WO2021237527A1 - 信息处理方法及装置、设备、计算机存储介质 - Google Patents
信息处理方法及装置、设备、计算机存储介质 Download PDFInfo
- Publication number
- WO2021237527A1 WO2021237527A1 PCT/CN2020/092685 CN2020092685W WO2021237527A1 WO 2021237527 A1 WO2021237527 A1 WO 2021237527A1 CN 2020092685 W CN2020092685 W CN 2020092685W WO 2021237527 A1 WO2021237527 A1 WO 2021237527A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- identity information
- security domain
- resource
- discovery request
- Prior art date
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 47
- 238000003672 processing method Methods 0.000 title claims abstract description 31
- 238000000034 method Methods 0.000 claims abstract description 58
- 230000015654 memory Effects 0.000 claims description 53
- 238000004590 computer program Methods 0.000 claims description 30
- 238000012545 processing Methods 0.000 claims description 24
- 238000012790 confirmation Methods 0.000 claims description 17
- 238000004891 communication Methods 0.000 claims description 15
- 238000010586 diagram Methods 0.000 description 23
- 230000008569 process Effects 0.000 description 22
- 230000006870 function Effects 0.000 description 8
- 230000002452 interceptive effect Effects 0.000 description 8
- 230000001360 synchronised effect Effects 0.000 description 8
- 230000007246 mechanism Effects 0.000 description 6
- 230000003068 static effect Effects 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000005291 magnetic effect Effects 0.000 description 3
- 238000010276 construction Methods 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000005294 ferromagnetic effect Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000000523 sample Substances 0.000 description 1
- 239000000779 smoke Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2807—Exchanging configuration information on appliance services in a home automation network
- H04L12/2809—Exchanging configuration information on appliance services in a home automation network indicating that an appliance service is present in a home automation network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/61—Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio
- H04L65/611—Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for multicast or broadcast
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/61—Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio
- H04L65/612—Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for unicast
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/146—Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/51—Discovery or management thereof, e.g. service location protocol [SLP] or web services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/086—Access security using security domains
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L2012/2847—Home automation networks characterised by the type of home appliance used
- H04L2012/285—Generic home appliances, e.g. refrigerators
Definitions
- This application relates to the technical field of the Internet of Things, and in particular to an information processing method and device, equipment, and computer storage medium.
- IOT Internet of Things
- a first device such as a client
- second devices such as a server
- each second device that receives the discovery request The device will respond to the discovery request and return its own resource list to the first device.
- the first device will receive multiple resource lists returned by the second device, and the received resource list is likely to include information that the first device does not expect (for example, the second device that cannot be controlled by the first device returns The list of resources); in this way, information redundancy is caused, and the data processing efficiency of the first device is reduced.
- the embodiments of the present application provide an information processing method and device, equipment, and computer storage medium.
- an embodiment of the present application provides an information processing method applied to a first device, and the method includes:
- the first discovery request information is used to request target resources of a target device that matches the first identity information;
- an embodiment of the present application provides an information processing method applied to a second device, and the method includes:
- the first discovery request information includes first identity information of the first security domain; the first discovery request information is used to request target resources of a target device that matches the first identity information;
- an embodiment of the present application provides an information processing device, an application and a first device, and the information processing device includes:
- the first obtaining unit is configured to obtain the first identity information of the first security domain
- a first processing unit configured to obtain first discovery request information based on the first identity information; the first discovery request information is used to request target resources of a target device that matches the first identity information;
- the first transceiver unit is configured to send the first discovery request information.
- an embodiment of the present application provides an information processing device, which is applied to a second device, and the information processing device includes:
- the second transceiving unit is configured to receive first discovery request information; the first discovery request information includes first identity information of the first security domain; the first discovery request information is used to discover a match with the first identity information The target resource of the target device;
- the second processing unit is configured to determine whether to send the target resource based on the first identity information.
- an embodiment of the present application provides a device, the device including: a first transceiver, a first processor, and a first memory storing a computer program;
- the first processor is configured to implement communication with another device through the transceiver; wherein,
- the first processor is further configured to execute the steps of the information processing method described in the first aspect when running the computer program stored in the first memory in conjunction with the first transceiver.
- an embodiment of the present application provides a device, the device including: a second transceiver, a second processor, and a second memory storing a computer program;
- the second processor is configured to implement communication with another device through the transceiver; wherein,
- the second processor is further configured to execute the steps of the information processing method in the second aspect when running the computer program stored in the second memory in conjunction with the second transceiver.
- an embodiment of the present application provides a computer-readable storage medium having a computer program stored thereon, and the computer program is executed by a first processor to implement the steps of the method described in the first aspect; or; the computer program The steps of the method described in the second aspect are executed by the second processor.
- the first device obtains the first identity information of the first security domain; obtains the first discovery request information based on the first identity information; The first discovery request information is used to request a target resource of a target device that matches the first identity information; and the first discovery request information is sent. That is, the first discovery request information is only used to request the target resource stored in the target device that matches the first security domain. In this way, the information received by the first device is all related to the first security domain (that is, the first identity information). ) The target resource of the matched target device; in this way, the redundancy of information is reduced, and the processing efficiency of the first device is improved.
- FIG. 1 is a schematic diagram of an application scenario of an exemplary discovery process provided by an embodiment of the application
- Figure 2 is a schematic diagram of a network structure provided by an embodiment of the application.
- FIG. 3 is a schematic diagram 1 of the flow of an information processing method provided by an embodiment of this application.
- FIG. 4 is a schematic diagram 2 of the flow of an information processing method provided by an embodiment of this application.
- FIG. 5 is a third schematic flowchart of an information processing method provided by an embodiment of this application.
- FIG. 6 is a fourth flowchart of an information processing method provided by an embodiment of this application.
- FIG. 7 is a schematic diagram of an application scenario of an information processing method provided by an embodiment of this application.
- FIG. 8 is a schematic diagram 1 of a device discovery or resource discovery process provided by an embodiment of this application.
- FIG. 9 is a second schematic diagram of a device discovery or resource discovery process provided by an embodiment of this application.
- FIG. 10 is a third schematic diagram of a device discovery or resource discovery process according to an embodiment of this application.
- FIG. 11 is a schematic diagram 1 of the structural composition of an information processing device provided by an embodiment of this application.
- FIG. 12 is a second schematic diagram of the structural composition of an information processing device provided by an embodiment of this application.
- FIG. 13 is a schematic diagram 1 of a first device hardware structure provided by an embodiment of this application.
- FIG. 14 is a second schematic diagram of the hardware structure of a second device provided by an embodiment of the application.
- the well-known resource oic/res resource can be used as the default discovery mechanism.
- the application scenario may include multiple server devices (including the refrigerator 11, the light 12, and the temperature sensor 13 as shown in FIG. 1) and a client device (as shown in FIG. 1).
- the smartphone shown is 14).
- the specific discovery process is as follows:
- Each server device can update the discoverable resources to the local /oic/res resource of the server, that is, every time a new discoverable resource is instantiated on the server device, The instantiated resource needs to be updated to the local /oic/res resource of the server device.
- the client device can send a retrieval (RETRIEVE) request to the /oic/res resources of multiple server devices.
