct connection.
  • the identity identification can be completed at the control device or the node end and any single end of the server connected to the control device and the node, or through two or three ends. Identify the authentication, for example when completing the pair of nodes on the control device side After the authentication, the node transmits the second identification information back to the control device by controlling the network connection established between the device and the node, and the control device end identifies the node after confirming that the returned information is consistent with the second identification authentication information. Certification.
  • the permission configuration between the control device and the node is completed by using the second identification authentication information
  • the permission configuration between the control device and the node may be determined according to the master-slave relationship between the node and the control device.
  • the control device and the node may be determined according to the authority of the control device.
  • Rights configuration when the second identification authentication information is the key information of the node and/or the key information of the control device, the authority configuration between the control device and the node may be determined according to the key of the node and/or the control device.
  • the node when the control device and the node establish a network connection with the node through Z-wave or ZigBee, when the control device and the node authenticate by the second identification authentication information and fail to pass the authentication, the node is restored and set. For example, restore the node to the factory settings, or delete the network information of the node.
  • the way to restore the factory settings to the node can be performed by the control device, or the node can restore the factory settings by itself, or by connecting with the control device and the node.
  • the server performs the factory resetting of the node.
  • the control device and the node can also delete the network information of the node after the network connection is made through other means, and the network information of the node can also be deleted.
  • the network access information of the node of the wrong network is cleared, which is convenient for the user to perform the next network access operation.
  • an embodiment of the present invention provides a node, including a first communication module 21, a first transmission module 22, a second communication module 23, a second transmission module 24, and a rights configuration module 25.
  • the first communication module 21 is configured to establish a first network connection with the control device.
  • the first sending module 22 is configured to transmit the first identification authentication information by using the first network connection.
  • the establishment of the first network connection between the control device and the node may be established by using a short-range wireless communication technology, or may be established by using a radio frequency identification technology, or established by a wireless fidelity/wireless fidelity protection setting.
  • the control device and the node are devices that support the Z-wave or igBee communication protocol, and the control device and the node can also establish a network connection with the node through Z-wave or ZigBee, and the specific establishment manner is based on the control device and the node.
  • Supported network connection mode or data transmission mode to select wherein a connection is established between the control device and the node, preferably established by short-range wireless communication technology, and after the control device establishes a network connection with the node, between the control device and the node
  • the data information can be transmitted through the established network connection.
  • the control device first activates the node.
  • the specific activation mode can be the control device writing the identifier touched by the control device or the network networking identifier, for example, when controlling Device and node support Z- The device of the wave or the ZigBee communication protocol, the control device writes the network identification information in the node, and then the control device can transmit the first identification authentication information to the node, and the first identification authentication information may be the node and the control device.
  • the access rights of the network connection for example, the node joins the account and password of the network where the control device is located, or the node adds the identification information of the network where the control device is located, wherein after the control device and the node transmit the first identification authentication information,
  • the control device can also prompt the user to complete the transmission of the first identification information by visual means, for example, by prompting the user to complete the first identification information by means of sound, light effect, or by visualizing graphic or text display on the control device. Transmission.
  • the second communication module 23 is configured to establish a second network connection with the control device according to the authentication of the first identification authentication information, where the second network connection is different from the first network connection.
  • the control device After the authentication of the first identification authentication information, the control device establishes a second network connection with the node, and the second network connection may be that the control device can establish a connection with the node through the wired or wireless manner, such as a serial port. Communication technology, short-range wireless communication technology, radio frequency identification technology, wireless fidelity / wireless fidelity protection setting technology, Z-wave communication protocol and ZigBee communication protocol, but the second network The connection is different from the first network connection, that is, the first network connection is different from the network type of the second network connection.
  • the second sending module 24 is configured to transmit, by using the second network connection, the second identification authentication information with the control device.
  • the second identification authentication information may be device identification information of the node or the control device, or may be the key information of the node and/or the control device, and the device identification information may be hardware address information or device code identification information, where After the second identification and authentication information is transmitted between the control device and the node, the control device can also prompt the user to complete the transmission of the second identification information, for example, by sound, light effect, or by visualizing on the control device. The graphic and text display manners prompt the user to complete the transmission of the second identification information.
  • a rights configuration module 25 configured to complete rights configuration with the control device according to the second identification authentication information
  • the node needs to be added to the network where the control device is located.
  • the manner in which the node joins the network where the control device is located may be that the node joins the network where the control device is located according to the first identification information, and is specifically added according to different nodes of the first identification authentication information.
  • the method of controlling the network where the device is located may also be different.
  • the control device and the node may directly communicate through the same network or communicate through the server.
  • the control device After the control device establishes a communication connection with the node, the control device first detects the node, and detects whether the node has been added to the network where the control device is located.
  • the detection mode may be: detecting whether the node device stores the network identification information, if the node has joined No operation is performed in the network where the control device is located. If there is no secondary identification and authentication with the node, in some cases, the control device can complete identity identification and authentication with the node through the second identification authentication information. Because the control device and the node have different functions, according to the second identification authentication information, the functions and rights respectively obtained by the node and the control device can be obtained, and the rights between the control device and the node can be completed by obtaining the obtained functions and permissions.
  • the reliable authentication between the control device and the node may be completed by using the second identification authentication information, and then the function and authority between the control device and the node are obtained through reliable authentication, and then obtained according to the acquisition.
  • the functionality and permissions complete control the configuration of permissions between the device and the node.
  • the network connection established between the control device and the node is different, between the control device and the node
  • the identification and authentication of the identity is also different through the second identification authentication information.
  • the control device establishes a network connection with the node through short-range wireless communication or radio frequency identification
  • the network connection between the control device and the node is directly connected. ⁇ Identification of identity can be done separately on the control device or node. Identification can also be done at both ends.
  • the control device and the node are connected via wireless fidelity/wireless fidelity protection, Z- After the wave or ZigBee establishes a network connection, the network connection that can be used between the control device and the node can be either a direct connection or an indirect connection.
  • the identity identification can be performed on the control device or node and with the control device and node. Any single-ended server on the connected server can complete the identification and authentication. It can also complete the identification and authentication through the two ends or three-end peers. For example, when the authentication of the node is completed on the control device, the control device establishes the relationship with the node. Network connection, the node returns the second identification information to the control device End, the control device side to complete the authentication node identification information and authentication information matches the second identification acknowledgment inch backhaul.
  • the permission configuration between the control device and the node is completed by using the second identification authentication information
  • the permission configuration between the control device and the node may be determined according to the master-slave relationship between the node and the control device.
  • the control device and the node may be determined according to the authority of the control device.
  • Rights configuration when the second identification authentication information is the key information of the node and/or the key information of the control device, the authority configuration between the control device and the node may be determined according to the key of the node and/or the control device.
  • the node when the control device and the node establish a network connection with the node through Z-wave or ZigBee, when the control device and the node authenticate through the second identification authentication information and fail to pass the authentication, the node is restored and set. For example, restore the node to the factory settings, or delete the network information of the node.
  • the way to restore the factory settings to the node can be performed by the control device, or the node can restore the factory settings by itself, or by connecting with the control device and the node.
  • the server performs the factory resetting of the node.
  • control device and the node can also delete the network information of the node after the network connection is made through other means, and the network information of the node can also be deleted.
  • the network access information of the node of the wrong network is cleared, which is convenient for the user to perform the next network access operation.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明属于物联网领域,尤其涉及网络建立方法、控制设备及节点。所述方法包括:控制设备与节点建立第一网络连接,并通过第一网络连接传输第一识别认证信息;根据第一识别认证信息的认证,控制设备与节点建立第二网络连接,其中第二网络连接不同于第一网络连接;控制设备与节点之间通过第二网络连接传输第二识别认证信息;控制设备根据第二识别认证信息完成与节点之间的权限配置。通过控制设备与节点之间的两次认证,完成节点加入到控制设备所在网络以及控制设备对节点的权限控制,通过权限的配置实现控制设备与节点之间相互控制关系的确定,赋予控制设备对节点的控制权限,方便用户对节点进行操作,也便于用户增加新的节点。