- RETRIEVE retrieval
- the client device can use query conditions in the RETRIEVE request to limit the discovered objects.
- the query conditions can be limited based on resource types, interfaces, or attributes.
- the server device receiving the RETRIEVE request responds to the request and returns the resource list saved in the /oic/res resource.
- the resource list received by the client device may contain information that the client device does not expect, such as a resource list returned by a server device that is not in the same security domain as the client device, or a server device that is not controlled by the client device List of returned resources, etc. In this way, information redundancy is caused, and the data processing efficiency of the client device is reduced.
- FIG. 2 is a schematic diagram of a network structure 200 to which the embodiment of the application is applicable.
- the network structure 200 includes a client device 210 and a server device 220.
- the client device 210 refers to a device that accesses resources
- the server device refers to a device that provides resources.
- the client device has the function of querying and controlling other devices, and the server device can be queried and controlled by other devices; that is, in the network structure 200 provided by the implementation of this application, any device that has the function of querying and controlling other devices Devices can be used as client devices.
- any device that can be queried and controlled can be used as a server device.
- a device such as a light bulb
- a device that implements a certain basic function can only be used as a server and provided to the client for query and control. It does not need to control or query other devices.
- the client device 210 and the server device 220 involved in the embodiments of this application include, but are not limited to, smart phones, tablets, laptops, wearable devices, in-vehicle devices, smart home devices, smart security devices, etc.
- Smart home devices include but are not limited to smart air conditioners, refrigerators, smart door locks, smart lamps, etc.
- Smart security devices include but are not limited to smoke and gas alarm devices, infrared probes, infrared fences, etc.
- Figure 2 exemplarily shows one client device 210 and two server devices 220.
- the network structure may include multiple client devices and other numbers of server devices. Not limited.
- FIG. 3 is a schematic diagram 1 of the flow of an information processing method provided by an embodiment of the present application.
- the execution subject of the information processing method is a first device, and the first device may be the client device 210 shown in FIG. 2.
- the information processing method includes the following.
- Step 310 Obtain the first identity information of the first security domain.
- the security domain can also be referred to as a security domain network, which is a specific Internet of Things network.
- the security domain network has an independent security protocol (or security mechanism), and IoT devices in the same security domain network can interconnect, communicate, discover each other, and transmit instructions to each other. It is understandable that two devices that are not in the same security domain network are restricted by the security protocol in the security domain network, and therefore cannot mutually access the Internet of Things devices in the other's security domain network.
- the related information of the security domain to which each device belongs can be configured by the user, or can be configured by other devices (for example, an Internet of Things server), which is not limited in the embodiment of the present application.
- the relevant information of the security domain to which the device belongs includes at least the identity information of the security domain; here, the identity information of the security domain can identify the security domain.
- the identity information of the security domain may include identification information of the security domain and/or name information of the security domain.
- the first identity information may include identification information of the first security domain and/or name information of the first security domain.
- the first security domain may be the security domain to which the first device belongs; the first security domain may also be any security domain except the security domain to which the first device belongs.
- a security domain is not limited.
- Step 320 Obtain first discovery request information based on the first identity information; the first discovery request information is used to request a target resource of a target device that matches the first identity information;
- the first device may construct the first discovery request information based on the first identity information; that is, the first discovery request information carries the first identity information, which is used to request the network and the first discovery request information. A target resource stored in a target device whose identity information matches.
- the first device adds the security domain-based filter condition to the first discovery request information, so that only the device that receives the first discovery request information and the identity information of the security domain matches the first identity information will respond to the first discovery request information.
- Discovery request information thereby avoiding that all devices in the network that have received the discovery request information return a resource list, leading to the problem of information redundancy.
- the discovery of the target resource of the target device that matches the first identity information through the first discovery request in this embodiment of the application can have two meanings: first, the first device accesses the local area network for the first time or starts the device discovery mechanism When the first discovery request is used to discover the target device in the local area network that matches the first identity information, and the target resource stored in each target device; second, the first device may be started when the location of the device in the local area network is known In the resource discovery mechanism, the target resource stored in the known device in the local area network is discovered through the first discovery request. That is, the first discovery request in the embodiment of the present application can be used to realize device discovery in the network, and can also realize resource discovery in the network.
- Step 330 Send the first discovery request information.
- the first device may send the first discovery request information to at least one second device.
- the second device may be the server device 220 and the server device 230 shown in FIG. 2.
- the first device may send the first discovery request information to at least one second device in a broadcast or multicast manner.
- the first device sending the first discovery request information to at least one second device in a broadcast or multicast manner may be executed when the first device accesses the local area network for the first time or starts the device discovery mechanism.
- the first device may also send the first discovery request information to the at least one second device in a unicast manner.
- the first device sending the first discovery request information in a unicast manner may be executed when the address of the second device is known.
- the first device obtains the first identity information of the first security domain; further, based on the first identity information, the first discovery request information is obtained; the first discovery request information is used After requesting to match the target resource of the target device with the first identity information; sending the first discovery request information. That is, the first discovery request information is only used to request the target resource stored in the target device that matches the first security domain. In this way, the information received by the first device is all related to the first security domain (that is, the first identity information). ) The target resource of the matched target device; in this way, the redundancy of information is reduced, and the processing efficiency of the first device is improved.
- the implementation process of obtaining the first identity information of the first security domain is:
- the identity information of the security domain to which the first device belongs is determined as the first identity information of the first security domain.
- the first security domain may be the security domain to which the first device belongs
- the first identity information is the identity information of the security domain to which the first device belongs.
- the first device can view the locally configured security domain resource, that is, the security domain information stored in the /oic/sec/sdi resource, and find the first identity information in the security domain information.
- the first identity information may be security domain identification information and/or security domain name information of the security domain to which the first device belongs.
- the first device determines the identity information of the security domain to which the first device belongs as the first identity information of the first security domain, and constructs the first discovery request information. In this way, by directly using the identity information of the security domain to which one belongs as the first identity information to construct the first discovery request information, it is possible to accurately discover devices in the same security domain as the first device, that is, devices that can communicate with the first device. Improve discovery efficiency.
- the implementation process of obtaining the first identity information of the first security domain is:
- the setting instruction includes identity information of a specific security domain
- the first device can obtain the setting instruction input by the user through any type of input module, and respond to the received setting instruction, and include the identity information of the specific security domain carried in the setting instruction, Set as the first identity information of the first security domain, that is, the first identity information may be the identity information of any security domain entered by the user.
- the identity information of a specific security domain input by the user may be security domain identification information of any security domain, and/or security domain name information.
- the first device constructs the first discovery request information based on the first identity information.
- the first device can construct the first discovery request information based on the identity information of any security domain entered by the user to discover the target information of the target device that matches the entered security domain, that is, the information that the user expects to obtain; device discovery is improved, And the flexibility of resource discovery.
- step 320 the following steps are further included before obtaining the first discovery request information based on the first identity information in step 320 :
- Step 311 Obtain the privacy identifier of the security domain to which the first device belongs.
- Step 312 If the privacy identifier indicates that the resource of the first device is a private resource, then generating and presenting confirmation information; the confirmation information is used to confirm whether discovery is based on the identity information of the security domain;
- Step 313 Receive feedback information for the confirmation information.
- step 320 obtains the first discovery request information based on the first identity information, which can be implemented through step 320':
- Step 320' If the feedback information indicates discovery based on the identity information of the security domain, construct first discovery request information based on the first identity information.
- the security domain information of each device may also include a privacy identifier priv.
- the privacy identifier can be used to indicate the visibility of the security domain information in the device, and can also be understood as the visibility of the security domain resources.
- the privacy identifier priv of a device When the privacy identifier priv of a device is set to "false", it is considered that the security domain resources of the device are visible, so that the security domain information of the device is disclosed in the /oic/res resource of the device (specifically, it can be the identity of the security domain) information).
- the privacy flag priv of a device When the privacy flag priv of a device is set to "true”, the security domain resource of the device is considered to be an invisible resource, so that the security domain information of the device is not disclosed in the /oic/res resource of the device (specifically, it can be Security domain identity information).
- the first device may first check whether its privacy identifier indicates that the security domain resource of the first device is an invisible resource.
- the security domain resource of the first device is an invisible resource, there may be a risk of resource leakage when performing device discovery and resource discovery. Therefore, when the privacy identifier indicates that the resource of the first device is an invisible resource, it is also necessary to confirm to the user whether to perform discovery based on the security domain.
- the first device may present confirmation information to the user through the interactive interface of the display device to inquire whether to perform device discovery or resource discovery based on the security domain.
- the first device waits for the feedback information input by the user after outputting the confirmation information. If the received feedback information is used to indicate discovery based on the identity information of the security domain, the first discovery request information is obtained based on the first identity information. In this way, the security of data transmission is improved.
- steps 311 to 313 may be executed before step 310, may also be executed after step 310, or may be executed simultaneously with step 310.
- steps 311 to 313 may be executed before step 310, may also be executed after step 310, or may be executed simultaneously with step 310.
- the embodiments of this application are not limited here.
- step 320 obtains the first discovery request information based on the first identity information, including:
- URI uniform resource identifier
- the first discovery request information is constructed.
- the first device may determine the request address and the URI corresponding to the requested target resource according to the user's device discovery or resource discovery requirements after determining the first identity information of the first security domain. Further, the first discovery request information is constructed according to the URI of the target resource, the request address, and the first identity information.
- the request address may be a multicast address.
- the request address may also be a unicast address.
- the request address can be determined according to the user's device discovery or resource discovery requirements. If the user needs to request all devices in the LAN, the requested address can be a multicast address. When the user knows the address of part of the device and needs to request the resource of that part of the device, he can directly use the address of the part of the device as the request address.
- the information processing method provided by the embodiment of the present application is described in detail above with reference to FIGS. 3 and 4 from the perspective of the first device.
- the following describes in detail the information processing method provided by the embodiment of the present application from the perspective of the second device with reference to FIG. 5 and FIG.
- the method used for information processing It should be understood that the description on the first device side and the description on the second device side correspond to each other, and similar descriptions can be referred to above. To avoid repetition, details are not repeated here.
- FIG. 5 is a schematic diagram of the third flow of an information processing method provided by an embodiment of the present application.
- the execution subject of the information processing method is a second device, and the second device may be the server device 220 or the server device 230 shown in FIG. 2.
- the information processing method includes the following.
- Step 510 Receive first discovery request information; the first discovery request information includes the first identity information of the first security domain; the first discovery request information is used to discover the target resource of the target device that matches the first identity information;
- the second device receives the first discovery request information sent by the first device.
- the second device receives the first discovery request information sent by the first device and forwarded by other devices.
- Step 520 Determine whether to send the target resource based on the first identity information.
- the first discovery request information is used to request the target resource stored in the target device that matches the first identity information.
- the second device can parse out the first identity information of the first security domain from the first discovery request information, and determine itself based on the first identity information Whether it matches with the first identity information, if it matches, respond to the first discovery request information and determine to send its own target resource; if it does not match, then do not respond to the first discovery request information and determine not to send its own target resource.
- the second device matches the first identity information carried in the first discovery request information can it respond to the first discovery request information and return the target resource in the second device.
- the information received by the first device is the target resource of the target device that matches the first security domain (that is, the first identity information); in this way, the redundancy of the information is reduced and the processing efficiency of the first device is improved.
- the implementation process of determining whether to send the target resource of the second device based on the first identity information is:
- Step 5201 Obtain resource description information of the second device.
- the resource description information of the second device may be attribute information in the /oic/res resource of the second device.
- Step 5202 Determine whether the resource description information of the second device includes the second identity information; the second identity information is the identity information of the security domain to which the second device belongs;
- the second identity information may include identification information of the security domain to which the second device belongs and/or name information of the security domain to which the second device belongs.
- the second device may search for the identification information of the security domain to which the second device belongs and/or the name information of the security domain to which the second device belongs from the attribute information of the /oic/res resource.
- the second device when the first identity information is the identification information of the first security domain, the second device needs to obtain the identification information of the security domain to which it belongs to match the first identity information.
- the first identity information is the name information of the first security domain
- the second device needs to obtain the name information of the security domain to which the second device belongs to match the first identity information.
- the first identity information is the identification information and name information of the first security domain
- the second device needs to obtain the identification information and name information of the security domain to which the second device belongs to match the first identity information.
- the identity information is matched, which is not limited here in the embodiment of the present application.
- Step 5203 If the resource description information of the second device includes the second identity information, and the second identity information matches the first identity information, determine the target resource to be sent.
- the second identity information matches the first identity information, it can be considered that the security domain of the second device and the security domain of the first device are the same security domain, and the second device responds to the first discovery request information, that is, the second device obtains The first discovers the target resource to be requested in the request information, and sends the target resource.
- Step 5204 If the resource description information of the second device includes the second identity information, and the second identity information does not match the first identity information, it is determined not to send the target resource.
- the second identity information does not match the first identity information, it can be considered that the security domain of the second device is not the same security domain as the security domain of the first device, and the second device does not respond to the first discovery request information, that is, the second device does not respond to the first discovery request information.
- the device does not send the target resource.
- Step 5205 If the resource description information of the second device does not include the second identity information, it is determined not to send the target resource.
- the resource description information of the second device does not include the second identity information, which may be caused by two situations: Case 1, the second device does not implement security domain resources, or the second device is not configured with security domain information; Case 2, The privacy flag in the security domain information of the second device is set to "true". In the above two cases, the second device and the first device cannot realize device discovery or resource discovery based on the security domain. Therefore, when the second identity information is included in the resource description information of the second device, the second device can determine that it is not In response to the first discovery request message, the target resource is not sent.
- the method further includes the following steps:
- the second device After the second device determines that the second identity information matches the first identity information, it can determine that it is the target device. After determining to send the target resource, the second device executes a response to the first discovery request information, that is, obtains the target resource required in the first discovery request, and sends the target resource to the first device.
- the second device sends the target resource to the first device in a unicast manner.
- the second device matches the first identity information carried in the first discovery request information can it respond to the first discovery request information and return the target resource in the second device.
- the information received by the first device is the target resource of the target device that matches the first security domain (that is, the first identity information); in this way, the redundancy of the information is reduced and the processing efficiency of the first device is improved.