Description

网络建立方法、 控制设备及节点 技术领域
[0001] 本发明属于物联网领域, 尤其涉及网络建立方法、 控制设备及节点。
背景技术
[0002] 随着信息技术的飞速发展, 信息网络已经成为社会发展的重要保证。 网络设备 和网络应用也伴随着信息技术的快速发展渗透到人们生活的各个角落, 随着网 络设备和网络应用的延伸, 网络规模迅速扩大, 随着网络规模的迅速扩大, 网 络安全问题变得日益复杂, 尤其是在网络所承载的业务日益复杂的情况下, 保 证网络的安全就显得极为重要。
技术问题
[0003] 本发明实施例的目的在于提供网络建立方法、 控制设备及节点, 旨在通过两次 认证完成对控制设备和节点的权限配置, 方便用户对节点进行权限配置。
问题的解决方案
技术解决方案
[0004] 本发明提出的技术方案是:
[0005] 一种网络建立方法, 所述方法包括:
[0006] 控制设备与节点建立第一网络连接, 并通过所述第一网络连接传输第一识别认 证信息;
[0007] 根据所述第一识别认证信息的认证, 所述控制设备与所述节点建立第二网络连 接, 其中所述第二网络连接不同于所述第一网络连接;
[0008] 所述控制设备与所述节点之间通过所述第二网络连接传输第二识别认证信息; [0009] 所述控制设备根据所述第二识别认证信息完成与所述节点之间的权限配置。
[0010] 进一步地, 所述控制设备与所述节点建立所述第一网络连接的方式包括: [0011] 所述控制设备与所述节点通过近距离无线通信建立网络连接;
[0012] 所述控制设备与所述节点通过射频识别建立网络连接;
[0013] 所述控制设备与所述节点通过无线保真 /无线保真保护设置建立网络连接; [0014] 所述控制设备与所述节点通过 Z-wave或者 ZigBee建立网络连接。
[0015] 进一步地, 所述第二识别认证信息包括:
[0016] 所述节点或所述控制设备的设备识别信息; 或者
[0017] 所述节点和 /或所述控制设备的秘钥信息。
[0018] 本发明还提供一种网络建立方法, 所述方法包括:
[0019] 节点与控制设备建立第一网络连接, 并通过所述第一网络连接传输第一识别认 证信息;
[0020] 根据所述第一识别认证信息的认证, 所述节点与所述控制设备建立第二网络连 接, 其中所述第二网络连接不同于所述第一网络连接;
[0021] 所述节点与所述控制设备之间通过所述第二网络连接传输第二识别认证信息; [0022] 所述节点根据所述第二识别认证信息完成与所述控制设备之间的权限配置。
[0023] 进一步地, 所述节点与所述控制设备建立所述第一网络连接的方式包括: [0024] 所述节点与所述控制设备通过近距离无线通信建立网络连接;
[0025] 所述节点与所述控制设备通过射频识别建立网络连接;
[0026] 所述节点与所述控制设备通过无线保真 /无线保真保护设置建立网络连接; [0027] 所述节点与所述控制设备通过 Z-wave或者 ZigBee建立网络连接。
[0028] 进一步地, 所述第二识别认证信息包括:
[0029] 所述节点或所述控制设备的设备识别信息; 或者
[0030] 所述节点和 /或所述控制设备的秘钥信息。
[0031] 本发明还提供一种控制设备, 所述控制设备包括:
[0032] 第一通信模块, 用于与节点建立第一网络连接;
[0033] 第一发送模块, 用于通过所述第一网络连接传输第一识别认证信息;
[0034] 第二通信模块, 用于根据所述第一识别认证信息的认证, 与所述节点建立第二 网络连接, 其中所述第二网络连接不同于所述第一网络连接;
[0035] 第二发送模块, 用于与所述节点之间通过所述第二网络连接传输第二识别认证 f π息;
[0036] 权限配置模块, 用于根据所述第二识别认证信息完成与所述节点之间的权限配 [0037] 进一步地, 所述控制设备与所述节点建立所述第一网络连接的方式包括: [0038] 所述控制设备与所述节点通过近距离无线通信建立网络连接;
[0039] 所述控制设备与所述节点通过射频识别建立网络连接;
[0040] 所述控制设备与所述节点通过无线保真 /无线保真保护设置建立网络连接; [0041] 所述控制设备与所述节点通过 Z-wave或者 ZigBee建立网络连接。
[0042] 进一步地, 所述第二识别认证信息包括:
[0043] 所述节点或所述控制设备的设备识别信息; 或者
[0044] 所述节点和 /或所述控制设备的秘钥信息。
[0045] 本发明还提供一种节点, 所述节点包括:
[0046] 第一通信模块, 用于与控制设备建立第一网络连接;
[0047] 第一发送模块, 用于通过所述第一网络连接传输第一识别认证信息;
[0048] 第二通信模块, 用于根据所述第一识别认证信息的认证, 所述节点与所述控制 设备建立第二网络连接, 其中所述第二网络连接不同于所述第一网络连接;
[0049] 第二发送模块, 用于与所述控制设备之间通过所述第二网络连接传输第二识别 认证信息;
[0050] 第二发送模块, 用于根据所述第二识别认证信息完成与所述控制设备之间的权
[0051] 进一步地, 所述节点与所述控制设备建立所述第一网络连接的方式包括: [0052] 所述节点与所述控制设备通过近距离无线通信建立网络连接;
[0053] 所述节点与所述控制设备通过射频识别建立网络连接;
[0054] 所述节点与所述控制设备通过无线保真 /无线保真保护设置建立网络连接; [0055] 所述节点与所述控制设备通过 Z-wave或者 ZigBee建立网络连接。
[0056] 进一步地, 所述第二识别认证信息包括:
[0057] 所述节点或所述控制设备的设备识别信息; 或者