- server devices in the local area network 700, namely device 1, device 2, and device 3, and one client device.
- Device 1, Device 2, and Device 3 form a multicast group named "All Nodes", where the multicast address of the "All Nodes" multicast group includes: multicast service address: ff02::158, port information 5683.
- An example of the /oic/res resource of device 1 is as follows (ignoring the list of common resources):
- An example of the /oic/res resource of device 2 is as follows (ignoring the list of common resources):
- the client device accesses the local area network 700 for the first time or the client device starts the device discovery mechanism, refer to the device discovery or resource discovery flow diagram 1 shown in FIG. 8.
- the operation flow of the client device includes the following steps:
- Step 1 The client device (ie, the first device) checks its own security domain information, and obtains the identity information of the security domain to which the client device belongs.
- the identity information of the security domain to which the client belongs is security domain identification information (sduuid); for example, the sduuid of the client device is 12345678-1234-1234-1234-123412341234.
- the identity information of the security domain to which the client belongs may also be security domain name information (sdname).
- sdname security domain name information
- the sdname of the client device is Alice’s Home.
- sduuid and sdname can also be used as the identity information of the security domain to which the client belongs.
- Step 2 The client device (ie, the first device) constructs the first discovery request information based on the identity information obtained in step 1, and the first discovery request may be sent in a multicast manner.
- the client device when the client device needs to perform device discovery, it can join the "all nodes" multicast group shown in FIG. All devices send the first discovery request, and the URI of the requested resource is "/oic/res".
- the first discovery request information may be constructed based on the Constrained Application Protocol (CoAP).
- CoAP Constrained Application Protocol
- the client device can be based on the multicast address ([ff02::158]:5683), The target resource oic/res and the sduuid value of the security domain to which the client device belongs construct the first discovery request information.
- the first discovery request information may be:
- Step 3 Device 1, device 2, and device 3 receive the first discovery request information, and parse out the target resource (i.e. /oic/res resource) indicated by the first discovery request information and the filter condition (i.e. the security of the client device Domain identity information), and then device 1, device 2, and device 3 determine whether there are sduuid and/or sdname attributes in the attributes of their/oic/res resources (that is, second identity information).
- the target resource i.e. /oic/res resource
- the filter condition i.e. the security of the client device Domain identity information
- the first identity information carried in the first discovery request information sent by the client device is sduuid
- device 1, device 2, and device 3 determine whether their /oic/res resources have the sduuid attribute.
- the first identity information carried in the first discovery request information sent by the client device is the sdname
- the device 1, the device 2, and the device 3 determine whether their /oic/res resources have the sduuid attribute.
- the first identity information carried in the first discovery request information sent by the client device is sduuid and sdname
- device 1, device 2, and device 3 determine whether their /oic/res resources have sduuid and sdname attributes.
- Step 4a After receiving the first discovery request information, the device 1 checks that the attribute information of its/oic/res resource includes the sduuid and/or sdname attributes.
- the sduuid value of device 1 is "12345678-1234-1234-1234-123412341234", and the value of sdname is "Alice's Home", which matches the sduuid and/or sdname value in the first discovery request.
- step 5a
- Step 5a Device 1 returns the /oic/res resource to the client device through unicast.
- device 1 returns the resource list "links" in the /oic/res resource, which specifically includes:
- Step 4b After receiving the first discovery request information, the device 2 checks that the attribute information of its/oic/res resource includes the sduuid and/or sdname attributes.
- the sduuid value of device 2 is "dc70373c-1e8d-4fb3-962e-017eaa863989", and the sdname value is "Bob's Home", which does not match the sduuid and/or sdname values in the first discovery request information.
- step 5b is performed.
- Step 5b The device 2 determines that it does not respond to the first discovery request information, that is, it does not send the /oic/res resource.
- Step 4c After receiving the first discovery request information, the device 3 checks that there is no sduuid and sdname attributes in the attribute information of its/oic/res resource.
- Step 5c The device 3 determines that it does not respond to the first discovery request information, that is, it does not send the /oic/res resource.
- steps 4a, 4b, and 4c can be performed at the same time.
- the client device receives the resource list returned by all discoverable devices in the same security domain as the client device in the local area network 700, and can display it to the user through an interactive interface for subsequent control.
- the information received by the client device is the device resource of the device that matches the security domain to which the client belongs; in this way, the redundancy of the information is reduced and the processing efficiency of the client device is improved.
- the client device that is, the first device described above performs LAN device discovery or The operation process of resource discovery includes the following steps:
- Step 1 The client device receives the setting instruction input by the user on the interactive interface, and the setting instruction is used to set the first identity information of the first security domain.
- the user can set the identity information of any security domain as a filter condition for device discovery. That is, the user can input the identity information of any security domain to form the first discovery request information, and discover the device in the same security domain as the security domain through the first discovery request information.
- the client device may receive the security domain identification information entered by the user on the interactive interface to construct the first discovery request information.
- the user enters the security domain identification information duuid in the interactive interface of the client device as "12345678-1234- 1234-1234-123412341234".
- the client device may receive the security domain name information input by the user on the interactive interface to construct the first discovery request information.
- the user inputs the security domain name information on the interactive interface of the client device as "Alice's Home".
- Step 2 The client device constructs a first discovery request message based on the first identity information obtained in step 1; and sends the first discovery request information in a multicast manner in the local area network 700.
- the client device can use the multicast address ([ff02::158]:5683), the target resource oic/ res, and the name information of the security domain to which the client device belongs, and the sdname value constructs the first discovery request information.
- the first discovery request information may be:
- Step 3 Device 1, device 2, and device 3 receive the first discovery request information, and parse out the target resource (ie /oic/res resource) and filter condition (ie, the first identity information of the first security domain set by the user), Furthermore, device 1, device 2, and device 3 determine whether there are sduuid and/or sdname attributes (that is, second identity information) in the attributes of their /oic/res resources.
- target resource ie /oic/res resource
- filter condition ie, the first identity information of the first security domain set by the user
- Step 4a After receiving the first discovery request information, the device 1 checks that the attribute information of its/oic/res resource includes the sduuid and/or sdname attributes.
- the sduuid value of device 1 is "12345678-1234-1234-1234-123412341234", and the value of sdname is "Alice's Home", which matches the sduuid and/or sdname value in the first discovery request.
- step 5a
- Step 5a Device 1 returns the /oic/res resource to the client device through unicast.
- device 1 returns the resource list "links" in the oic/res resource, which specifically includes:
- Step 4b After receiving the first discovery request information, the device 2 checks that the attribute information of its/oic/res resource includes the sduuid and/or sdname attributes.
- the sduuid value of device 2 is "dc70373c-1e8d-4fb3-962e-017eaa863989", and the sdname value is "Bob's Home", which does not match the sduuid and/or sdname values in the first discovery request information.
- step 5b is performed.
- Step 5b The device 2 determines that it does not respond to the first discovery request information, that is, it does not send the /oic/res resource.
- Step 4c After receiving the first discovery request information, the device 3 checks that there is no sduuid and sdname attributes in the attribute information of its/oic/res resource.
- Step 5c The device 3 determines that it does not respond to the first discovery request information, that is, it does not send the /oic/res resource.
- steps 4a, 4b, and 4c can be performed at the same time.
- the client device receives the resource list returned by all discoverable devices in the same security domain as the client device in the local area network 700, and can display it to the user for subsequent control. In this way, the redundancy of information is reduced, and the processing efficiency of the client device is improved.
- the client device that is, the first device described above performs LAN device discovery or The operation process of resource discovery includes the following steps:
- Step 1 The client device (ie, the first device) checks its own security domain information, and obtains the identity information of the security domain to which the client device belongs.
- the identity information of the security domain to which the client belongs is security domain identification information (sduuid); for example, the sduuid of the client device is 12345678-1234-1234-1234-123412341234.
- the identity information of the security domain to which the client belongs may also be security domain name information (sdname).
- sdname security domain name information
- the sdname of the client device is Alice’s Home.
- sduuid and sdname can also be used as the identity information of the security domain to which the client belongs.
- Step 2 The client device checks the privacy identifier in its own security domain information, that is, the value of the priv attribute.
- the confirmation message is used to ask the user whether to perform device discovery based on the identity information of the security domain And/or resource discovery.
- Step 4 The client device receives feedback information input by the user, and the feedback information indicates discovery based on the identity information of the security domain.
- Step 5 The client device constructs first discovery request information based on the identity information obtained in step 1, and the first discovery request may be sent in a multicast manner.
- the first discovery request information may be:
- Step 6 Device 1, device 2, and device 3 receive the first discovery request information, and parse out the target resource (ie /oic/res resource) indicated by the first discovery request information, and filter conditions (ie, the security of the client device Domain identity information), and then device 1, device 2, and device 3 determine whether there are sduuid and/or sdname attributes in the attributes of their/oic/res resources (that is, second identity information).
- target resource ie /oic/res resource
- filter conditions ie, the security of the client device Domain identity information
- the first identity information carried in the first discovery request information sent by the client device is sduuid
- device 1, device 2, and device 3 determine whether their /oic/res resources have the sduuid attribute.
- the first identity information carried in the first discovery request information sent by the client device is the sdname
- the device 1, the device 2, and the device 3 determine whether their /oic/res resources have the sduuid attribute.
- the first identity information carried in the first discovery request information sent by the client device is sduuid and sdname
- device 1, device 2, and device 3 determine whether their /oic/res resources have sduuid and sdname attributes.
- Step 7a After receiving the first discovery request information, the device 1 checks that the attribute information of its/oic/res resource includes the sduuid and/or sdname attributes.
- the sduuid value of device 1 is "12345678-1234-1234-1234-123412341234", and the value of sdname is "Alice's Home", which matches the sduuid and/or sdname value in the first discovery request.
- step 8a is performed.
- Step 8a Device 1 returns the /oic/res resource to the client device in a unicast manner.
- device 1 returns the resource list "links" in the /oic/res resource, which specifically includes:
- Step 7b After receiving the first discovery request information, the device 2 checks that the attribute information of its/oic/res resource includes the sduuid and/or sdname attributes.
- the sduuid value of device 2 is "dc70373c-1e8d-4fb3-962e-017eaa863989", and the sdname value is "Bob's Home", which does not match the sduuid and/or sdname values in the first discovery request information.
- step 8b is performed.
- Step 8b The device 2 determines that it does not respond to the first discovery request information, that is, it does not send the /oic/res resource.
- Step 7c After receiving the first discovery request information, the device 3 checks that there is no sduuid and sdname attributes in the attribute information of its/oic/res resource.
- step 8c is performed.
- Step 8c The device 3 determines that it does not respond to the first discovery request information, that is, it does not send the /oic/res resource.
- steps 7a, 7b, and 7c can be performed at the same time.
- the client device receives the resource list returned by all discoverable devices in the same security domain as the client device in the local area network 700, and can display it to the user for subsequent control. In this way, the redundancy of information is reduced, and the processing efficiency of the client device is improved.
- an embodiment of the present application provides an information processing device, which can be applied to the first device described above.
- the information processing device includes:
- the first obtaining unit 1101 is configured to obtain the first identity information of the first security domain
- the first processing unit 1102 is configured to obtain first discovery request information based on the first identity information; the first discovery request information is used to request a target resource of a target device that matches the first identity information;
- the first transceiver unit 1103 is configured to send the first discovery request information.
- the first obtaining unit 1101 is further configured to determine the identity information of the security domain to which the first device belongs as the first identity information of the first security domain.
- the first obtaining unit 1101 obtains a setting instruction;
- the setting instruction includes identity information of a specific security domain;
- the first processing unit 1102 is configured to respond to the setting instruction and determine the first identity information of the first security domain by using the identity information of the specific security domain.
- the first obtaining unit 1101 is configured to obtain the privacy identifier of the security domain to which the first device belongs;
- the first processing unit 1102 is configured to generate and present confirmation information if the privacy identifier indicates that the resource of the first device is a private resource; the confirmation information is used to confirm whether discovery is based on the identity information of the security domain;
- the first transceiver unit 1103 is configured to receive feedback information for the confirmation information
- the first processing unit 1102 is configured to, if the feedback information indicates discovery based on the identity information of the security domain, construct the first discovery request information based on the first identity information.
- the first transceiving unit 1103 is configured to send the first discovery request information to at least one second device.
- the first identity information includes identification information of the first security domain and/or name information of the first security domain.
- the first obtaining unit 1101 is configured to obtain the resource uniform identifier of the target resource and the request address;
- the first processing unit 1102 is configured to construct the first discovery request information based on the resource uniform identifier of the target resource, the request address, and the first identity information.
- the request address is a multicast address.
- an embodiment of the present application provides an information processing device, which can be applied to the second device described above.
- the information processing device includes:
- the second transceiving unit 1201 is configured to receive first discovery request information; the first discovery request information includes first identity information of the first security domain; the first discovery request information is used for discovering and the first identity information The target resource of the matched target device;
- the second processing unit 1202 is configured to determine whether to send the target resource based on the first identity information.
- the second processing unit 1202 is further configured to determine whether the resource description information of the second device includes second identity information; the second identity information is the identity of the security domain to which the second device belongs Information; if the resource description information includes the second identity information, and the second identity information matches the first identity information, it is determined to send the target resource.
- the second processing unit 1202 is further configured to determine that if the resource description information includes the second identity information, and the second identity information does not match the first identity information, Send the target resource.
- the second processing unit 1202 is further configured to determine not to send the target resource if the resource description information of the second device does not include the second identity information.
- the information processing device further includes a second acquiring unit
- the second processing unit 1202 is configured to determine that the second device is the target device
- a second acquiring unit configured to acquire the target resource in the second device
- the second transceiver unit 1201 is configured to send the target resource to the first device.
- the application embodiment also provides a device.
- the first device shown in FIG. 13 includes: a first transceiver 1301, a first processor 1302, and a first memory 1303 storing a computer program;
- the first transceiver 1301, the first processor 1302, and the first memory 1303 communicate through a first communication bus 1304;
- the first processor is configured to implement communication with another device through the first transceiver 1301; wherein,
- the first processor 1302 runs the computer program stored in the first memory 1303, it executes the following steps: obtain the first identity information of the first security domain; and obtain the first identity information based on the first identity information.