[0058] 所述节点和 /或所述控制设备的秘钥信息。
发明的有益效果
有益效果
[0059] 根据上述的技术方案, 本发明有益效果: 通过控制设备与节点之间的两次认证 , 完成节点加入到控制设备所在网络以及控制设备对节点的权限控制, 通过权 限的配置实现控制设备与节点之间相互控制关系的确定, 赋予控制设备对节点 的控制权限, 方便用户对节点进行操作, 也便于用户增加新的节点。
对附图的简要说明
附图说明
[0060] 图 1是应用本发明实施例一提供的网络建立方法的流程图;
[0061] 图 2是应用本发明实施例二提供的网络建立方法的流程图;
[0062] 图 3是应用本发明实施例三提供的控制设备的功能模块框图;
[0063] 图 4是应用本发明实施例四提供的节点的功能模块框图。
本发明的实施方式
[0064] 为了使本发明的目的、 技术方案及优点更加清楚明白, 以下结合附图及实施例 , 对本发明进行进一步详细说明。 应当理解, 此处所描述的具体实施例仅仅用 以解释本发明, 并不用于限定本发明。
[0065] 实施例一
[0066] 如图 1所示, 本发明实施例提出一种网络建立方法, 所述方法包括以下步骤: [0067] 步骤 S101、 控制设备与节点建立第一网络连接, 并通过第一网络连接传输第一 识别认证信息。
[0068] 控制设备与节点之间的第一网络连接的建立, 可以采用近距离无线通信技术建 立, 也可以采用射频识别技术建立, 或者通过无线保真 /无线保真保护设置的方 式建立, 如果控制设备和节点为同吋支持 Z-wave或者 igBee通信协议的设备, 控 制设备与节点之间还可以通过 Z-wave或者 ZigBee与节点建立网络连接, 具体建 立的方式根据控制设备与节点之间所支持的网络连接方式或者数据传输方式来 选择, 其中在控制设备与节点之间建立连接吋, 优选的采用近距离无线通信技 术建立, 当控制设备与节点建立网络连接以后, 控制设备与节点之间通过建立 的网络连接就可以传输数据信息, 此吋控制设备首先对节点进行激活操作, 具 体激活的方式可以是控制设备在节点写入被控制设备触碰的标识或者网络组网 标识, 例如当控制设备和节点为同吋支持 Z-wave或者 ZigBee通信协议的设备, 控制设备在节点内写入网络标识信息, 之后控制设备此吋可以与节点之间传输 第一识别认证信息, 第一识别认证信息具体可以是节点与控制设备建立第二网 络连接的入网权限, 例如节点加入到控制设备所在网络的账户和密码, 或者节 点加入到控制设备所在网络的身份识别信息, 其中当控制设备与节点之间传输 完第一识别认证信息后, 控制设备还可以通过可视化的方式提示用户完成了第 一识别信息的传输工作, 例如通过声音, 光效果, 或者在控制设备上通过可视 化的图形、 文字显示的方式来提示用户完成了第一识别信息的传输。
[0069] 步骤 S102、 根据第一识别认证信息的认证, 控制设备与节点建立第二网络连接 , 其中第二网络连接不同于第一网络连接。
[0070] 在通过第一识别认证信息的认证之后, 控制设备与节点建立第二网络连接, 第 二网络连接可以是控制设备可以与节点通过有线或者无线的方式与节点之间建 立连接, 例如串口通信技术、 近距离无线通信技术、 射频识别技术、 无线保真 / 无线保真保护设置技术、 Z-wave通信协议以及 ZigBee通信协议, 但是第二网络 连接不同于第一网络连接, 也就是说, 第一网络连接与第二网络连接的网络类 型不同。
[0071] 步骤 S103、 控制设备与节点之间通过第二网络连接传输第二识别认证信息。
[0072] 第二识别认证信息可以是节点或者控制设备的设备识别信息, 也可以是节点和 /或控制设备的秘钥信息, 设备识别信息可以是硬件地址信息也可以是设备编码 识别信息, 其中当控制设备与节点之间传输完第二识别认证信息后, 控制设备 也可以通过可视化的方式提示用户完成了第二识别信息的传输工作, 例如通过 声音, 光效果, 或者在控制设备上通过可视化的图形、 文字显示的方式来提示 用户完成了第二识别信息的传输。
[0073] 步骤 S104、 控制设备根据第二识别认证信息完成与节点之间的权限配置。
[0074] 节点首先需要加入到控制设备所在的网络中, 节点加入控制设备所在网络的方 式可以是节点根据第一识别信息加入到控制设备所在的网络, 具体根据第一识 别认证信息的不同节点加入到控制设备所在网络的方式也会有所不同, 当节点 通过第一识别认证信息加入到控制设备所在的网络中以后, 控制设备和节点之 间可以通过同一网络进行直接通信或者借助服务器进行通信, 控制设备与节点 建立通信连接以后, 控制设备首先对节点进行检测, 检测节点是否已经加入到 了控制设备所在的网络中了, 检测的方式可以是检测节点设备是否存储有网络 标识信息, 如果节点已经加入到了控制设备所在的网络中就不进行操作, 如果 没有就与对节点进行二次识别认证, 在一些情况下控制设备可以与节点之间通 过第二识别认证信息完成身份的识别认证, 由于控制设备与节点所具有的功能 不同, 根据第二识别认证信息, 可以获知得到节点和控制设备所分别具有的功 能和权限, 通过获取得到的功能和权限可以完成控制设备与节点之间的权限配 置; 在另外一些情况下, 可以先通过第二识别认证信息完成控制设备与节点之 间的可靠认证, 之后通过可靠认证完成控制设备与节点之间的功能和权限的获 取, 之后再根据获取得到的功能和权限完成控制设备与节点之间的权限配置。