- Discovery request information the first discovery request information is used to request the target resource of the target device that matches the first identity information
- the first transceiver 1301 when running the computer program stored in the first memory 1303 , Perform the following steps: send the first discovery request information.
- the first processor 1302 when the first processor 1302 runs the computer program stored in the first memory 1303, it executes the following steps: Determine the identity information of the security domain to which the first device belongs as the first The first identity information of the security domain.
- the first processor 1302 when the first processor 1302 runs the computer program stored in the first memory 1303, it executes the following steps: obtaining a setting instruction; the setting instruction includes identity information of a specific security domain; and responding to the Setting instructions, and determining the first identity information of the first security domain with the identity information of the specific security domain.
- the first processor 1302 when the first processor 1302 runs the computer program stored in the first memory 1303, it performs the following steps: obtain the privacy identifier of the security domain to which the first device belongs; if the privacy identifier indicates If the resource of the first device is a private resource, then confirmation information is generated and presented; the confirmation information is used to confirm whether discovery is based on the identity information of the security domain; receiving feedback information for the confirmation information; if the feedback information Instructing to perform discovery based on the identity information of the security domain, then construct the first discovery request information based on the first identity information.
- the first transceiver 1301 when the first transceiver 1301 runs the computer program stored in the first memory 1303, it performs the following steps: sending the first discovery request information to at least one second device.
- the first identity information includes identification information of the first security domain and/or name information of the first security domain.
- the following steps are performed: obtain the resource uniform identifier URI of the target resource, and the request address; resources based on the target resource A uniform identifier, the request address, and the first identity information construct the first discovery request information.
- the requested address is a multicast address.
- the application embodiment also provides a device.
- a device Refer to the schematic diagram of the hardware structure of a second device shown in FIG. 13.
- the second device shown in FIG. 14 includes: a second transceiver 1401, a second processor 1402, and a second memory 1403 storing a computer program;
- the second transceiver 1401, the second processor 1402, and the second memory 1403 communicate through a second communication bus 1404;
- the second processor 1402 is configured to implement communication with another device through the second transceiver 1401; wherein,
- the second transceiver 140 when running the computer program stored in the second memory 1403, executes the following steps: receiving first discovery request information; the first discovery request information includes the first identity information of the first security domain The first discovery request information is used to request target resources of a target device that matches the first identity information;
- the second processor 1402 runs the computer program stored in the second memory 1403, it executes the following steps: based on the first identity information, determine whether to send the target resource.
- the second processor 1402 when the second processor 1402 runs the computer program stored in the second memory 1403, it may also perform the following steps: obtain the resource description information of the second device; determine the resource description Whether the information includes second identity information; the second identity information is the identity information of the security domain to which the second device belongs; if the resource description information includes the second identity information, and the second identity information If it matches the first identity information, it is determined to send the target resource.
- the second processor 1402 when running the computer program stored in the second memory 1403, may also perform the following steps: if the resource description information includes the second identity information, and If the second identity information does not match the first identity information, it is determined not to send the target resource.
- the second processor 1402 when the second processor 1402 runs the computer program stored in the second memory 1403, it may also perform the following steps: if the resource description information does not include the second identity information, It is determined not to send the target resource.
- the second processor 1402 when the second processor 1402 runs the computer program stored in the second memory 1403, it may also perform the following steps: determine that the second device is the target device, and obtain the The target resource in the second device;
- the second transceiver 1401 executes the following steps when running the computer program stored in the second memory 1403: sending the target resource to the first device.
- first memory and the second memory in this embodiment may be volatile memory or non-volatile memory, and may also include both volatile and non-volatile memory.
- non-volatile memory can be Read Only Memory (ROM), Programmable Read-Only Memory (PROM), Erasable Programmable Read-Only Memory (Erasable Programmable Read-Only Memory) , EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Ferromagnetic Random Access Memory (FRAM), Flash Memory, Magnetic Surface Memory , CD-ROM, or CD-ROM (Compact Disc Read-Only Memory, CD-ROM); magnetic surface memory can be disk storage or tape storage.
- the volatile memory may be a random access memory (Random Access Memory, RAM), which is used as an external cache.
- RAM Random Access Memory
- SRAM static random access memory
- SSRAM synchronous static random access memory
- dynamic random access memory dynamic random access memory
- DRAM Dynamic Random Access Memory
- SDRAM Synchronous Dynamic Random Access Memory
- DDRSDRAM Double Data Rate Synchronous Dynamic Random Access Memory
- ESDRAM Double Data Rate Synchronous Dynamic Random Access Memory
- ESDRAM Enhanced Synchronous Dynamic Random Access Memory
- SLDRAM synchronous connection dynamic random access memory
- SLDRAM synchronous connection dynamic random access memory
- DDRRAM direct memory bus random access memory
- DRRAM Direct Rambus Random Access Memory
- the embodiment of the present application also provides a computer storage medium, which is specifically a computer-readable storage medium.
- Computer instructions are stored thereon.
- the computer storage medium is located in the terminal, when the computer instructions are executed by the processor, any step in the information processing method described in the embodiment of the present application is implemented.
- the size of the sequence numbers of the above-mentioned processes does not mean the order of execution, and the execution order of each process should be determined by its function and internal logic, and should not correspond to the embodiments of the present application.
- the implementation process constitutes any limitation.
- the disclosed system, device, and method can be implemented in other ways.
- the device embodiments described above are merely illustrative, for example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or It can be integrated into another system, or some features can be ignored or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
- the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
- the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
- the technical solution of this application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disks or optical disks and other media that can store program codes. .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Automation & Control Theory (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (18)
- 一种信息处理方法,其中,应用于第一设备,所述方法包括:获取第一安全域的第一身份信息;基于所述第一身份信息,得到第一发现请求信息;所述第一发现请求信息用于请求与所述第一身份信息匹配的目标设备的目标资源;发送所述第一发现请求信息。
- 根据权利要求1所述的方法,其中,所述获取第一安全域的第一身份信息,包括:将所述第一设备所属安全域的身份信息,确定为所述第一安全域的第一身份信息。
- 根据权利要求1所述的方法,其中,所述获取第一安全域的第一身份信息,包括:获取设置指令;所述设置指令包括特定安全域的身份信息;响应所述设置指令,并将所述特定安全域的身份信息确定所述第一安全域的第一身份信息。
- 根据权利要求1-3任一项所述的方法,其中,所述基于所述第一身份信息,得到第一发现请求信息之前,还包括:获取所述第一设备所属安全域的隐私标识;若所述隐私标识指示所述第一设备的资源为私有资源,则生成并呈现确认信息;所述确认信息用于确认是否基于安全域的身份信息进行发现;接收针对所述确认信息的反馈信息;所述基于所述第一身份信息,得到第一发现请求信息,包括:若所述反馈信息指示基于安全域的身份信息进行发现,则基于所述第一身份信息,构建所述第一发现请求信息。
- 根据权利要求1-4任一项所述的方法,其中,所述发送所述第一发现请求信息,包括:向至少一个第二设备发送所述第一发现请求信息。
- 根据权利要求1-5任一项所述的方法,其中,第一身份信息包括所述第一安全域的标识信息和/或所述第一安全域的名称信息。
- 根据权利要求1-6任一项所述的方法,其中,所述基于所述第一身份信息,得到第一发现请求信息,包括:获取目标资源的资源统一标识符URI,以及请求地址;基于目标资源的资源统一标识符,所述请求地址,以及所述第一身份信息,构建所述第一发现请求信息。
- 根据权利要求7所述的方法,其中,所述请求地址为多播地址。
- 一种信息处理方法,其中,应用于第二设备,所述方法包括:接收第一发现请求信息;所述第一发现请求信息包括第一安全域的第一身份信息;所述第一发现请求信息用于请求与所述第一身份信息匹配的目标设备的目标资源;基于所述第一身份信息,确定是否发送所述目标资源。
- 根据权利要求9所述的方法,其中,所述基于所述第一身份信息,确定是否发送所述目标资源,包括:获取所述第二设备的资源描述信息;判断所述资源描述信息中是否包括第二身份信息;所述第二身份信息为所述第二设备所属安全域的身份信息;若所述资源描述信息中包括所述第二身份信息,且所述第二身份信息与所述第一身份信息匹配,则确定发送所述目标资源。
- 根据权利要求10所述的方法,其中,所述方法还包括:若所述资源描述信息中包括所述第二身份信息,且所述第二身份信息与所述第一身份信息不匹配,则确定不发送所述目标资源。
- 根据权利要求10所述的方法,其中,所述方法还包括:若所述资源描述信息中不包括所述第二身份信息,则确定不发送所述目标资源。
- 根据权利要求9-12任一项所述的方法,其中,所述确定发送所述目标资源之后,还包括:确定所述第二设备为所述目标设备,并获取所述第二设备中所述目标资源;向第一设备发送所述目标资源。
- 一种信息处理装置,其中,应用与第一设备,所述信息处理装置包括:第一获取单元,配置为获取第一安全域的第一身份信息;第一处理单元,配置为基于所述第一身份信息,得到第一发现请求信息;所述第一发现请求信息用于请求与所述第一身份信息匹配的目标设备的目标资源;第一收发单元,配置为发送所述第一发现请求信息。
- 一种信息处理装置,其中,应用于第二设备,所述信息处理装置包括:第二收发单元,配置为接收第一发现请求信息;所述第一发现请求信息包括第一安全域的第一身份信息;所述第一发现请求信息用于发现与所述第一身份信息匹配的目标设备的目标资源;第二处理单元,配置为基于所述第一身份信息,确定是否发送所述目标资源。
- 一种设备,其中,所述设备包括:第一收发器、第一处理器和存储有计算机程序的第一存储器;所述第一收发器、所述第一处理器和所述第一存储器之间通过第一通信总线进行通信;所述第一处理器,配置为通过所述第一收发器实现与另一设备的通信;其中,所述第一处理器,还配置为结合所述第一收发器,运行所述第一存储器中存储的所述计算机程序时,执行权利要求1至8任一项所述方法的步骤。
- 一种设备,其中,所述设备包括:第二收发器、第二处理器和存储有计算机程序的第二存储器;所述第二收发器、所述第二处理器和所述第二存储器之间通过第二通信总线进行通信;所述第二处理器,配置为通过所述第二收发器实现与另一设备的通信;其中,所述第二处理器,还配置为结合所述第二收发器,运行所述第二存储器中存储的所述计算机程序时,执行权利要求9至13任一项所述方法的步骤。
- 一种计算机可读存储介质,其中,其上存储有计算机程序,所述计算机程序被第一处理器执行实现权利要求1至8任一项所述方法的步骤;或者;所述计算机程序被第二处理器执行9至13任一项所述方法的步骤。
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/092685 WO2021237527A1 (zh) | 2020-05-27 | 2020-05-27 | 信息处理方法及装置、设备、计算机存储介质 |
KR1020227045047A KR20230016652A (ko) | 2020-05-27 | 2020-05-27 | 정보 처리 방법 및 장치, 기기, 컴퓨터 저장 매체 |
CN202080093549.3A CN114982203A (zh) | 2020-05-27 | 2020-05-27 | 信息处理方法及装置、设备、计算机存储介质 |
EP20937418.0A EP4149060B1 (en) | 2020-05-27 | 2020-05-27 | Information processing method and apparatus, and device and computer storage medium |
JP2022572547A JP2023533134A (ja) | 2020-05-27 | 2020-05-27 | 情報処理方法及び装置、機器、コンピュータ記憶媒体 |
CN202211476242.9A CN115834202B (zh) | 2020-05-27 | 2020-05-27 | 信息处理方法及装置、设备、计算机存储介质 |
US17/991,405 US20230089609A1 (en) | 2020-05-27 | 2022-11-21 | Method and apparatus for processing information, and device and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/092685 WO2021237527A1 (zh) | 2020-05-27 | 2020-05-27 | 信息处理方法及装置、设备、计算机存储介质 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/991,405 Continuation US20230089609A1 (en) | 2020-05-27 | 2022-11-21 | Method and apparatus for processing information, and device and computer storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021237527A1 true WO2021237527A1 (zh) | 2021-12-02 |
Family
ID=78745503
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/092685 WO2021237527A1 (zh) | 2020-05-27 | 2020-05-27 | 信息处理方法及装置、设备、计算机存储介质 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20230089609A1 (zh) |
EP (1) | EP4149060B1 (zh) |
JP (1) | JP2023533134A (zh) |
KR (1) | KR20230016652A (zh) |
CN (2) | CN115834202B (zh) |
WO (1) | WO2021237527A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230216810A1 (en) * | 2020-10-09 | 2023-07-06 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Information processing method and apparatus, and storage medium |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP4149060B1 (en) * | 2020-05-27 | 2024-05-29 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Information processing method and apparatus, and device and computer storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1705947A (zh) * | 2003-10-24 | 2005-12-07 | 微软公司 | 服务发现及发布 |
CN101860474A (zh) * | 2009-04-08 | 2010-10-13 | 中兴通讯股份有限公司 | 基于对等网络的资源信息处理方法及对等网络 |
CN105144636A (zh) * | 2013-02-25 | 2015-12-09 | 高通股份有限公司 | 用于异构物联网(IoT)设备的适应性且可扩展的通用纲要 |
US20160006822A1 (en) * | 2014-07-01 | 2016-01-07 | Cable Television Laboratories, Inc. | Service discovery within multi-link networks |
CN105338510A (zh) * | 2015-09-23 | 2016-02-17 | 深圳市黑目云网络有限公司 | 近距离场景下的设备发现方法及系统 |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101431713B (zh) * | 2007-11-09 | 2010-07-14 | 中国移动通信集团公司 | 一种资源访问方法及设备 |
CN101582882B (zh) * | 2008-10-10 | 2011-04-20 | 华为技术有限公司 | 一种接入方法、网络系统和装置 |
US8627076B2 (en) * | 2011-09-30 | 2014-01-07 | Avaya Inc. | System and method for facilitating communications based on trusted relationships |
WO2013189059A1 (zh) * | 2012-06-21 | 2013-12-27 | 华为技术有限公司 | 报文处理方法、装置、主机和网络系统 |