[0075] 其中由于控制设备与节点之间建立的网络连接有所不同, 控制设备与节点之间 通过第二识别认证信息完成身份的识别认证也有所不同, 当控制设备与节点之 间通过近距离无线通信或者射频识别建立网络连接吋, 控制设备与节点之间采 用的网络连接为直接连接, 此吋完成身份的识别可以在控制设备端或者节点端 单独完成识别认证, 也可以在两端同吋完成识别认证, 而当控制设备与节点之 间通过无线保真 /无线保真保护设置、 Z-wave或者 ZigBee建立网络连接吋, 控制 设备与节点之间可以采用的网络连接即可以为直接连接也可以为间接连接, 此 吋完成身份的识别可以在控制设备端或者节点端以及与控制设备和节点连接的 服务器端的任一单端完成识别认证, 也可以通过其中的两端或者三端同吋完成 识别认证, 例如当在控制设备端完成对节点的认证吋, 通过控制设备与节点之 间建立的网络连接, 节点将第二识别信息回传至控制设备端, 控制设备端在确 认回传的信息与第二识别认证信息一致吋完成对节点的识别认证。
[0076] 其中根据第二识别认证信息的不同, 在通过第二识别认证信息完成控制设备与 节点之间的权限配置也有所不同, 例如, 当第二识别认证信息是节点的设备识 别信息, 则可以根据节点和控制设备的主从关系确定控制设备与节点之间的权 限配置, 当第二识别认证信息是控制设备的设备识别信息, 则可以根据控制设 备的权限确定控制设备与节点之间的权限配置, 当第二识别认证信息是节点的 秘钥信息和 /或控制设备的秘钥信息, 则可以根据节点和 /或控制设备的秘钥确定 控制设备与节点之间的权限配置。
[0077] 其中当控制设备与节点通过 Z-wave或者 ZigBee与节点建立网络连接吋, 当控制 设备与节点之间通过第二识别认证信息进行认证而又没有通过认证吋, 对节点 进行恢复设置, 例如将节点恢复到出厂设置, 或者将节点的网络信息刪除, 具 体对节点进行恢复出厂设置的方式可以通过控制设备来进行, 也可以节点自行 进行恢复出厂设置, 或者通过与控制设备和节点连接的服务器来进行对节点的 恢复出厂设置, 通过将节点恢复出厂设置, 同样当控制设备与节点通过其他方 式进行网络连接而也没有通过二次识别认证后, 也可以将节点的网络信息刪除 , 使得入错网络的节点入网信息被清除, 方便用户进行下次入网的操作。
[0078] 实施例二
[0079] 如图 2所示, 本发明实施例提出一种网络建立方法, 所述方法包括以下步骤: [0080] 步骤 S201、 节点与控制设备建立第一网络连接, 并通过第一网络连接传输第一 识别认证信息。
[0081] 控制设备与节点之间的第一网络连接的建立, 可以采用近距离无线通信技术建 立, 也可以采用射频识别技术建立, 或者通过无线保真 /无线保真保护设置的方 式建立, 如果控制设备和节点为同吋支持 Z-wave或者 igBee通信协议的设备, 控 制设备与节点之间还可以通过 Z-wave或者 ZigBee与节点建立网络连接, 具体建 立的方式根据控制设备与节点之间所支持的网络连接方式或者数据传输方式来 选择, 其中在控制设备与节点之间建立连接吋, 优选的采用近距离无线通信技 术建立, 当控制设备与节点建立网络连接以后, 控制设备与节点之间通过建立 的网络连接就可以传输数据信息, 此吋控制设备首先对节点进行激活操作, 具 体激活的方式可以是控制设备在节点写入被控制设备触碰的标识或者网络组网 标识, 例如当控制设备和节点为同吋支持 Z-wave或者 ZigBee通信协议的设备, 控制设备在节点内写入网络标识信息, 之后控制设备此吋可以与节点之间传输 第一识别认证信息, 第一识别认证信息具体可以是节点与控制设备建立第二网 络连接的入网权限, 例如节点加入到控制设备所在网络的账户和密码, 或者节 点加入到控制设备所在网络的身份识别信息, 其中当控制设备与节点之间传输 完第一识别认证信息后, 控制设备还可以通过可视化的方式提示用户完成了第 一识别信息的传输工作, 例如通过声音, 光效果, 或者在控制设备上通过可视 化的图形、 文字显示的方式来提示用户完成了第一识别信息的传输。
[0082] 步骤 S202、 根据第一识别认证信息的认证, 节点与控制设备建立第二网络连接 , 其中第二网络连接不同于第一网络连接。
[0083] 在通过第一识别认证信息的认证之后, 控制设备与节点建立第二网络连接, 第 二网络连接可以是控制设备可以与节点通过有线或者无线的方式与节点之间建 立连接, 例如串口通信技术、 近距离无线通信技术、 射频识别技术、 无线保真 / 无线保真保护设置技术、 Z-wave通信协议以及 ZigBee通信协议, 但是第二网络 连接不同于第一网络连接, 也就是说, 第一网络连接与第二网络连接的网络类 型不同。
[0084] 步骤 S203、 节点与控制设备之间通过第二网络连接传输第二识别认证信息。
[0085] 第二识别认证信息可以是节点或者控制设备的设备识别信息, 也可以是节点和 /或控制设备的秘钥信息, 设备识别信息可以是硬件地址信息也可以是设备编码 识别信息, 其中当控制设备与节点之间传输完第二识别认证信息后, 控制设备 也可以通过可视化的方式提示用户完成了第二识别信息的传输工作, 例如通过 声音, 光效果, 或者在控制设备上通过可视化的图形、 文字显示的方式来提示 用户完成了第二识别信息的传输。
[0086] 步骤 S204、 节点根据第二识别认证信息完成与控制设备之间的权限配置。
[0087] 节点首先需要加入到控制设备所在的网络中, 节点加入控制设备所在网络的方 式可以是节点根据第一识别信息加入到控制设备所在的网络, 具体根据第一识 别认证信息的不同节点加入到控制设备所在网络的方式也会有所不同, 当节点 通过第一识别认证信息加入到控制设备所在的网络中以后, 控制设备和节点之 间可以通过同一网络进行直接通信或者借助服务器进行通信, 控制设备与节点 建立通信连接以后, 控制设备首先对节点进行检测, 检测节点是否已经加入到 了控制设备所在的网络中了, 检测的方式可以是检测节点设备是否存储有网络 标识信息, 如果节点已经加入到了控制设备所在的网络中就不进行操作, 如果 没有就与对节点进行二次识别认证, 在一些情况下控制设备可以与节点之间通 过第二识别认证信息完成身份的识别认证, 由于控制设备与节点所具有的功能 不同, 根据第二识别认证信息, 可以获知得到节点和控制设备所分别具有的功 能和权限, 通过获取得到的功能和权限可以完成控制设备与节点之间的权限配 置; 在另外一些情况下, 可以先通过第二识别认证信息完成控制设备与节点之 间的可靠认证, 之后通过可靠认证完成控制设备与节点之间的功能和权限的获 取, 之后再根据获取得到的功能和权限完成控制设备与节点之间的权限配置。
[0088] 其中由于控制设备与节点之间建立的网络连接有所不同, 控制设备与节点之间 通过第二识别认证信息完成身份的识别认证也有所不同, 当控制设备与节点之 间通过近距离无线通信或者射频识别建立网络连接吋, 控制设备与节点之间采 用的网络连接为直接连接, 此吋完成身份的识别可以在控制设备端或者节点端 单独完成识别认证, 也可以在两端同吋完成识别认证, 而当控制设备与节点之 间通过无线保真 /无线保真保护设置、 Z-wave或者 ZigBee建立网络连接吋, 控制 设备与节点之间可以采用的网络连接即可以为直接连接也可以为间接连接, 此 吋完成身份的识别可以在控制设备端或者节点端以及与控制设备和节点连接的 服务器端的任一单端完成识别认证, 也可以通过其中的两端或者三端同吋完成 识别认证, 例如当在控制设备端完成对节点的认证吋, 通过控制设备与节点之 间建立的网络连接, 节点将第二识别信息回传至控制设备端, 控制设备端在确 认回传的信息与第二识别认证信息一致吋完成对节点的识别认证。
[0089] 其中根据第二识别认证信息的不同, 在通过第二识别认证信息完成控制设备与 节点之间的权限配置也有所不同, 例如, 当第二识别认证信息是节点的设备识 别信息, 则可以根据节点和控制设备的主从关系确定控制设备与节点之间的权 限配置, 当第二识别认证信息是控制设备的设备识别信息, 则可以根据控制设 备的权限确定控制设备与节点之间的权限配置, 当第二识别认证信息是节点的 秘钥信息和 /或控制设备的秘钥信息, 则可以根据节点和 /或控制设备的秘钥确定 控制设备与节点之间的权限配置。
[0090] 其中当控制设备与节点通过 Z-wave或者 ZigBee与节点建立网络连接吋, 当控制 设备与节点之间通过第二识别认证信息进行认证而又没有通过认证吋, 对节点 进行恢复设置, 例如将节点恢复到出厂设置, 或者将节点的网络信息刪除, 具 体对节点进行恢复出厂设置的方式可以通过控制设备来进行, 也可以节点自行 进行恢复出厂设置, 或者通过与控制设备和节点连接的服务器来进行对节点的 恢复出厂设置, 通过将节点恢复出厂设置, 同样当控制设备与节点通过其他方 式进行网络连接而也没有通过二次识别认证后, 也可以将节点的网络信息刪除 , 使得入错网络的节点入网信息被清除, 方便用户进行下次入网的操作。
[0091] 实施例三
[0092] 如图 3所示, 本发明实施例提出一种控制设备, 包括第一通信模块 11、 第一发 送模块 12、 第二通信模块 13、 第二发送模块 14和权限配置模块 15。
[0093] 第一通信模块 11, 用于与节点建立第一网络连接。
[0094] 第一发送模块 12, 用于通过第一网络连接传输第一识别认证信息。
[0095] 控制设备与节点之间的第一网络连接的建立, 可以采用近距离无线通信技术建 立, 也可以采用射频识别技术建立, 或者通过无线保真 /无线保真保护设置的方 式建立, 如果控制设备和节点为同吋支持 Z-wave或者 igBee通信协议的设备, 控 制设备与节点之间还可以通过 Z-wave或者 ZigBee与节点建立网络连接, 具体建 立的方式根据控制设备与节点之间所支持的网络连接方式或者数据传输方式来 选择, 其中在控制设备与节点之间建立连接吋, 优选的采用近距离无线通信技 术建立, 当控制设备与节点建立网络连接以后, 控制设备与节点之间通过建立 的网络连接就可以传输数据信息, 此吋控制设备首先对节点进行激活操作, 具 体激活的方式可以是控制设备在节点写入被控制设备触碰的标识或者网络组网 标识, 例如当控制设备和节点为同吋支持 Z-wave或者 ZigBee通信协议的设备, 控制设备在节点内写入网络标识信息, 之后控制设备此吋可以与节点之间传输 第一识别认证信息, 第一识别认证信息具体可以是节点与控制设备建立第二网 络连接的入网权限, 例如节点加入到控制设备所在网络的账户和密码, 或者节 点加入到控制设备所在网络的身份识别信息, 其中当控制设备与节点之间传输 完第一识别认证信息后, 控制设备还可以通过可视化的方式提示用户完成了第 一识别信息的传输工作, 例如通过声音, 光效果, 或者在控制设备上通过可视 化的图形、 文字显示的方式来提示用户完成了第一识别信息的传输。
[0096] 第二通信模块 13, 用于根据第一识别认证信息的认证, 与节点建立第二网络连 接, 其中第二网络连接不同于第一网络连接。 [0097] 在通过第一识别认证信息的认证之后, 控制设备与节点建立第二网络连接, 第 二网络连接可以是控制设备可以与节点通过有线或者无线的方式与节点之间建 立连接, 例如串口通信技术、 近距离无线通信技术、 射频识别技术、 无线保真 / 无线保真保护设置技术、 Z-wave通信协议以及 ZigBee通信协议, 但是第二网络 连接不同于第一网络连接, 也就是说, 第一网络连接与第二网络连接的网络类 型不同。
[0098] 第二发送模块 14, 用于与节点之间通过第二网络连接传输第二识别认证信息。
[0099] 第二识别认证信息可以是节点或者控制设备的设备识别信息, 也可以是节点和 /或控制设备的秘钥信息, 设备识别信息可以是硬件地址信息也可以是设备编码 识别信息, 其中当控制设备与节点之间传输完第二识别认证信息后, 控制设备 也可以通过可视化的方式提示用户完成了第二识别信息的传输工作, 例如通过 声音, 光效果, 或者在控制设备上通过可视化的图形、 文字显示的方式来提示 用户完成了第二识别信息的传输。
[0100] 权限配置模块 15, 用于根据第二识别认证信息完成与节点之间的权限配置。
[0101] 节点首先需要加入到控制设备所在的网络中, 节点加入控制设备所在网络的方 式可以是节点根据第一识别信息加入到控制设备所在的网络, 具体根据第一识 别认证信息的不同节点加入到控制设备所在网络的方式也会有所不同, 当节点 通过第一识别认证信息加入到控制设备所在的网络中以后, 控制设备和节点之 间可以通过同一网络进行直接通信或者借助服务器进行通信, 控制设备与节点 建立通信连接以后, 控制设备首先对节点进行检测, 检测节点是否已经加入到 了控制设备所在的网络中了, 检测的方式可以是检测节点设备是否存储有网络 标识信息, 如果节点已经加入到了控制设备所在的网络中就不进行操作, 如果 没有就与对节点进行二次识别认证, 在一些情况下控制设备可以与节点之间通 过第二识别认证信息完成身份的识别认证, 由于控制设备与节点所具有的功能 不同, 根据第二识别认证信息, 可以获知得到节点和控制设备所分别具有的功 能和权限, 通过获取得到的功能和权限可以完成控制设备与节点之间的权限配 置; 在另外一些情况下, 可以先通过第二识别认证信息完成控制设备与节点之 间的可靠认证, 之后通过可靠认证完成控制设备与节点之间的功能和权限的获 取, 之后再根据获取得到的功能和权限完成控制设备与节点之间的权限配置。
[0102] 其中由于控制设备与节点之间建立的网络连接有所不同, 控制设备与节点之间 通过第二识别认证信息完成身份的识别认证也有所不同, 当控制设备与节点之 间通过近距离无线通信或者射频识别建立网络连接吋, 控制设备与节点之间采 用的网络连接为直接连接, 此吋完成身份的识别可以在控制设备端或者节点端 单独完成识别认证, 也可以在两端同吋完成识别认证, 而当控制设备与节点之 间通过无线保真 /无线保真保护设置、 Z-wave或者 ZigBee建立网络连接吋, 控制 设备与节点之间可以采用的网络连接即可以为直接连接也可以为间接连接, 此 吋完成身份的识别可以在控制设备端或者节点端以及与控制设备和节点连接的 服务器端的任一单端完成识别认证, 也可以通过其中的两端或者三端同吋完成 识别认证, 例如当在控制设备端完成对节点的认证吋, 通过控制设备与节点之 间建立的网络连接, 节点将第二识别信息回传至控制设备端, 控制设备端在确 认回传的信息与第二识别认证信息一致吋完成对节点的识别认证。
[0103] 其中根据第二识别认证信息的不同, 在通过第二识别认证信息完成控制设备与 节点之间的权限配置也有所不同, 例如, 当第二识别认证信息是节点的设备识 别信息, 则可以根据节点和控制设备的主从关系确定控制设备与节点之间的权 限配置, 当第二识别认证信息是控制设备的设备识别信息, 则可以根据控制设 备的权限确定控制设备与节点之间的权限配置, 当第二识别认证信息是节点的 秘钥信息和 /或控制设备的秘钥信息, 则可以根据节点和 /或控制设备的秘钥确定 控制设备与节点之间的权限配置。
[0104] 其中当控制设备与节点通过 Z-wave或者 ZigBee与节点建立网络连接吋, 当控制 设备与节点之间通过第二识别认证信息进行认证而又没有通过认证吋, 对节点 进行恢复设置, 例如将节点恢复到出厂设置, 或者将节点的网络信息刪除, 具 体对节点进行恢复出厂设置的方式可以通过控制设备来进行, 也可以节点自行 进行恢复出厂设置, 或者通过与控制设备和节点连接的服务器来进行对节点的 恢复出厂设置, 通过将节点恢复出厂设置, 同样当控制设备与节点通过其他方 式进行网络连接而也没有通过二次识别认证后, 也可以将节点的网络信息刪除 , 使得入错网络的节点入网信息被清除, 方便用户进行下次入网的操作。 [0105] 实施例四
[0106] 如图 4所示, 本发明实施例提出一种节点, 包括第一通信模块 21、 第一发送模 块 22、 第二通信模块 23、 第二发送模块 24和权限配置模块 25。
[0107] 第一通信模块 21, 用于与控制设备建立第一网络连接。
[0108] 第一发送模块 22, 用于通过第一网络连接传输第一识别认证信息。
[0109] 控制设备与节点之间的第一网络连接的建立, 可以采用近距离无线通信技术建 立, 也可以采用射频识别技术建立, 或者通过无线保真 /无线保真保护设置的方 式建立, 如果控制设备和节点为同吋支持 Z-wave或者 igBee通信协议的设备, 控 制设备与节点之间还可以通过 Z-wave或者 ZigBee与节点建立网络连接, 具体建 立的方式根据控制设备与节点之间所支持的网络连接方式或者数据传输方式来 选择, 其中在控制设备与节点之间建立连接吋, 优选的采用近距离无线通信技 术建立, 当控制设备与节点建立网络连接以后, 控制设备与节点之间通过建立 的网络连接就可以传输数据信息, 此吋控制设备首先对节点进行激活操作, 具 体激活的方式可以是控制设备在节点写入被控制设备触碰的标识或者网络组网 标识, 例如当控制设备和节点为同吋支持 Z-wave或者 ZigBee通信协议的设备, 控制设备在节点内写入网络标识信息, 之后控制设备此吋可以与节点之间传输 第一识别认证信息, 第一识别认证信息具体可以是节点与控制设备建立第二网 络连接的入网权限, 例如节点加入到控制设备所在网络的账户和密码, 或者节 点加入到控制设备所在网络的身份识别信息, 其中当控制设备与节点之间传输 完第一识别认证信息后, 控制设备还可以通过可视化的方式提示用户完成了第 一识别信息的传输工作, 例如通过声音, 光效果, 或者在控制设备上通过可视 化的图形、 文字显示的方式来提示用户完成了第一识别信息的传输。
[0110] 第二通信模块 23, 用于根据第一识别认证信息的认证, 与控制设备建立第二网 络连接, 其中第二网络连接不同于第一网络连接。
[0111] 在通过第一识别认证信息的认证之后, 控制设备与节点建立第二网络连接, 第 二网络连接可以是控制设备可以与节点通过有线或者无线的方式与节点之间建 立连接, 例如串口通信技术、 近距离无线通信技术、 射频识别技术、 无线保真 / 无线保真保护设置技术、 Z-wave通信协议以及 ZigBee通信协议, 但是第二网络 连接不同于第一网络连接, 也就是说, 第一网络连接与第二网络连接的网络类 型不同。
[0112] 第二发送模块 24, 用于与控制设备之间通过第二网络连接传输第二识别认证信 息。
[0113] 第二识别认证信息可以是节点或者控制设备的设备识别信息, 也可以是节点和 /或控制设备的秘钥信息, 设备识别信息可以是硬件地址信息也可以是设备编码 识别信息, 其中当控制设备与节点之间传输完第二识别认证信息后, 控制设备 也可以通过可视化的方式提示用户完成了第二识别信息的传输工作, 例如通过 声音, 光效果, 或者在控制设备上通过可视化的图形、 文字显示的方式来提示 用户完成了第二识别信息的传输。
[0114] 权限配置模块 25, 用于根据第二识别认证信息完成与控制设备之间的权限配置
[0115] 节点首先需要加入到控制设备所在的网络中, 节点加入控制设备所在网络的方 式可以是节点根据第一识别信息加入到控制设备所在的网络, 具体根据第一识 别认证信息的不同节点加入到控制设备所在网络的方式也会有所不同, 当节点 通过第一识别认证信息加入到控制设备所在的网络中以后, 控制设备和节点之 间可以通过同一网络进行直接通信或者借助服务器进行通信, 控制设备与节点 建立通信连接以后, 控制设备首先对节点进行检测, 检测节点是否已经加入到 了控制设备所在的网络中了, 检测的方式可以是检测节点设备是否存储有网络 标识信息, 如果节点已经加入到了控制设备所在的网络中就不进行操作, 如果 没有就与对节点进行二次识别认证, 在一些情况下控制设备可以与节点之间通 过第二识别认证信息完成身份的识别认证, 由于控制设备与节点所具有的功能 不同, 根据第二识别认证信息, 可以获知得到节点和控制设备所分别具有的功 能和权限, 通过获取得到的功能和权限可以完成控制设备与节点之间的权限配 置; 在另外一些情况下, 可以先通过第二识别认证信息完成控制设备与节点之 间的可靠认证, 之后通过可靠认证完成控制设备与节点之间的功能和权限的获 取, 之后再根据获取得到的功能和权限完成控制设备与节点之间的权限配置。
[0116] 其中由于控制设备与节点之间建立的网络连接有所不同, 控制设备与节点之间 通过第二识别认证信息完成身份的识别认证也有所不同, 当控制设备与节点之 间通过近距离无线通信或者射频识别建立网络连接吋, 控制设备与节点之间采 用的网络连接为直接连接, 此吋完成身份的识别可以在控制设备端或者节点端 单独完成识别认证, 也可以在两端同吋完成识别认证, 而当控制设备与节点之 间通过无线保真 /无线保真保护设置、 Z-wave或者 ZigBee建立网络连接吋, 控制 设备与节点之间可以采用的网络连接即可以为直接连接也可以为间接连接, 此 吋完成身份的识别可以在控制设备端或者节点端以及与控制设备和节点连接的 服务器端的任一单端完成识别认证, 也可以通过其中的两端或者三端同吋完成 识别认证, 例如当在控制设备端完成对节点的认证吋, 通过控制设备与节点之 间建立的网络连接, 节点将第二识别信息回传至控制设备端, 控制设备端在确 认回传的信息与第二识别认证信息一致吋完成对节点的识别认证。
[0117] 其中根据第二识别认证信息的不同, 在通过第二识别认证信息完成控制设备与 节点之间的权限配置也有所不同, 例如, 当第二识别认证信息是节点的设备识 别信息, 则可以根据节点和控制设备的主从关系确定控制设备与节点之间的权 限配置, 当第二识别认证信息是控制设备的设备识别信息, 则可以根据控制设 备的权限确定控制设备与节点之间的权限配置, 当第二识别认证信息是节点的 秘钥信息和 /或控制设备的秘钥信息, 则可以根据节点和 /或控制设备的秘钥确定 控制设备与节点之间的权限配置。
[0118] 其中当控制设备与节点通过 Z-wave或者 ZigBee与节点建立网络连接吋, 当控制 设备与节点之间通过第二识别认证信息进行认证而又没有通过认证吋, 对节点 进行恢复设置, 例如将节点恢复到出厂设置, 或者将节点的网络信息刪除, 具 体对节点进行恢复出厂设置的方式可以通过控制设备来进行, 也可以节点自行 进行恢复出厂设置, 或者通过与控制设备和节点连接的服务器来进行对节点的 恢复出厂设置, 通过将节点恢复出厂设置, 同样当控制设备与节点通过其他方 式进行网络连接而也没有通过二次识别认证后, 也可以将节点的网络信息刪除 , 使得入错网络的节点入网信息被清除, 方便用户进行下次入网的操作。
[0119] 以上所述仅为本发明的较佳实施例而已, 并不用以限制本发明, 凡在本发明的 精神和原则之内所作的任何修改、 等同替换和改进等, 均应包含在本发明的保 护范围之内。

Claims

权利要求书
一种网络建立方法, 其特征在于, 所述方法包括:
控制设备与节点建立第一网络连接, 并通过所述第一网络连接传输第 一识别认证信息;
根据所述第一识别认证信息的认证, 所述控制设备与所述节点建立第 二网络连接, 其中所述第二网络连接不同于所述第一网络连接; 所述控制设备与所述节点之间通过所述第二网络连接传输第二识别认 证信息;
所述控制设备根据所述第二识别认证信息完成与所述节点之间的权限 配置。
如权利要求 1所述的方法, 其特征在于, 所述控制设备与所述节点建 立所述第一网络连接的方式包括:
所述控制设备与所述节点通过近距离无线通信建立网络连接; 所述控制设备与所述节点通过射频识别建立网络连接;
所述控制设备与所述节点通过无线保真 /无线保真保护设置建立网络 连接;
所述控制设备与所述节点通过 Z-wave或者 ZigBee建立网络连接。 如权利要求 1所述的方法, 其特征在于, 所述第二识别认证信息包括 所述节点或所述控制设备的设备识别信息; 或者
所述节点和 /或所述控制设备的秘钥信息。
一种网络建立方法, 其特征在于, 所述方法包括:
节点与控制设备建立第一网络连接, 并通过所述第一网络连接传输第 一识别认证信息;
根据所述第一识别认证信息的认证, 所述节点与所述控制设备建立第 二网络连接, 其中所述第二网络连接不同于所述第一网络连接; 所述节点与所述控制设备之间通过所述第二网络连接传输第二识别认 证信息; 所述节点根据所述第二识别认证信息完成与所述控制设备之间的权限 配置。
如权利要求 4所述的方法, 其特征在于, 所述节点与所述控制设备建 立所述第一网络连接的方式包括:
所述节点与所述控制设备通过近距离无线通信建立网络连接; 所述节点与所述控制设备通过射频识别建立网络连接;
所述节点与所述控制设备通过无线保真 /无线保真保护设置建立网络 连接;
所述节点与所述控制设备通过 Z-wave或者 ZigBee建立网络连接。 如权利要求 4所述的方法, 其特征在于, 所述第二识别认证信息包括 所述节点或所述控制设备的设备识别信息; 或者
所述节点和 /或所述控制设备的秘钥信息。
一种控制设备, 其特征在于, 所述控制设备包括:
第一通信模块, 用于与节点建立第一网络连接;
第一发送模块, 用于通过所述第一网络连接传输第一识别认证信息; 第二通信模块, 用于根据所述第一识别认证信息的认证, 与所述节点 建立第二网络连接, 其中所述第二网络连接不同于所述第一网络连接 第二发送模块, 用于与所述节点之间通过所述第二网络连接传输第二 识别认证信息;
权限配置模块, 用于根据所述第二识别认证信息完成与所述节点之间 的权限配置。
如权利要求 7所述的控制设备, 其特征在于, 所述控制设备与所述节 点建立所述第一网络连接的方式包括:
所述控制设备与所述节点通过近距离无线通信建立网络连接; 所述控制设备与所述节点通过射频识别建立网络连接;
所述控制设备与所述节点通过无线保真 /无线保真保护设置建立网络 连接;
所述控制设备与所述节点通过 Z-wave或者 ZigBee建立网络连接。 如权利要求 7所述的控制设备, 其特征在于, 所述第二识别认证信息 包括:
所述节点或所述控制设备的设备识别信息; 或者
所述节点和 /或所述控制设备的秘钥信息。
一种节点, 其特征在于, 所述节点包括:
第一通信模块, 用于与控制设备建立第一网络连接;
第一发送模块, 用于通过所述第一网络连接传输第一识别认证信息; 第二通信模块, 用于根据所述第一识别认证信息的认证, 所述节点与 所述控制设备建立第二网络连接, 其中所述第二网络连接不同于所述 第一网络连接;
第二发送模块, 用于与所述控制设备之间通过所述第二网络连接传输 第二识别认证信息;
第二发送模块, 用于根据所述第二识别认证信息完成与所述控制设备 之间的权限配置。
如权利要求 10所述的节点, 其特征在于, 所述节点与所述控制设备建 立所述第一网络连接的方式包括:
所述节点与所述控制设备通过近距离无线通信建立网络连接; 所述节点与所述控制设备通过射频识别建立网络连接;
所述节点与所述控制设备通过无线保真 /无线保真保护设置建立网络 连接;
所述节点与所述控制设备通过 Z-wave或者 ZigBee建立网络连接。 如权利要求 10所述的节点, 其特征在于, 所述第二识别认证信息包括 所述节点或所述控制设备的设备识别信息; 或者
所述节点和 /或所述控制设备的秘钥信息。
PCT/CN2016/072673 2016-01-29 2016-01-29 网络建立方法、控制设备及节点 WO2017128276A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/072673 WO2017128276A1 (zh) 2016-01-29 2016-01-29 网络建立方法、控制设备及节点

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/072673 WO2017128276A1 (zh) 2016-01-29 2016-01-29 网络建立方法、控制设备及节点

Publications (1)

Publication Number Publication Date
WO2017128276A1 true WO2017128276A1 (zh) 2017-08-03

Family

ID=59397050

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/072673 WO2017128276A1 (zh) 2016-01-29 2016-01-29 网络建立方法、控制设备及节点

Country Status (1)

Country Link
WO (1) WO2017128276A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102832976A (zh) * 2012-08-30 2012-12-19 中兴通讯股份有限公司 Nfc通信方法及装置
US20130267164A1 (en) * 2012-04-09 2013-10-10 Yokogawa Electric Corporation Wireless communication system
CN104380776A (zh) * 2014-05-31 2015-02-25 华为技术有限公司 一种网络连接方法、热点终端和管理终端
CN104837217A (zh) * 2015-05-11 2015-08-12 丰唐物联技术(深圳)有限公司 一种网络接入方法及装置
US20160014118A1 (en) * 2014-07-10 2016-01-14 Ricoh Company, Ltd. Access control method, authentication method, and authentication device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130267164A1 (en) * 2012-04-09 2013-10-10 Yokogawa Electric Corporation Wireless communication system
CN102832976A (zh) * 2012-08-30 2012-12-19 中兴通讯股份有限公司 Nfc通信方法及装置
CN104380776A (zh) * 2014-05-31 2015-02-25 华为技术有限公司 一种网络连接方法、热点终端和管理终端
US20160014118A1 (en) * 2014-07-10 2016-01-14 Ricoh Company, Ltd. Access control method, authentication method, and authentication device
CN104837217A (zh) * 2015-05-11 2015-08-12 丰唐物联技术(深圳)有限公司 一种网络接入方法及装置

Similar Documents

Publication Publication Date Title
KR101551315B1 (ko) 다른 디바이스가 무선 네트워크에 연결하는 것을 가능하게 하기 위한 모바일 디바이스의 사용
US10951592B2 (en) Secure wireless communication between controllers and accessories
US20170201499A1 (en) Secure wireless communication between controllers and accessories
JP4613969B2 (ja) 通信装置、及び通信方法
CN110235424A (zh) 用于在通信系统中提供和管理安全信息的设备和方法
JP5866030B2 (ja) 認証のためのシステムおよび方法
KR20060106653A (ko) 컴퓨팅 장치를 로크 해제하기 위한 방법 및 시스템
CN103888265A (zh) 一种基于移动终端的登录系统和方法
KR20190036068A (ko) 해시 체인을 이용한 단말 간 인증 절차를 거치는 단말 간 통신 방법
JP2009212732A5 (zh)
TWI462604B (zh) 無線網路用戶端認證系統及其無線網路連線方法
JP7376090B2 (ja) 定義されたデータ定義を使用したデータ処理
JP2019220935A (ja) 固有のマスターキーを有するデジタルドアロック及びその操作方法
WO2016180091A1 (zh) 一种网络接入方法及装置
JP4744993B2 (ja) 認証局、デバイス、移動局および通信システム並びに通信方法並びに通信プログラム
CN106105131A (zh) 设备配对
JP4667178B2 (ja) 安全なアドホックネットワークを構築するシステム、方法及びコンピュータプログラム
CN105357224A (zh) 一种智能家居网关注册、移除方法及系统
WO2015139401A1 (zh) 无线网络的建立方法、系统及无线路由装置
CN110063052A (zh) 确认bluetooth*配对的方法和系统
CN107181791A (zh) 智能设备的连网方法及装置
WO2017128276A1 (zh) 网络建立方法、控制设备及节点
JP2017135599A (ja) 無線基地局装置、無線通信システム、及び、無線基地局装置の制御方法
CN104010304A (zh) 在受限区域内进行认证的移动设备和系统及其方法
CN105792195A (zh) 网络建立方法、控制设备及节点

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16887163

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16887163

Country of ref document: EP

Kind code of ref document: A1