CN108512870B (zh) * | 2017-02-27 | 2020-10-23 | 华为技术有限公司 | 接入物联网平台的方法、物联网平台和物联网设备 |
CN107196906A (zh) * | 2017-03-31 | 2017-09-22 | 山东超越数控电子有限公司 | 一种安全域网络接入控制方法及系统 |
WO2019075317A1 (en) * | 2017-10-12 | 2019-04-18 | Convida Wireless, Llc | INTERWORKING SERVICE FOR THE INTERNET OF RESTOUS OBJECTS |
CN110418311B (zh) * | 2018-04-28 | 2021-08-31 | 华为技术有限公司 | 一种基于多个终端的互联方法、装置及终端 |
CN108769009B (zh) * | 2018-05-28 | 2021-01-19 | 深圳和而泰数据资源与云技术有限公司 | 数据通信方法、智能设备及智能网关 |
CN110830990B (zh) * | 2018-08-09 | 2021-04-20 | 华为技术有限公司 | 一种身份信息的处理方法、装置及存储介质 |
CN110874804B (zh) * | 2018-08-30 | 2023-07-21 | 阿里巴巴(上海)有限公司 | 资源获取处理方法、装置和系统 |
CN110380963B (zh) * | 2019-01-17 | 2021-07-06 | 重庆邮电大学 | 一种高效快收敛的邻居发现方法 |
CN110516942A (zh) * | 2019-08-15 | 2019-11-29 | 平安普惠企业管理有限公司 | 资源申请方法、装置、设备及计算机可读存储介质 |
CN110635942B (zh) * | 2019-09-02 | 2022-11-04 | 上海商米科技集团股份有限公司 | 设备发现方法、物联网设备、物联网服务器 |
CN110620817A (zh) * | 2019-09-17 | 2019-12-27 | 安徽华速达电子科技有限公司 | 一种物联网设备快速连接方法及其系统 |
CN110717337A (zh) * | 2019-09-29 | 2020-01-21 | 北京声智科技有限公司 | 信息处理方法、装置、计算设备和存储介质 |
EP4080843B1 (en) * | 2020-01-17 | 2024-10-30 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Security information discovery method, security information configuration method, and device |
EP4149060B1 (en) * | 2020-05-27 | 2024-05-29 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Information processing method and apparatus, and device and computer storage medium |
-
2020
- 2020-05-27 EP EP20937418.0A patent/EP4149060B1/en active Active
- 2020-05-27 CN CN202211476242.9A patent/CN115834202B/zh active Active
- 2020-05-27 KR KR1020227045047A patent/KR20230016652A/ko not_active Application Discontinuation
- 2020-05-27 CN CN202080093549.3A patent/CN114982203A/zh active Pending
- 2020-05-27 JP JP2022572547A patent/JP2023533134A/ja active Pending
- 2020-05-27 WO PCT/CN2020/092685 patent/WO2021237527A1/zh active Application Filing
-
2022
- 2022-11-21 US US17/991,405 patent/US20230089609A1/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1705947A (zh) * | 2003-10-24 | 2005-12-07 | 微软公司 | 服务发现及发布 |
CN101860474A (zh) * | 2009-04-08 | 2010-10-13 | 中兴通讯股份有限公司 | 基于对等网络的资源信息处理方法及对等网络 |
CN105144636A (zh) * | 2013-02-25 | 2015-12-09 | 高通股份有限公司 | 用于异构物联网(IoT)设备的适应性且可扩展的通用纲要 |
US20160006822A1 (en) * | 2014-07-01 | 2016-01-07 | Cable Television Laboratories, Inc. | Service discovery within multi-link networks |
CN105338510A (zh) * | 2015-09-23 | 2016-02-17 | 深圳市黑目云网络有限公司 | 近距离场景下的设备发现方法及系统 |
Non-Patent Citations (1)
Title |
---|
See also references of EP4149060A4 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230216810A1 (en) * | 2020-10-09 | 2023-07-06 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Information processing method and apparatus, and storage medium |
US11991093B2 (en) * | 2020-10-09 | 2024-05-21 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Information processing method and apparatus, and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN115834202A (zh) | 2023-03-21 |
KR20230016652A (ko) | 2023-02-02 |
EP4149060A1 (en) | 2023-03-15 |
EP4149060B1 (en) | 2024-05-29 |
US20230089609A1 (en) | 2023-03-23 |
EP4149060A4 (en) | 2023-07-12 |
JP2023533134A (ja) | 2023-08-02 |
CN114982203A (zh) | 2022-08-30 |
CN115834202B (zh) | 2024-11-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230089609A1 (en) | Method and apparatus for processing information, and device and computer storage medium | |
WO2019042110A1 (zh) | 一种订阅发布方法及服务器 | |
US7292579B2 (en) | Processing operations associated with resources on a local network | |
WO2019024676A1 (zh) | 一种基于联盟链的链外数据访问方法和系统 | |
US20180063879A1 (en) | Apparatus and method for interoperation between internet-of-things devices | |
US10057208B2 (en) | Visibility control for domain name system service discovery | |
CN113452592B (zh) | 混合云架构下的跨云数据访问方法及装置 | |
WO2017007783A1 (en) | Wide area service discovery for internet of things | |
KR101701158B1 (ko) | 홈 네트워크의 장치에 대한 원격 접속 제공 방법 및 시스템 | |
JP2004252974A (ja) | ホームネットワークデバイスへの効率的なアクセスが可能な制御ポイントサーバシステム及びそのための方法 | |
US20180034923A1 (en) | Device discovery framework | |
WO2021056738A1 (zh) | 分布式系统nat穿透方法、装置、设备及存储介质 | |
US20230045914A1 (en) | Method and apparatus for controlling device in internet of things, and gateway device and storage medium | |
US20210383016A1 (en) | Systems and methods for obtaining anonymized information derived from data obtained from external data providers | |
US8051157B2 (en) | Discovery apparatus and method | |
US20190182356A1 (en) | Data networking method in data-centric network system and apparatus implementing same | |
WO2021253244A1 (zh) | 资源发布方法、装置、网关、云平台及计算机存储介质 | |
WO2018032705A1 (zh) | 用于提供无线接入点信息包的方法与设备 | |
JP4886027B2 (ja) | ネットワークでディスカバリーを実行する装置、システムおよびその方法 | |
CN116320059A (zh) | 楼宇协议数据处理方法、装置及系统 | |
US20050050180A1 (en) | Method of automatically determining device's nickname, and method of solving redundant nicknames for devices in network and network system thereof | |
US20090276496A1 (en) | Systems, methods and computer program products for building a user's buddy list through public group membership | |
JP2022162518A (ja) | 機器のレスポンスを用いて対象機器情報を決定するプログラム、装置及び方法、並びにデータベース構築装置 | |
CN118140497A (zh) | 订阅权限信息处理方法、装置、计算机设备及存储介质 | |
Oosterhaven et al. | A review of reference architectures enabling the Internet of Things |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20937418 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2022572547 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202217070656 Country of ref document: IN |
|
ENP | Entry into the national phase |
Ref document number: 20227045047 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2020937418 Country of ref document: EP Effective date: 20221209 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |