WO2023011016A1 - Internet of things device binding method, apparatus and system, and cloud server and storage medium - Google Patents

Internet of things device binding method, apparatus and system, and cloud server and storage medium Download PDF

Info

Publication number
WO2023011016A1
WO2023011016A1 PCT/CN2022/099279 CN2022099279W WO2023011016A1 WO 2023011016 A1 WO2023011016 A1 WO 2023011016A1 CN 2022099279 W CN2022099279 W CN 2022099279W WO 2023011016 A1 WO2023011016 A1 WO 2023011016A1
Authority
WO
WIPO (PCT)
Prior art keywords
cloud server
information
client
binding
authorization
Prior art date
Application number
PCT/CN2022/099279
Other languages
French (fr)
Chinese (zh)
Inventor
李辉
Original Assignee
深圳Tcl新技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳Tcl新技术有限公司 filed Critical 深圳Tcl新技术有限公司
Publication of WO2023011016A1 publication Critical patent/WO2023011016A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • G16Y30/10Security thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/084Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/48Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications

Definitions

  • the present application relates to the field of communication technology, and in particular to a binding method, device, system, cloud server and storage medium for IoT devices.
  • IoT Internet of Things
  • the user account information between the IoT system A and the IoT system B is generally bound based on a predetermined agreement, so it is necessary to The exchange of user information between the docking parties requires mutual trust based on the two parties.
  • this trust is generally guaranteed through business contracts, which makes the interconnection of devices in the Internet of Things into point-to-point communication. The cost high and inefficient.
  • Embodiments of the present application provide a method, device, system, cloud server, and storage medium for binding IoT devices, which can improve the efficiency of binding IoT devices.
  • an IoT device binding device including:
  • the first receiving module is configured to receive a first binding request for an IoT device initiated by a client, the client logging in with a user account;
  • a response module configured to, in response to the first binding request, indicate a second cloud server matching the IoT device, and perform identity verification on the first cloud server matching the client;
  • the second receiving module is configured to receive the first authorization and authentication information returned by the second cloud server, the first authorization and authentication information is sent after the second cloud server passes the identity verification of the first cloud server ;
  • the first binding module is configured to send second authorization and authentication information to the client according to the first authorization and authentication information, so that the client sends the second authorization and authentication information to the second cloud server based on the second authorization and authentication information.
  • a binding request, the second binding request is used to instruct the second cloud server to generate token information for the user account, and bind the IoT device based on the token information.
  • another IoT device binding device provided in the embodiment of the present application includes:
  • the third receiving module is configured to receive the verification request sent by the first cloud server, the verification request is a request sent by the first cloud server in response to the first binding request for the IoT device initiated by the client, the client There is a user account for terminal login;
  • a verification module configured to perform identity verification on the first cloud server based on the verification request
  • a sending module configured to send first authorization and authentication information to the first cloud server if the identity verification is passed, so that the first cloud server sends a second authorization to the client based on the first authorization and authentication information Certification Information;
  • the second binding module is configured to generate token information for the user account in response to the second binding request sent by the client based on the authorization and authentication information, and perform an authentication on the Internet of Things based on the token information
  • the device is bound.
  • the embodiment of the present application also provides an IoT device binding system, including a first cloud server, a second cloud server, a client matching the first cloud server, and a Matching IoT devices where:
  • the client is configured to send a binding request for the IoT device to the first cloud server, and the client is logged in with a user account;
  • the first cloud server is configured to, in response to the first binding request, send a verification request to the second cloud server, where the verification request carries verification information of the first cloud server;
  • the second cloud server is configured to perform identity verification on the first cloud server based on the verification information
  • the second cloud server is configured to return first authorization and authentication information to the first cloud server if the identity verification is passed;
  • the first cloud server is configured to send second authorization and authentication information to the client based on the first authorization and authentication information
  • the client is configured to send a second binding request to the second cloud server based on the second authorization and authentication information
  • the second cloud server is configured to, in response to the second binding request, generate token information for the user account logged in on the client based on the second authorization and authentication information, and send the token information to the the client;
  • the second cloud server is configured to bind the IoT device based on the token information
  • the client is configured to bind the user account with the IoT device based on the token information.
  • an embodiment of the present application also provides a cloud server, including a memory and a processor; the memory stores a computer program, and the processor is used to run the computer program in the memory to execute the cloud server provided in the embodiment of the present application. Any IoT device binding method.
  • the embodiment of the present application further provides a storage medium, the storage medium is used for storing a computer program, and the computer program is loaded by a processor to execute any IoT device binding method provided in the embodiment of the present application.
  • the first binding request for the IoT device is received from the client, and the client logs in with a user account; in response to the first binding request, the second cloud server that matches the IoT device is indicated, and the The first cloud server matched by the client performs identity verification; receives the first authorization authentication information returned by the second cloud server, and the first authorization authentication information is sent after the second cloud server passes the identity verification of the first cloud server; according to the The first authorization and authentication information sends second authorization and authentication information to the client, so that the client sends a second binding request to the second cloud server based on the second authorization and authentication information, and the second binding request is used to indicate
  • the second cloud server generates token information for the user account, and binds the IoT device based on the token information.
  • the user account logged in at the client and the IoT device pass the token information, and there is no need to exchange user information. Binding is carried out under certain circumstances, which can realize that there is no need to exchange user information between the first cloud server and the second cloud server, and under the premise that there is no need to guarantee through business contracts, the Internet of Things devices will be bound, which improves the IoT The efficiency of networked device binding protects the user's information security.
  • FIG. 1 is a scene diagram of an IoT device binding method provided in an embodiment of the present application
  • Fig. 2 is a flow chart of the IoT device binding method provided by the embodiment of the present application.
  • Fig. 3 is another flow chart of the IoT device binding method provided by the embodiment of the present application.
  • Fig. 4 is another flow chart of the IoT device binding method provided by the embodiment of the present application.
  • FIG. 5 is a schematic diagram of an IoT device binding device provided in an embodiment of the present application.
  • Fig. 6 is another schematic diagram of the IoT device binding device provided by the embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a cloud server provided by an embodiment of the present application.
  • Embodiments of the present application provide a method, device, system, cloud server, and storage medium for binding IoT devices.
  • the IoT device binding device can be integrated in computer devices such as cloud servers.
  • the cloud server can provide cloud service, cloud database, cloud computing, cloud function, cloud storage, network service, cloud communication, middleware service, domain name service, security service, content distribution service (Content Delivery Network, CDN), and cloud servers for basic cloud computing services such as big data and artificial intelligence platforms, but it is not limited to this.
  • the cloud server may be a first cloud server or a second cloud server.
  • FIG. 1 is a schematic diagram of an application scenario of an IoT device binding method provided by an embodiment of the present application.
  • the scenario may include a first cloud server, a second cloud server, a client, and an IoT device.
  • the client can send the first binding request for the IoT device to the first cloud server through the client; after receiving the first binding request, the first cloud server can carry the first cloud server A digital certificate issued by a third-party trust agency that is mutually trusted with the second cloud server requests identity verification from the second cloud server; the second cloud server authenticates the first cloud server based on the digital certificate, if the second cloud server If the identity verification of a cloud server passes, the first authorization authentication information is sent to the first cloud server; the first cloud server sends the second authorization authentication information to the client after receiving the first authorization authentication information; After the second authorization and authentication information, the second cloud server can be requested to generate token information for it; after the second cloud server generates the token information, it sends the token information to the client, and communicates the token information with the IoT device Binding: After the client receives the token information, it binds the token information with the user account logged in the client to realize the binding of the IoT device.
  • the client When the user account logged on the client controls the IoT device through the client, the client sends a control command carrying token information to the second cloud server, because the second cloud server binds the IoT device according to the token information , so the second cloud server can determine the IoT device to be controlled according to the token information, and send the instruction to the corresponding IoT device.
  • the first cloud server may be a private cloud server corresponding to the client, that is, the client and the first cloud server may belong to the same IoT system, and may establish a communication connection with the client and perform data interaction.
  • the second cloud server may be a private cloud server corresponding to the IoT device, that is, the second cloud server and the IoT device may belong to the same IoT system, and may establish a communication connection with the IoT device and perform data interaction.
  • the first cloud server and the second cloud server may be cloud servers belonging to different IoT systems, for example, the first cloud server and the second cloud server are private cloud servers provided by different manufacturers.
  • the client may include a browser application program (also referred to as a Web application), an application program on a terminal (also referred to as an APP), and a small program.
  • the Internet of Things device may be a physical device that can be connected to the Internet of Things (IOT for short), such as a refrigerator, an air conditioner, a TV, a sweeping robot, and a smart speaker.
  • the Internet of Things can refer to real-time collection of any object or process that needs to be monitored, connected, or interacted through various devices and technologies such as information sensors, radio frequency identification technology, global positioning system, infrared sensors, or laser scanners. , to collect various required information such as sound, light, heat, electricity, mechanics, chemistry, biology, or location, and realize the ubiquitous connection between things and things, things and people through various possible network accesses, and realize the Intelligent perception, identification and management of items and processes.
  • the Internet of Things is an information carrier based on the Internet and traditional telecommunication networks. It allows all ordinary physical objects that can be independently addressed to form an interconnected network.
  • the first cloud server can be divided into a first device management unit and a first user management unit, etc.
  • the second cloud server can be divided into The second device management unit, the second user management unit, etc., each management unit can divide and cooperate to process data.
  • the first cloud server may receive the first binding request for the IoT device initiated by the client through the first user management unit, and the first cloud server may respond to the first binding request through the first user management unit to the second
  • the first cloud server may generate second authorization and authentication information based on the received first authorization and authentication information through the first user management unit and send the second authorization and authentication information to the client.
  • the first cloud server may also receive the control instruction sent by the client through the first device management unit, and send the control instruction to the IoT device, so as to control the IoT device based on the control instruction, and so on.
  • the second cloud server can receive the verification request sent by the first cloud server through the second user management unit, and perform identity verification on the first cloud server based on the verification request.
  • the first cloud server sends the first authorization and authentication information.
  • the second cloud server may respond to the second binding request sent by the client through the second device management unit, generate token information for the user account logged in at the client, and bind the IoT device based on the token information.
  • the second cloud server may also receive the control instruction sent by the first device management unit through the second device management unit, and control the IoT device based on the control instruction through the second device management unit, and so on.
  • the apparatus for binding an Internet of Things device may specifically be integrated in a cloud server, and the cloud server may be a first cloud server.
  • FIG. 2 is a schematic flowchart of a method for binding IoT devices provided by an embodiment of the present application.
  • the IoT device binding method may include:
  • the first cloud server receives a first binding request for an IoT device initiated by a client, and the client logs in with a user account.
  • the first binding request may be a request sent by the client for requesting to bind the user account logged on the client with the IoT device.
  • the user account is an account corresponding to the client, and the user account can be registered through the client in advance, and the first cloud server stores the user account and the information corresponding to the user account, for example, the user's age, gender or constellation information, and information such as operation records.
  • the first cloud server receives the first binding request for the IoT device triggered by operations such as clicking or sliding on the client.
  • the client may display a setting interface including a list of IoT devices, and the list of IoT devices may include one or more IoT devices.
  • the IoT device list includes IoT device A, IoT device B and IoT device C.
  • the user can select the IoT device to be bound in the setting interface. For example, when the user currently wants to bind the IoT device A, the user can click to select the IoT device A in the setting interface, from The client is triggered to generate a first binding request for the selected IoT device A.
  • the client may also receive voice information or gesture information input by the user, and generate a first binding request for the selected IoT device.
  • the client obtains voice information or gesture information input by the user, identifies or confirms the voice information or gesture information, determines the IoT device that the user wants to bind, and then generates the first IoT device according to the selected IoT device. bind request.
  • the first cloud server receives the first binding request sent by the client.
  • the specific type and content of the first binding request can be flexibly set according to actual needs, and are not specifically limited here.
  • the first cloud server instructs a second cloud server that matches the IoT device, and performs identity verification on the first cloud server that matches the client.
  • the first cloud server determines the second cloud server corresponding to the IoT device according to the first binding request, and sends a request to the second cloud server to indicate the The second cloud server matched with the IoT device performs identity verification on the first cloud server.
  • the verification request sent by the first cloud server to the first cloud server in response to the first binding request may carry information capable of proving the identity of the first cloud server, and a white list may be stored in the second cloud server.
  • the list includes trusted objects, and the second cloud server compares the information carried in the request sent by the first cloud server with the white list to determine whether the first cloud server exists in the white list, so as to authenticate the first cloud server and improve security sex.
  • the verification request sent by the first cloud server to the first cloud server in response to the first binding request may carry verification information of the first cloud server, and the second cloud server can perform identity verification on the first cloud server based on the verification information.
  • the verification information may be information used by the second cloud server to verify the identity of the first cloud server, for example, the verification information may be unique identification information of the first cloud server, or a digital certificate issued by an identity authentication authority.
  • the digital certificate may be a digital certificate issued to the first cloud server by an identity authentication authority trusted by both the first cloud server and the second cloud server after authenticating the first cloud server.
  • the first cloud server instructs the second cloud server to perform identity authentication on the first cloud server based on the digital certificate. Since the second cloud server also trusts the identity authentication authority, when the second cloud server receives the first digital certificate sent by the first cloud server, it can confirm the identity of the first cloud server according to the digital certificate, and complete the identification of the first cloud server. certified.
  • the request sent by the first cloud server to the second cloud server may include, in addition to the above-mentioned verification information of the first cloud server, information related to the first cloud server that enables the second Other information that the cloud server performs identity authentication on the first cloud server, which is not limited in this application.
  • the first cloud server receives the first authorization authentication information returned by the second cloud server.
  • the first authorization and authentication information may include information required for mutual authentication between the client and the second cloud server, for example, may include the protocol for mutual authentication between the client and the second cloud server, the version number of the protocol, and information based on The relevant information of the authorization page for authentication by the protocol, etc.
  • the authorization authentication information may also include other information required for mutual authentication between the client and the second cloud server, which is not limited in this application.
  • the first authorization authentication information may include the identity generated by the second cloud server for the first cloud server (such as ClientId@OAuth2), the Uniform Resource Locator (Uniform Resource Locator, URL) of the authorization page, and the protocol and version information.
  • the authorization authentication information may also include other information required for mutual authentication between the client and the second cloud server, which is not limited in this application.
  • the authorization page may be a webpage accessed through a URL, or a page displayed through a URL in an application (APP) corresponding to the second cloud server, or a page displayed through a URL in a small program corresponding to the second cloud server. redirected pages, etc.
  • APP application
  • the second cloud server after the second cloud server receives the request sent by the first cloud server and authenticates the first cloud server based on the request and passes the verification, the second cloud server sends the first authorization authentication information to the first cloud server .
  • the first cloud server instructs the second cloud server to perform identity authentication, and if the identity authentication passes, it means that the first cloud server and the second cloud server trust each other, then the second cloud server sends the first cloud server The first authorization and authentication information is sent, and the first cloud server receives the first authorization and authentication information returned by the second cloud server.
  • the authorization authentication information received by the first cloud server from the second cloud server may include the OAuth protocol, the version of the OAuth protocol (for example, 2.0), and the authorization page access address (such as URL), etc.
  • the cloud server sends second authorization and authentication information to the client according to the first authorization and authentication information, so that the client sends a second binding request to the second cloud server based on the second authorization and authentication information, and the second binding request is used to indicate the second
  • the cloud server generates token information for the user account based on the second authorization and authentication information, and binds the IoT device based on the token information.
  • the token information may be identification information representing an object having the authority to control the IoT device. For example, if a user account logged on to the client sends a control command to the IoT device based on the token information, the control command is important for the IoT device. As far as the device is concerned, it is legal and executable.
  • binding may be a process of establishing an association relationship between the second cloud server and the IoT device and the user account logged in at the client, specifically, the identity of the IoT device in the second cloud server is identified as the serial number of the IoT device
  • the second cloud server generates token information for the user account logged in on the client, and the object to send the request or instruction can be determined through the token information, and the second cloud server will log in the user account corresponding to the client.
  • the license plate information is bound with the device serial number of the IoT device.
  • the first cloud server after the first cloud server receives the first authorization and authentication information sent by the second cloud server, it generates the second authorization and authentication information according to the first authorization and authentication information, and sends the second authorization and authentication information to the client .
  • the second authorization and authentication information may include content of the first authorization and authentication information.
  • the second authorization and authentication information may also include other contents, for example, information about the first cloud server.
  • the first authorization authentication information includes the identity of the first cloud server (such as ClientId@ OAuth2), the uniform resource locator (Uniform Resource Locator, URL) of the authorization page, and the protocol and version information, after the first cloud server receives the first authorization authentication information, it adds The callback address information callback_url of the first cloud server generates second authorization and authentication information, and sends the second authorization and authentication information to the client.
  • the first cloud server such as ClientId@ OAuth2
  • the uniform resource locator Uniform Resource Locator, URL
  • the client After receiving the second authorization and authentication information, the client sends a second binding request to the second cloud server after authenticating with the second cloud server through the second authorization and authentication information, requesting the second cloud server to , to generate token information for the user account logged in on the client.
  • the second cloud server After the second cloud server generates token information for the user account logged in at the client, it binds the token information with the IoT device, specifically, it can bind the token information with the identity of the IoT device, and Card information is sent to the client.
  • the client After receiving the token information sent by the second cloud server, the client binds the token information with the user account logged in the client, the second cloud server binds the token information with the IoT device, and the client Bind the user account with the token information to complete the binding process.
  • the token information is used as an intermediate bridge for binding, so that the binding can be realized without interacting user information.
  • the client when the user controls the Internet of Things through the client, the client sends a control instruction carrying token information to the second cloud server, and the second cloud server determines the Internet of Things device to be controlled by the user according to the token information, and Send control commands to IoT devices.
  • the second cloud server after the second cloud server generates the token information for the user account logged in the client, the second cloud server sends the token information to the IoT device to be bound, and sends the token information to the client On the terminal, the client binds the user account with the token information to complete the binding process.
  • the client When the user controls the IoT device through the client, the client sends a control command carrying token information to the IoT device, and the IoT device judges whether the token information in the control command is consistent with the stored control command, and if they are consistent, execute If the control instruction is inconsistent, the control instruction will not be executed.
  • the second cloud server does not obtain the user account information logged in at the client.
  • the second cloud server authenticates the first cloud server, it uses the digital certificate of the first cloud server. After the verification is passed, the second cloud server The second cloud server will generate token information for the user account logged in on the client, and the client accesses the second cloud server through the token information. Therefore, during the binding process, the second cloud server and the IoT device do not obtain the information logged on the client. The relevant information of the user account and the user's information are not leaked, which improves the information security in the binding process.
  • the first cloud server and the second cloud server can be divided into units according to functions or purposes, etc., to balance the loads of the first cloud server and the second cloud server, and to increase the capacity of the first cloud server and the second cloud server.
  • Response rate that is, in an embodiment, the first cloud server may include a first device management unit, and the second cloud server may include a second device management unit.
  • the first device management unit sends the control command to the IoT device through the second device management unit, so as to control the IoT device based on the control command.
  • the first device management unit may be a unit in the first cloud server that performs a specified function, for example, may perform a function of receiving a control instruction sent by a client.
  • the second device management unit may be a unit designated to perform a specific function in the second cloud server, for example, may perform a function of sending a control command to an IoT device.
  • control instruction may be a code for the client to tell the IoT device to perform a specific operation.
  • the first cloud server receives the control instruction for the IoT device sent by the client through the first device management unit, and saves the control instruction in the database or the cache, and the first device management unit retrieves the information from the database or the cache.
  • the control instruction is obtained from the cloud server, and the control instruction is sent to the second device management unit of the second cloud server, and the second device management unit sends the control instruction to the IoT device, so that the IoT device performs corresponding operations based on the control instruction.
  • the first cloud server directly sends the control command to the IoT device after receiving the control command, that is, in one embodiment, the first cloud server includes a first device management unit , after the IoT device binding method binds the IoT device, it can also specifically include:
  • the first device management unit sends the control instruction to the Internet of Things device, so as to control the Internet of Things device based on the control instruction.
  • the first cloud server may receive the control instruction sent by the client through the first device management unit, and send the control instruction to the Internet of Things device through the first device management unit, so that the Internet of Things executes corresponding operations based on the control instruction. operate.
  • the client may generate a control command in response to the user's operation, and directly send the control command to the IoT device, so that the IoT device performs a corresponding operation based on the control command.
  • the embodiment of the present application can receive the first binding request for the IoT device initiated by the client, and the client has logged in with a user account; in response to the first binding request, indicate the second cloud that matches the IoT device.
  • the server performs identity verification on the first cloud server that matches the client; receives the first authorization authentication information returned by the second cloud server, and the first authorization authentication information is sent after the second cloud server passes the identity verification of the first cloud server based on the first authorization and authentication information to send the second authorization and authentication information to the client, so that the client sends a second binding request to the second cloud server based on the second authorization and authentication information, and the second binding request is used to indicate the second
  • the cloud server generates token information for the user account based on the second authorization and authentication information, and binds the IoT device based on the token information.
  • This solution can bind the user account logged in the client to the IoT device under the premise that the first cloud server and the second cloud server do not need to exchange user information and do not need to be guaranteed by a business contract, which improves the Internet of Things.
  • the apparatus for binding an Internet of Things device may specifically be integrated in a cloud server, and the cloud server may be a second cloud server.
  • An IoT device binding method provided in an embodiment of the present application can be executed by a second cloud server. As shown in FIG. 3 , the specific process of the IoT device binding method can be as follows:
  • 201 Receive a verification request sent by a first cloud server, where the verification request is sent by the first cloud server in response to a first binding request for an IoT device initiated by a client, and the client has a user account logged in.
  • first cloud server and the second cloud server may be the first cloud server mentioned in the foregoing embodiments.
  • first cloud server and the second cloud server may be private cloud servers provided by different manufacturers.
  • the verification request may be request information sent by the first cloud server for requesting the second cloud server to perform identity verification.
  • the first cloud server may generate a verification request in response to the binding request sent by the client for the IoT device, and send the verification request to the second cloud server.
  • the second cloud server may receive the first The verification request sent by the cloud server.
  • the first cloud server may perform identity verification on the first cloud server according to the information carried in the verification request.
  • the first cloud server may carry an identification
  • the second cloud server may According to the identification, compare with the preset identification list, if the identification list includes the identification, then the verification of the first cloud server is passed, if the identification list does not include the identification, then the verification of the first cloud server fails .
  • the verification request can also carry verification information, which can be used by the second cloud server to verify the first cloud server.
  • the server identity information may be a digital certificate provided by a third-party trust agency, that is, in one embodiment, the step "receive the verification request sent by the first cloud server, and perform identity verification on the first cloud server based on the verification request", Specifically can include:
  • the verification information may be information used by the second cloud server to verify the identity of the first cloud server, for example, unique identification information of the first cloud server, or a digital certificate issued by an identity authentication authority.
  • the user triggers sending a binding request to the first cloud server on the client side, and the first cloud server sends a verification request to the second cloud server in response to the request, and the verification request carries verification information.
  • the second cloud server After receiving the verification request, the second cloud server verifies the first cloud server according to the verification information carried in the request.
  • the verification information may be a digital certificate issued to the first cloud server by an identity authentication authority trusted by both the first cloud server and the second cloud server after authenticating the first cloud server.
  • the second cloud server trusts the identity authentication authority, when the second cloud server receives the digital certificate, it can be determined according to the digital certificate that the first cloud server is trustworthy, that is, the second cloud server is trustworthy to the first cloud server. Verification passed.
  • the first authorization authentication information may be information required for mutual authentication between the client and the second cloud server, for example, the protocol for mutual authentication between the client and the second cloud server, the version number of the protocol, the Authorization page and other information.
  • the second authorization authentication information may include the content of the first authorization authentication information.
  • the second authorization and authentication information may include other contents besides the content of the first authorization and authentication information, for example, information about the first cloud server.
  • the first authorization authentication information includes the identity of the first cloud server (such as ClientId@ OAuth2), the uniform resource locator (Uniform Resource Locator, URL) of the authorization page, and the protocol and version information, after the first cloud server receives the first authorization authentication information, it adds The callback address information callback_url of the first cloud server generates second authorization and authentication information, and sends the second authorization and authentication information to the client.
  • the first cloud server such as ClientId@ OAuth2
  • the uniform resource locator Uniform Resource Locator, URL
  • the second cloud server may send the first authorization and authentication information to the first cloud server, so that the first cloud server adds own callback address information, generate the second authorization authentication information, and send the second authorization authentication information to the client.
  • the second authorization authentication information is sent to the second cloud server.
  • the second cloud server sends a second binding request.
  • the second cloud server responds to the second binding request sent by the terminal, generates token information for the user account logged on the client, and binds the token information to the IoT device requested by the client to be bound, specifically , which can be to bind the token information with the device identifier of the IoT device.
  • the step of "generating token information for the user account in response to the second binding request sent by the client based on the second authorization and authentication information, and binding the IoT device based on the token information" can specifically be include:
  • Bind IoT devices based on token information.
  • the consent binding information may be information indicating that the client agrees to bind with the IoT device, for example, the information indicating that the client agrees to bind with the IoT device is 1, indicating that the client does not agree to bind with the IoT device
  • the binding information is 0, that is, if the user agrees to the binding, the consent binding information is 1.
  • the second cloud server passes the verification of the first cloud server, it sends the first authorization and authentication information to the first cloud server, and the first cloud server sends the second authorization and authentication information to the client based on the first authorization and authentication information.
  • the client accesses the authorized webpage according to the URL of the authorized webpage in the second authorization authentication information, the user confirms the binding on the authorized webpage, and the client responds to the user's confirmation operation on the authorized webpage, and sends a consent to the second cloud server binding information.
  • the second cloud server can generate token information according to the agreed binding information, bind the token information with the IoT device requested by the client, and send the token information to the client, so that the client receives After obtaining the token information, bind the token information with the user account logged in on the client.
  • the step of "binding the IoT device based on the token information" may specifically include:
  • the IoT device is bound based on the token information.
  • the information acquisition request may be a request for requesting the second cloud server to generate device binding information.
  • the device binding information can be a device binding code, and the specific type and content of the device binding information can be flexibly set according to actual needs, which is not limited here.
  • the device binding information can be a string of numbers or strings.
  • the client carries the token information and initiates an information acquisition request for acquiring device binding information to the second cloud server, that is, requests the second cloud service to generate the device binding information.
  • the second cloud server can verify the identity of the object sending the information acquisition request according to the token information carried in the received information acquisition request, and if the verification is passed, generate corresponding device binding information and send the device binding information to the client end.
  • the user can view the device binding information through the client, and input the obtained device binding information on the user interface provided by the client, and the client responds to the user's input operation and returns the information entered by the user to the second cloud server.
  • the second cloud server compares the information returned by the client with the device binding information generated by itself, and if the two are consistent, binds the token information with the IoT device requested by the client.
  • a validity period can be set for the device binding information. If the client sends the device binding information outside the validity period, the second cloud server will determine that the device binding information sent by the terminal is invalid information, which is not valid. Internet-connected devices are bound.
  • the step of "sending token information to the client” may specifically include:
  • the token information is sent to the first cloud server.
  • the callback address information may be address information of the first cloud server, and is used to instruct the second cloud server to return token information based on the callback address information.
  • the first cloud server obtains the callback address information, and sends the callback address information and the first authorization authentication information to the client, so that the client accesses the authorization page according to the received second authorization authentication information.
  • a confirmation control can be included, and the confirmation control can be used for user operation to confirm the binding.
  • the client responds to the user's operation on the confirmation control on the authorization page, such as clicking and other operations to trigger the control, and sends the consent binding information to the second cloud server , and send callback address information.
  • the second cloud server sends the token information to the first cloud server according to the callback address information.
  • the first cloud server and the second cloud server can be divided into units according to functions or purposes, etc., to balance the loads of the first cloud server and the second cloud server, and to increase the capacity of the first cloud server and the second cloud server.
  • Response rate that is, in an embodiment, the first cloud server may include a first device management unit, and after binding the IoT device, the IoT device binding method may specifically include:
  • IoT devices are controlled based on control commands.
  • the first device management unit may be a unit in the first cloud server that performs a specified function, for example, may perform a function of sending a control command sent by the client to the second cloud server.
  • the second cloud server receives the control instruction sent by the first device management unit of the first cloud server, and sends the control instruction to the IoT device, so that the IoT device performs a corresponding operation based on the received control instruction .
  • the second cloud server may include a second device management unit, and the second device management unit may be a unit designated to perform a specific function in the second cloud server, for example, it may receive the first device management of the first cloud server
  • the control command sent by the unit is the function of sending the control command to the IoT device to control the IoT device.
  • the second cloud server may receive the control instruction sent by the first device management unit of the first cloud server through the second device management unit, and send the control instruction to the IoT device through the second device management unit, so that the IoT Networked devices perform corresponding operations based on the received control instructions.
  • the embodiment of the present application receives the verification request sent by the first cloud server, and the verification request is sent by the first cloud server in response to the first binding request sent by the client, and the client has a user account logged in;
  • the first cloud server performs identity verification; if the identity verification is passed, the first authorization authentication information is sent to the first cloud server, so that the first cloud server generates second authorization authentication information based on the first authorization authentication information, and the second authorization
  • the authentication information is sent to the client; in response to the second binding request sent by the client based on the second authorization and authentication information, token information is generated for the user account, and the IoT device is bound based on the token information.
  • This solution can realize the binding of IoT devices on the premise that the first cloud server and the second cloud server do not need to exchange user information and do not need to be guaranteed by business contracts, which improves the binding efficiency of IoT devices. efficiency.
  • the IoT device binding system includes a first cloud server, a second cloud server, a client that matches the first cloud server, and a client that matches the second cloud server.
  • the IoT device matched by the server where,
  • the client may be used to send the first binding request for the IoT device to the first cloud server.
  • the first cloud server may be configured to, in response to the binding request, send a verification request to the second cloud server, where the verification request carries verification information of the first cloud server, and the client is logged in with a user account.
  • the second cloud server may be used to authenticate the first cloud server based on the verification information.
  • the second cloud server may be configured to, if the identity verification is passed, return the first authorization authentication information to the first cloud server.
  • the first cloud server may be configured to send second authorization and authentication information to the client based on the first authorization and authentication information.
  • the client may be configured to send a second binding request to the second cloud server based on the second authorization and authentication information.
  • the second cloud server may be configured to, in response to the second binding request, generate token information for the user account logged in the client based on the authorization and authentication information, and send the token information to the client.
  • the second cloud server can be used to bind the IoT device based on the token information
  • the client can be used to bind the user account with the IoT device based on the token information.
  • an embodiment of the present application may provide a method for binding an IoT device, as shown in FIG. 4 , the specific process of the IoT device binding method may be as follows:
  • the client establishes a connection with the IoT device.
  • the client can search for the IoT device, configure with the IoT device, and the IoT device verifies the client, for example, the client sends the first number to the IoT device Certificate
  • the first digital certificate can be the first digital certificate granted to the client by a third-party certification body trusted by both the IoT device and the client. Since the IoT device trusts the third-party certification body, when the first digital certificate sent by the client is received The certificate can confirm the identity of the client and complete mutual authentication.
  • the client sends authentication information to the IoT device.
  • the authentication information can be the identification information of the IoT device, such as a pin code (Personal identification number, PIN for short), or a key.
  • the authentication information sent by the client is compared, and if they are consistent, the authentication of the client is completed, and the client establishes a connection with the IoT device.
  • the Internet of Things device can send the information required for binding to the client, for example, the identity of the client is required, and the client can use the second cloud server in the first authorization and authentication information as the first cloud server during the subsequent binding process.
  • Identity (ClientId@ OAuth2), sent to the IoT device as its own identity.
  • the client when it discovers the IoT device, it may display a connection page, which is for the user to perform a confirmation operation to confirm the connection, and the client responds to the user's confirmation operation on the connection page to configure with the IoT device.
  • the network distribution state may be a state in which the IoT device is waiting to be associated with the client.
  • the network distribution method for client and IoT device configuration can be broadcast packet method, multicast address method, device hotspot distribution network, Bluetooth distribution network, mobile phone hotspot distribution network, and router distribution network, etc.
  • Different distribution network methods Determines the communication method between the IoT device and the associated client.
  • the client and the IoT device are configured through a router network configuration, and the communication between the client and the IoT is realized through a LAN.
  • the client sends a first binding request to the first user management unit of the first cloud server.
  • the client may initiate a first binding request to the first user management unit of the first cloud server.
  • the first user management unit of the first cloud server sends an identity verification request to the second user management unit of the second cloud server in response to the first binding request of the client.
  • the first user management unit of the first cloud server may initiate an identity verification request to the second user management unit of the second cloud server to communicate with the second cloud server Mutual authentication.
  • the identity verification request sent by the first cloud server may carry a second digital certificate, wherein the second digital certificate may be a third-party certification authority trusted by both the first cloud server and the second cloud server, and granted to the first cloud server. digital certificate.
  • the second user management unit of the second cloud server performs identity verification on the first cloud server.
  • the second user management unit of the second cloud server performs identity verification on the first cloud server through the second digital certificate sent by the first user management unit of the first cloud server. If it is granted by a trusted third-party organization, the verification of the first cloud server is passed. If the second digital certificate is not granted by a mutually trusted third-party organization, the verification of the first cloud server fails.
  • the second user management unit of the second cloud server returns the first authorization and authentication information to the first user management unit of the first cloud server.
  • the second cloud server If the second cloud server passes the verification of the first cloud server, it will return the first authorization authentication information to the first user management unit of the first cloud server, and the first authorization authentication information may include the interaction between the client and the second cloud server.
  • the authentication protocol the version number of the protocol, the relevant information of the authorization page that provides mutual authentication, etc.
  • the client and the second cloud server perform mutual authentication through OAuth2.0
  • the first cloud server receives the identity and authorization information generated by the second cloud server for the first cloud server returned by the second cloud server. agreement, and version 2.0, the access address of the authorization page, etc.
  • the second cloud server does not return authorization authentication information to the first cloud server, and the second cloud server may also send a prompt message that the identity authentication fails to pass to the client.
  • the first user management unit of the first cloud server sends the first authorization authentication information and callback address information to the client.
  • the first user management unit of the first cloud server acquires callback address information of the first cloud server, and sends the first authorization authentication information and callback address information to the client.
  • the client accesses the authorization page according to the first authorization authentication information.
  • the client accesses the authorization page according to the access address (URL) of the authorization page in the first authorization authentication information, such as accessing the authorization page pointed to by the URL through a browser, or jumping to the corresponding URL of the second cloud server according to the URL.
  • the authorization page in the app or jump to the authorization page in the applet corresponding to the second cloud server according to the URL.
  • the user can enter the account password on the authorization page.
  • the account password can be the account and password applied by the user for the second cloud server.
  • the user indicates that the user account logged in at the client is authorized to access the specified information of the first cloud server.
  • the second cloud server After verifying the account number and password, the second cloud server generates token information for the user account logged in at the client.
  • the IoT device before binding the user account logged in on the client (for the sake of distinction, hereinafter referred to as the first user account) to the IoT device, the IoT device can first be bound to the user account registered by the user on the second cloud server.
  • account the user account is the account entered by the user on the authorization page, for the sake of distinction, hereinafter referred to as the second user account
  • the IoT device can Synchronize the command to the corresponding data of the second user account in the second cloud server. Specifically, you can first bind the second user account with the IoT device, and then bind the first user account with the IoT device.
  • the second cloud server can obtain the information of the IoT device being controlled, and the staff of the manufacturer corresponding to the second cloud server can obtain the control status of the IoT device in time , Prevent attacks on IoT devices in time, and improve the security of IoT devices.
  • the client responds to the user's confirmation operation on the authorization page, and generates an information acquisition request.
  • the user after the user enters the second user account and the password of the second user account in the authorization page, the user performs a confirmation operation on the confirmation control, such as clicking the confirmation control, and the terminal responds to the user's confirmation operation on the authorization page to obtain the user's password.
  • the input second user account and password send a request to the second device management unit, and the second device management unit returns a temporary token to the client in response to the request after the second device management unit has verified the second user account and password.
  • It can be a code.
  • the client After the client receives the code, it obtains the token information from the second device management unit based on the code and the callback address information.
  • the token information can be a token, and the second user management unit of the second cloud server generates it based on the temporary token. Token information, and send the token information to the client based on the address indicated by the callback address information.
  • the client generates an information acquisition request based on the token information, and the information acquisition request carries the token information.
  • the client sends an information acquisition request to the second device management unit.
  • the client carries the token information and sends an information acquisition request to the second device management unit.
  • the second device management unit of the second cloud server sends device binding information to the client in response to the information acquisition request.
  • the client may initiate a request to the second device management unit of the second cloud server to obtain device binding information based on the token information, that is, request the second device management unit to generate the device binding information.
  • the second device management unit checks whether the token information is valid, and if it is valid, generates device binding information and sends the device binding information to the client.
  • the client sends device binding information to the IoT device.
  • the client may display the device binding information and display a user interface for inputting information based on the received device binding information. Entered information, and send the information to the IoT device.
  • the IoT device sends device binding information to the second device management unit of the second cloud server.
  • the IoT device sends the information input by the user sent by the client to the second device management unit of the second cloud server.
  • the second device management unit of the second cloud server binds the IoT device.
  • the second device management unit compares the information input by the user sent by the IoT device with the generated device binding information, and if the information sent by the IoT device is consistent with the generated device binding information, then the second The cloud server will bind the token information generated by the first user account logged in the client with the IoT device.
  • the second cloud server after the second cloud server binds the token information with the IoT device, it returns a prompt message indicating that the binding is successful to the client.
  • the first user account logged in to the client uses the token information as an intermediate bridge to realize the binding with the IoT device, and through the binding relationship between the first user account-token information and token Information-Internet of Things device, realizes the indirect binding of the first user account and the Internet of Things device.
  • a valid period can be set for the token information.
  • the user can bind the IoT device again through the above method, and the second cloud server and the client will update the binding accordingly. relation.
  • the validity period of the token information can be updated. For example, if the user does not access the second cloud server for 48 consecutive hours, the token The information expires, and when the user visits within 48 hours, the validity period will be updated to 48 hours again.
  • the client generates a control instruction in response to the user's control operation.
  • the user performs a control operation on the IoT device in the display page of the client, and the client responds to the user's control operation and generates a control command carrying token information corresponding to the user account logged in on the client.
  • the IoT device is an air conditioner
  • the adjustment operation of the air conditioner's temperature, operation mode, and wind speed input by the user can be received in the display page of the client for air conditioner control, and the carrying token can be generated based on the adjustment operation. information control instructions.
  • the Internet of Things device when the Internet of Things device is a TV, it can receive user-input adjustment operations for operating parameters such as volume, program switching, and brightness of the TV in the display page for TV control on the client, and carry and log in based on the adjustment operations.
  • the client sends the control instruction to the second device management unit of the second cloud server.
  • the client sends the control instruction to the second device management unit of the second cloud server.
  • the second device management unit of the second cloud server sends the control instruction to the IoT device.
  • the second device management unit may determine the IoT device to be controlled by the control command according to the token information carried in the control command and the binding relationship between the token information and the IoT device, and send the control command to the corresponding IoT devices.
  • the IoT device performs a corresponding operation according to the received control instruction.
  • the IoT device executes corresponding operations according to the received control instructions.
  • the air conditioner may adjust the temperature according to the received temperature adjustment instruction (ie, control instruction).
  • the TV can adjust the volume according to the received volume adjustment command (that is, the control command).
  • the client establishes a connection with the IoT device, the client can send a binding request to the first user management unit of the first cloud server, and the first user management unit of the first cloud server responds to the client
  • the first binding request of the terminal sends an identity verification request to the second user management unit of the second cloud server, and the second user management unit of the second cloud server performs identity verification on the first cloud server.
  • the second cloud The second user management unit of the server returns the first authorization authentication information to the first user management unit of the first cloud server, and the first user management unit of the first cloud server sends the first authorization authentication information and callback address information to the client,
  • the client accesses the authorization page according to the first authorization authentication information, and based on the confirmation operation for the authorization page, the client sends an information acquisition request to the second device management unit, and the second device management unit of the second cloud server responds to the information acquisition request, Send the device binding information to the client, the client sends the device binding information to the IoT device , the IoT device sends the device binding information to the second device management unit of the second cloud server, and the second The device management unit binds the IoT device, the client responds to the user's control operation and generates a control command, and the client sends the control command to the first device management unit of the first cloud server, and the first device management unit of the first cloud server The unit sends the control command to the second device management unit of the second cloud
  • This solution can realize that the first cloud server and the second cloud server do not need to exchange user information, and under the premise of not needing to guarantee through business contracts, IoT devices will be bound, which not only ensures the security of user privacy , and improve the efficiency of IoT device binding, and improve the security of data interaction.
  • an IoT device binding device is also provided in an embodiment.
  • the meanings of the nouns are the same as those in the above IoT device binding method, and for specific implementation details, please refer to the description in the method embodiments.
  • the IoT device binding device may specifically be integrated in a cloud server, and the cloud server may be a first cloud server. As shown in FIG. 5 , the IoT device binding device may include: a first receiving module 401, a response module 402 , the second receiving module 403 and the first binding module 404, etc., specifically as follows:
  • the first receiving module 401 for receiving the first binding request for the IoT device initiated by the client, where the client is logged in with a user account.
  • Response module 402 for responding to the first binding request, indicating the second cloud server matching the IoT device, and performing identity verification on the first cloud server matching the client.
  • the response module 402 may include a sending submodule and an indication submodule, specifically:
  • Sending sub-module used to send a verification request to the second cloud server in response to the first binding request, where the verification request carries verification information of the first cloud server that matches the client.
  • Instructing submodule used to instruct the second cloud server according to the verification request, and perform identity verification on the first cloud server based on the verification information.
  • the second receiving module 403 is used to receive the first authorization and authentication information returned by the second cloud server.
  • the first authorization and authentication information is sent after the identity verification of the first cloud server by the second cloud server is passed.
  • the first binding module 404 used to send the second authorization and authentication information to the client according to the first authorization and authentication information, so that the client sends a second binding request to the second cloud server based on the second authorization and authentication information, and the second binding
  • the predetermined request is used to instruct the second cloud server to generate token information for the user account, and to bind the IoT device based on the token information.
  • the first binding module 404 may include an acquisition submodule and a sending submodule, specifically:
  • Obtaining submodules used to obtain callback address information.
  • a generating module used to generate second authorization and authentication information based on the first authorization and authentication information
  • An information generating module used to generate second authorization and authentication information based on the first authorization and authentication information and callback address information;
  • Sending sub-module used to send the second authorization and authentication information to the client, and the callback address information is used to instruct the second cloud server to return the token information.
  • the IoT device binding device may include a fourth receiving module and a second sending module, specifically:
  • the fourth receiving module used for receiving the control instruction sent by the client through the first device management unit.
  • the second receiving module used for sending the control command to the IoT device through the second device management unit through the first device management unit, so as to control the IoT device based on the control command.
  • the IoT device binding device may include a fifth receiving module and a third sending module, specifically:
  • the fifth receiving module used for receiving the control instruction sent by the client through the first device management unit.
  • the third receiving module used for sending the control command to the IoT device through the first device management unit, so as to control the IoT device based on the control command.
  • the embodiment of the present application receives the first binding request for the Internet of Things device initiated by the client through the first receiving module 401, and the client has logged in with a user account; responds to the first binding request through the response module 402, indicating The second cloud server matching the IoT device performs identity verification on the first cloud server matching the client; the second receiving module 403 receives the first authorization authentication information returned by the second cloud server; through the first binding module 404 Based on the first authorization and authentication information, send second authorization and authentication information to the client, so that the client sends a second binding request to the second cloud server based on the second authorization and authentication information, and the second binding request is used to indicate that the second cloud
  • the server generates token information for the user account, and binds the IoT device based on the token.
  • an IoT device binding device is also provided in an embodiment.
  • the meanings of the nouns are the same as those in the above IoT device binding method, and for specific implementation details, please refer to the description in the method embodiments.
  • the IoT device binding device can specifically be integrated in a cloud server, and the cloud server can be a second cloud server. As shown in FIG. 6 , the IoT device binding device can include: a third receiving module 501, a verification module 502 , the sending module 503 and the second binding module 504, etc., the details may be as follows:
  • the third receiving module 501 used to receive the verification request sent by the first cloud server, the verification request is sent by the first cloud server in response to the first binding request for the IoT device initiated by the client, and the client has a user account logged in.
  • Verification module 502 configured to perform identity verification on the first cloud server based on the verification request.
  • the verification module 502 may include a sending submodule and a verification submodule, specifically:
  • Sending sub-module used to receive a verification request sent by the first cloud server based on the response to the first binding request of the client, where the verification request carries verification information of the first cloud server.
  • Verification sub-module used for authenticating the first cloud server based on the verification information.
  • Sending module 503 configured to send first authorization and authentication information to the first cloud server if identity verification is passed, so that the first cloud server will send second authorization and authentication information to the sending client based on the first authorization and authentication information.
  • the second binding module 504 is configured to generate token information for the user account in response to the request sent by the client based on the second authorization and authentication information, and bind the IoT device based on the token information.
  • the second binding module 504 may include a receiving submodule and a generating submodule, specifically:
  • the receiving sub-module is used to receive the consent binding information fed back by the client based on the second authorization and authentication information sent by the first cloud server.
  • Generation sub-module used to generate token information for the user account based on the consent binding information, and send the token information to the client, so that the client can bind the user account with the IoT device based on the token information;
  • Bind IoT devices based on token information.
  • the generation sub-module is specifically used to: respond to the information acquisition request sent by the client carrying the token information, generate device binding information, and send the device binding information to the client;
  • the IoT device is bound based on the token information.
  • the token information is sent to the first cloud server, so that the first cloud server sends the token information to the client.
  • the IoT device binding device may include a sixth receiving module and a control module, specifically:
  • the sixth receiving module used for receiving the control instruction sent by the first device management unit.
  • Control module used to control IoT devices based on control commands.
  • the embodiment of the present application receives the verification request sent by the first cloud server through the third receiving module 501; through the verification module 502, the first cloud server is authenticated based on the verification request; if the identity verification passes, the sending module 503 Send the first authorization authentication information to the first cloud server, so that the first cloud server sends the second authorization authentication information to the client based on the first authorization authentication information; through the second binding module 504, respond to the client based on the second authorization authentication
  • the second binding request sent by the information generates token information for the user account, and binds the IoT device based on the token information.
  • the embodiment of the present application also provides a cloud server, which can be a first cloud server or a second cloud server, etc., as shown in FIG. 7 , which shows a schematic structural diagram of the cloud server involved in the embodiment of the present application. Specifically:
  • the cloud server may include a processor 1001 of one or more processing cores, a memory 1002 of one or more computer-readable storage media (also referred to as storage media), a power supply 1003, an input unit 1004 and other components.
  • a processor 1001 of one or more processing cores may include a processor 1001 of one or more processing cores, a memory 1002 of one or more computer-readable storage media (also referred to as storage media), a power supply 1003, an input unit 1004 and other components.
  • the processor 1001 is the control center of the cloud server. It uses various interfaces and lines to connect various parts of the entire cloud server, and runs or executes software programs and/or modules stored in the memory 1002, and calls stored in the memory 1002. Data, perform various functions of the cloud server and process data, so as to monitor the cloud server as a whole.
  • the processor 1001 may include one or more processing cores; preferably, the processor 1001 may integrate an application processor and a modem processor, wherein the application processor mainly processes operating systems, user interfaces, and computer programs, etc. , the modem processor mainly handles wireless communications. It can be understood that the foregoing modem processor may not be integrated into the processor 1001 .
  • the memory 1002 can be used to store software programs and modules, and the processor 1001 executes various functional applications and data processing by running the software programs and modules stored in the memory 1002 .
  • the memory 1002 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, a computer program required by at least one function (such as a sound playback function, an image playback function, etc.); Data, etc. created by the use of cloud servers.
  • the memory 1002 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage devices.
  • the memory 1002 may further include a memory controller to provide the processor 1001 with access to the memory 1002 .
  • the cloud server also includes a power supply 1003 for supplying power to various components.
  • the power supply 1003 can be logically connected to the processor 1001 through the power management system, so that functions such as charging, discharging, and power consumption management can be realized through the power management system.
  • the power supply 1003 may also include one or more DC or AC power supplies, recharging systems, power failure detection circuits, power converters or inverters, power status indicators and other arbitrary components.
  • the cloud server can also include an input unit 1004, which can be used to receive input numbers or character information, and generate keyboard, mouse, joystick, optical or trackball signal input related to user settings and function control.
  • an input unit 1004 can be used to receive input numbers or character information, and generate keyboard, mouse, joystick, optical or trackball signal input related to user settings and function control.
  • the cloud server may also include a display unit, etc., which will not be repeated here.
  • the processor 1001 in the cloud server will load one or more executable files corresponding to the process of the computer program into the memory 1002 according to the following instructions, and the processor 1001 will run the executable file stored in the The computer program in memory 1002, thereby realizes various functions, as follows:
  • the cloud server When the cloud server is the first cloud server, it can receive the first binding request for the Internet of Things device initiated by the client; in response to the first binding request, indicate the second cloud server that matches the Internet of Things device;
  • the first cloud server matched with the terminal performs identity verification; receives the first authorization authentication information returned by the second cloud server, and the first authorization authentication information is sent after the second cloud server passes the identity verification of the first cloud server; according to the first
  • the authorization authentication information sends second authorization authentication information to the client, so that the client sends a second binding request to the second cloud server based on the second authorization authentication information, and the second binding request is used to indicate that the second cloud server is a user account Generate token information and bind IoT devices based on the token information.
  • the cloud server when the cloud server is the second cloud server, it can receive the verification request sent by the first cloud server, the verification request is sent by the first cloud server in response to the first binding request for the IoT device initiated by the client, and the client Log in with a user account; based on the verification request, the first cloud server is authenticated; if the identity verification is passed, then the first authorization authentication information is sent to the first cloud server, so that the first cloud server will send the client based on the first authorization authentication information
  • the terminal sends the second authorization and authentication information; in response to the second binding request sent by the client based on the second authorization and authentication information, generates token information for the user account, and binds the IoT device based on the token information.
  • a computer program product or computer program comprising computer instructions stored in a computer readable storage medium.
  • the processor of the cloud server reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the cloud server executes the methods provided in various optional implementation manners in the foregoing embodiments.
  • an embodiment of the present application provides a storage medium, in which a computer program is stored, and the computer program can be loaded by a processor to execute any IoT device binding method provided in the embodiment of the present application.
  • the storage medium may include: a read only memory (ROM, ReadOnlyMemory), a random access memory (RAM, RandomAccessMemory), a magnetic disk or an optical disk, and the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Disclosed in the present application are an Internet of Things device binding method and a related device. The method comprises: receiving a binding request from a client for an Internet of Things device; in response to the binding request, instructing a second server, which matches the Internet of Things device, to perform identity verification on a first server matching the client; receiving first authorization authentication information that is sent by the second server after the identity verification is passed; and according to the first authorization authentication information, sending, to the client, second authorization authentication information that is required for binding the Internet of Things device on the basis of token information.

Description

物联网设备绑定方法、装置、系统、云服务器和存储介质IoT device binding method, device, system, cloud server and storage medium
本申请要求申请日为2021年8月5日、申请号为202110898234.2、发明名称为“物联网设备绑定方法、装置、系统、云服务器和存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of a Chinese patent application with an application date of August 5, 2021, an application number of 202110898234.2, and an invention titled "Internet of Things Device Binding Method, Device, System, Cloud Server, and Storage Medium", the entire content of which Incorporated in this application by reference.
技术领域technical field
本申请涉及通信技术领域,具体涉及一种物联网设备绑定方法、装置、系统、云服务器和存储介质。The present application relates to the field of communication technology, and in particular to a binding method, device, system, cloud server and storage medium for IoT devices.
背景技术Background technique
物联网(Internet of Things,IoT)是未来万物互联互通的必然选择,各个厂商都在致力于实现物联网设备的互联互通。The Internet of Things (IoT) is an inevitable choice for the interconnection of all things in the future, and various manufacturers are committed to realizing the interconnection of IoT devices.
技术问题technical problem
目前,当用户通过物联网系统A的客户端为物联网系统B的物联网设备进行配置时,一般是基于预定协议绑定物联网系统A和物联网系统B之间的用户账号信息,因此需要对接双方进行用户信息互换,这就需要基于双方达成相互的信任,然而,这种信任一般都是通过商务合同进行保障,这使得物联网中的设备互联互通变成了点对点的沟通,其成本高,且效率低下。At present, when a user configures the IoT device of the IoT system B through the client of the IoT system A, the user account information between the IoT system A and the IoT system B is generally bound based on a predetermined agreement, so it is necessary to The exchange of user information between the docking parties requires mutual trust based on the two parties. However, this trust is generally guaranteed through business contracts, which makes the interconnection of devices in the Internet of Things into point-to-point communication. The cost high and inefficient.
技术解决方案technical solution
本申请实施例提供一种物联网设备绑定方法、装置、系统、云服务器以及存储介质,可以提高物联网设备绑定的效率。Embodiments of the present application provide a method, device, system, cloud server, and storage medium for binding IoT devices, which can improve the efficiency of binding IoT devices.
本申请实施例提供的一种物联网设备绑定方法,包括:An IoT device binding method provided in an embodiment of the present application includes:
接收客户端发起的针对物联网设备的第一绑定请求,所述客户端登录有用户账号;receiving a first binding request for an IoT device initiated by a client, the client logging in with a user account;
响应于所述第一绑定请求,指示与所述物联网设备匹配的第二云服务器,对与所述客户端匹配的第一云服务器进行身份验证;Responding to the first binding request, indicating a second cloud server matching the IoT device, and performing identity verification on the first cloud server matching the client;
接收所述第二云服务器返回的授权认证信息,所述第一授权认证信息为所述第二云服务器对所述第一云服务器的身份验证通过后发送的;receiving the authorization authentication information returned by the second cloud server, where the first authorization authentication information is sent after the identity verification of the first cloud server by the second cloud server;
根据所述第一授权认证信息向所述客户端发送第二授权认证信息,以使得所述客户端基于所述第二授权认证信息向第二云服务器发送第二绑定请求,所述第二绑定请求用于指示第二云服务器为所述用户账号生成令牌信息,并基于所述令牌信息对所述物联网设备进行绑定。Send second authorization and authentication information to the client according to the first authorization and authentication information, so that the client sends a second binding request to the second cloud server based on the second authorization and authentication information, and the second The binding request is used to instruct the second cloud server to generate token information for the user account, and bind the IoT device based on the token information.
本申请实施例还提供的另一种物联网设备绑定方法,包括:Another IoT device binding method provided in the embodiment of the present application includes:
接收第一云服务器发送的验证请求,所述验证请求为所述第一云服务器响应客户端发起的针对物联网设备的第一绑定请求发送的,所述客户端登录有用户账号;Receive a verification request sent by the first cloud server, where the verification request is sent by the first cloud server in response to the first binding request for the IoT device initiated by the client, and the client has a user account logged in;
基于所述验证请求对所述第一云服务器进行身份验证;performing identity verification on the first cloud server based on the verification request;
若身份验证通过,则向所述第一云服务器发送第一授权认证信息,以使得所述第一云服务器将所述第一授权认证信息向所述客户端发送第二授权认证信息;If the identity verification is passed, sending first authorization authentication information to the first cloud server, so that the first cloud server sends the first authorization authentication information to the client and sends second authorization authentication information;
响应于所述客户端基于所述第二授权认证信息发送的请求,为所述用户账号生成令牌信息,并基于所述令牌信息对所述物联网设备进行绑定。In response to the request sent by the client based on the second authorization and authentication information, generate token information for the user account, and bind the IoT device based on the token information.
相应的,本申请实施例还提供的一种物联网设备绑定装置,包括:Correspondingly, the embodiment of the present application also provides an IoT device binding device, including:
第一接收模块,用于接收客户端发起的针对物联网设备的第一绑定请求,所述客户端登录有用户账号;The first receiving module is configured to receive a first binding request for an IoT device initiated by a client, the client logging in with a user account;
响应模块,用于响应于所述第一绑定请求,指示与所述物联网设备匹配的第二云服务器,对与所述客户端匹配的第一云服务器进行身份验证;A response module, configured to, in response to the first binding request, indicate a second cloud server matching the IoT device, and perform identity verification on the first cloud server matching the client;
第二接收模块,用于接收所述第二云服务器返回的第一授权认证信息,所述第一授权认证信息为所述第二云服务器对所述第一云服务器的身份验证通过后发送的;The second receiving module is configured to receive the first authorization and authentication information returned by the second cloud server, the first authorization and authentication information is sent after the second cloud server passes the identity verification of the first cloud server ;
第一绑定模块,用于根据所述第一授权认证信息向所述客户端发送第二授权认证信息,以使得所述客户端基于所述第二授权认证信息向第二云服务器发送第二绑定请求,所述第二绑定请求用于指示所述第二云服务器为所述用户账号生成令牌信息,并基于所述令牌信息对所述物联网设备进行绑定。The first binding module is configured to send second authorization and authentication information to the client according to the first authorization and authentication information, so that the client sends the second authorization and authentication information to the second cloud server based on the second authorization and authentication information. A binding request, the second binding request is used to instruct the second cloud server to generate token information for the user account, and bind the IoT device based on the token information.
相应的,本申请实施例还提供的另一种物联网设备绑定装置,包括:Correspondingly, another IoT device binding device provided in the embodiment of the present application includes:
第三接收模块,用于接收第一云服务器发送的验证请求,所述验证请求为所述第一云服务器响应客户端发起的针对物联网设备的第一绑定请求发送的请求,所述客户端登录有用户账号;The third receiving module is configured to receive the verification request sent by the first cloud server, the verification request is a request sent by the first cloud server in response to the first binding request for the IoT device initiated by the client, the client There is a user account for terminal login;
验证模块,用于基于所述验证请求对所述第一云服务器进行身份验证;a verification module, configured to perform identity verification on the first cloud server based on the verification request;
发送模块,用于若身份验证通过,则向所述第一云服务器发送第一授权认证信息,以使得所述第一云服务器基于所述第一授权认证信息向所述客户端发送第二授权认证信息;A sending module, configured to send first authorization and authentication information to the first cloud server if the identity verification is passed, so that the first cloud server sends a second authorization to the client based on the first authorization and authentication information Certification Information;
第二绑定模块,用于响应于所述客户端基于所述授权认证信息发送的第二绑定请求,为所述用户账号生成令牌信息,并基于所述令牌信息对所述物联网设备进行绑定。The second binding module is configured to generate token information for the user account in response to the second binding request sent by the client based on the authorization and authentication information, and perform an authentication on the Internet of Things based on the token information The device is bound.
相应的,本申请实施例还提供的一种物联网设备绑定系统,包括第一云服务器、第二云服务器、与所述第一云服务器匹配的客户端,以及与所述第二云服务器匹配的物联网设备,其中:Correspondingly, the embodiment of the present application also provides an IoT device binding system, including a first cloud server, a second cloud server, a client matching the first cloud server, and a Matching IoT devices where:
所述客户端用于,向所述第一云服务器发送针对所述物联网设备的绑定请求,所述客户端登录有用户账号;The client is configured to send a binding request for the IoT device to the first cloud server, and the client is logged in with a user account;
所述第一云服务器用于,响应于所述第一绑定请求,向所述第二云服务器发送验证请求,所述验证请求携带所述第一云服务器的验证信息;The first cloud server is configured to, in response to the first binding request, send a verification request to the second cloud server, where the verification request carries verification information of the first cloud server;
所述第二云服务器用于,基于所述验证信息对所述第一云服务器进行身份验证;The second cloud server is configured to perform identity verification on the first cloud server based on the verification information;
所述第二云服务器用于,若身份验证通过,则向所述第一云服务器返回第一授权认证信息;The second cloud server is configured to return first authorization and authentication information to the first cloud server if the identity verification is passed;
所述第一云服务器用于,基于所述第一授权认证信息向给所述客户端发送第二授权认证信息;The first cloud server is configured to send second authorization and authentication information to the client based on the first authorization and authentication information;
所述客户端用于,基于所述第二授权认证信息向所述第二云服务器发送第二绑定请求;The client is configured to send a second binding request to the second cloud server based on the second authorization and authentication information;
所述第二云服务器用于,响应所述第二绑定请求,基于所述第二授权认证信息为登录在所述客户端的用户账号生成令牌信息,并将所述令牌信息发送给所述客户端;The second cloud server is configured to, in response to the second binding request, generate token information for the user account logged in on the client based on the second authorization and authentication information, and send the token information to the the client;
所述第二云服务器有用于,基于所述令牌信息对所述物联网设备进行绑定;The second cloud server is configured to bind the IoT device based on the token information;
所述客户端用于,基于所述令牌信息将所述用户账号与所述物联网设备进行绑定。The client is configured to bind the user account with the IoT device based on the token information.
相应的,本申请实施例还提供的一种云服务器,包括存储器和处理器;所述存储器存储有计算机程序,所述处理器用于运行所述存储器内的计算机程序,以执行本申请实施例提供的任一种物联网设备绑定方法。Correspondingly, an embodiment of the present application also provides a cloud server, including a memory and a processor; the memory stores a computer program, and the processor is used to run the computer program in the memory to execute the cloud server provided in the embodiment of the present application. Any IoT device binding method.
相应的,本申请实施例还提供一种存储介质,所述存储介质用于存储计算机程序,所述计算机程序被处理器加载以执行本申请实施例提供的任一种物联网设备绑定方法。Correspondingly, the embodiment of the present application further provides a storage medium, the storage medium is used for storing a computer program, and the computer program is loaded by a processor to execute any IoT device binding method provided in the embodiment of the present application.
有益效果Beneficial effect
本申请实施例采用接收客户端发起的针对物联网设备的第一绑定请求,客户端登录有用户账号;响应于第一绑定请求,指示与物联网设备匹配的第二云服务器,对与客户端匹配的第一云服务器进行身份验证;接收第二云服务器返回的第一授权认证信息,第一授权认证信息为第二云服务器对第一云服务器的身份验证通过后发送的;根据所述第一授权认证信息向所述客户端发送第二授权认证信息,以使客户端基于所述第二授权认证信息向第二云服务器发送第二绑定请求,第二绑定请求用于指示第二云服务器为用户账号生成令牌信息,并基于令牌信息对物联网设备进行绑定,该方案中登录在客户端的用户账号与物联网设备通过令牌信息,在不需要交互用户信息的情况下进行了绑定,可以实现第一云服务器和第二云服务器之间不需要交互用户信息,以及不需要通过商务合同进行保障的前提下,将对物联网设备进行绑定,提高了物联网设备绑定的效率以保护了用户的信息安全性。In the embodiment of the present application, the first binding request for the IoT device is received from the client, and the client logs in with a user account; in response to the first binding request, the second cloud server that matches the IoT device is indicated, and the The first cloud server matched by the client performs identity verification; receives the first authorization authentication information returned by the second cloud server, and the first authorization authentication information is sent after the second cloud server passes the identity verification of the first cloud server; according to the The first authorization and authentication information sends second authorization and authentication information to the client, so that the client sends a second binding request to the second cloud server based on the second authorization and authentication information, and the second binding request is used to indicate The second cloud server generates token information for the user account, and binds the IoT device based on the token information. In this solution, the user account logged in at the client and the IoT device pass the token information, and there is no need to exchange user information. Binding is carried out under certain circumstances, which can realize that there is no need to exchange user information between the first cloud server and the second cloud server, and under the premise that there is no need to guarantee through business contracts, the Internet of Things devices will be bound, which improves the IoT The efficiency of networked device binding protects the user's information security.
附图说明Description of drawings
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings that need to be used in the description of the embodiments will be briefly introduced below. Obviously, the drawings in the following description are only some embodiments of the present application. For those skilled in the art, other drawings can also be obtained based on these drawings without any creative effort.
图1是本申请实施例提供的物联网设备绑定方法的场景图;FIG. 1 is a scene diagram of an IoT device binding method provided in an embodiment of the present application;
图2是本申请实施例提供的物联网设备绑定方法的流程图;Fig. 2 is a flow chart of the IoT device binding method provided by the embodiment of the present application;
图3是本申请实施例提供的物联网设备绑定方法的另一流程图;Fig. 3 is another flow chart of the IoT device binding method provided by the embodiment of the present application;
图4是本申请实施例提供的物联网设备绑定方法的另一流程图;Fig. 4 is another flow chart of the IoT device binding method provided by the embodiment of the present application;
图5是本申请实施例提供的物联网设备绑定装置示意图;FIG. 5 is a schematic diagram of an IoT device binding device provided in an embodiment of the present application;
图6是本申请实施例提供的物联网设备绑定装置的另一示意图;Fig. 6 is another schematic diagram of the IoT device binding device provided by the embodiment of the present application;
图7是本申请实施例提供的云服务器的结构示意图。FIG. 7 is a schematic structural diagram of a cloud server provided by an embodiment of the present application.
本发明的实施方式Embodiments of the present invention
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only some of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of this application.
本申请实施例提供一种物联网设备绑定方法、装置、系统、云服务器以及存储介质。该物联网设备绑定装置可以集成在云服务器等计算机设备中。Embodiments of the present application provide a method, device, system, cloud server, and storage medium for binding IoT devices. The IoT device binding device can be integrated in computer devices such as cloud servers.
其中,云服务器可以是提供云服务、云数据库、云计算、云函数、云存储、网络服务、云通信、中间件服务、域名服务、安全服务、内容分发服务(Content Delivery Network,CDN)、以及大数据和人工智能平台等基础云计算服务的云服务器,但并不局限于此。该云服务器可以是第一云服务器或者是第二云服务器。Among them, the cloud server can provide cloud service, cloud database, cloud computing, cloud function, cloud storage, network service, cloud communication, middleware service, domain name service, security service, content distribution service (Content Delivery Network, CDN), and cloud servers for basic cloud computing services such as big data and artificial intelligence platforms, but it is not limited to this. The cloud server may be a first cloud server or a second cloud server.
请参阅图1,图1为本申请实施例所提供的物联网设备绑定方法应用的场景示意图,该场景可以包括第一云服务器、第二云服务器、客户端以及物联网设备等。用户在客户端上登录用户账号后,可以通过客户端向第一云服务器发送针对物联网设备的第一绑定请求;第一云服务器在接收第一绑定请求后,可以携带第一云服务器与第二云服务器相互信任的第三方信任机构颁发的数字证书,向第二云服务器请求进行身份验证;第二云服务器基于数字证书对第一云服务器进行身份认证,若第二云服务器对第一云服务器的身份验证通过,则向第一云服务器发送第一授权认证信息;第一云服务器在接收到第一授权认证信息后,向客户端发送第二授权认证信息;客户端在接收到第二授权认证信息之后,可以请求第二云服务器为其生成令牌信息;第二云服务器在生成令牌信息之后,将令牌信息发送给客户端,并将令牌信息与物联网设备进行绑定;客户端接收到令牌信息之后,将令牌信息和登录在客户端的用户账号进行绑定,以实现对物联网设备的绑定。当登录在客户端上的用户账号通过客户端控制物联网设备时,客户端向第二云服务器发送携带令牌信息的控制指令,由于第二云服务器根据令牌信息与物联网设备进行绑定,因此第二云服务器可以根据令牌信息确定所要控制的物联网设备,并将指令发送给对应物联网设备。Please refer to FIG. 1 . FIG. 1 is a schematic diagram of an application scenario of an IoT device binding method provided by an embodiment of the present application. The scenario may include a first cloud server, a second cloud server, a client, and an IoT device. After the user logs in the user account on the client, the client can send the first binding request for the IoT device to the first cloud server through the client; after receiving the first binding request, the first cloud server can carry the first cloud server A digital certificate issued by a third-party trust agency that is mutually trusted with the second cloud server requests identity verification from the second cloud server; the second cloud server authenticates the first cloud server based on the digital certificate, if the second cloud server If the identity verification of a cloud server passes, the first authorization authentication information is sent to the first cloud server; the first cloud server sends the second authorization authentication information to the client after receiving the first authorization authentication information; After the second authorization and authentication information, the second cloud server can be requested to generate token information for it; after the second cloud server generates the token information, it sends the token information to the client, and communicates the token information with the IoT device Binding: After the client receives the token information, it binds the token information with the user account logged in the client to realize the binding of the IoT device. When the user account logged on the client controls the IoT device through the client, the client sends a control command carrying token information to the second cloud server, because the second cloud server binds the IoT device according to the token information , so the second cloud server can determine the IoT device to be controlled according to the token information, and send the instruction to the corresponding IoT device.
其中,第一云服务器可以是客户端对应的私有云服务器,即客户端与第一云服务器之间可以属于同一物联网系统,可以与客户端建立通信连接并进行数据交互。第二云服务器可以是物联网设备对应的私有云服务器,即第二云服务器与物联网设备之间可以属于同一物联网系统,可以与物联网设备建立通信连接并进行数据交互。其中,第一云服务器与第二云服务器可以是隶属于不同物联网系统中的云服务器,例如,第一云服务器与第二云服务器为不同厂商的所提供的私有云服务器。Wherein, the first cloud server may be a private cloud server corresponding to the client, that is, the client and the first cloud server may belong to the same IoT system, and may establish a communication connection with the client and perform data interaction. The second cloud server may be a private cloud server corresponding to the IoT device, that is, the second cloud server and the IoT device may belong to the same IoT system, and may establish a communication connection with the IoT device and perform data interaction. Wherein, the first cloud server and the second cloud server may be cloud servers belonging to different IoT systems, for example, the first cloud server and the second cloud server are private cloud servers provided by different manufacturers.
其中,客户端可以包括浏览器应用程序(也可以称为Web应用)、终端上的应用程序(也可以称为APP)、以及小程序等。物联网设备可以是能够接入物联网(TheInternetofThings,简称IOT)中的物理设备,例如,冰箱、空调、电视、扫地机器人、以及智能音箱等设备。Wherein, the client may include a browser application program (also referred to as a Web application), an application program on a terminal (also referred to as an APP), and a small program. The Internet of Things device may be a physical device that can be connected to the Internet of Things (IOT for short), such as a refrigerator, an air conditioner, a TV, a sweeping robot, and a smart speaker.
其中,物联网可以是指通过各种信息传感器、射频识别技术、全球定位系统、红外感应器、或激光扫描器等各种装置与技术,实时采集任何需要监控、连接、或互动的物体或过程,采集其声、光、热、电、力学、化学、生物、或位置等各种需要的信息,通过各类可能的网络接入,实现物与物、物与人的泛在连接,实现对物品和过程的智能化感知、识别和管理。物联网是一个基于互联网、以及传统电信网等的信息承载体,它让所有能够被独立寻址的普通物理对象形成互联互通的网络。Among them, the Internet of Things can refer to real-time collection of any object or process that needs to be monitored, connected, or interacted through various devices and technologies such as information sensors, radio frequency identification technology, global positioning system, infrared sensors, or laser scanners. , to collect various required information such as sound, light, heat, electricity, mechanics, chemistry, biology, or location, and realize the ubiquitous connection between things and things, things and people through various possible network accesses, and realize the Intelligent perception, identification and management of items and processes. The Internet of Things is an information carrier based on the Internet and traditional telecommunication networks. It allows all ordinary physical objects that can be independently addressed to form an interconnected network.
为了提高第一云服务器和第二云服务器对数据处理的效率和可靠性,可以将第一云服务器划分为第一设备管理单元和第一用户管理单元等,以及可以将第二云服务器划分为第二设备管理单元和第二用户管理单元等,各个管理单元可以分工协作对数据进行处理。In order to improve the efficiency and reliability of data processing by the first cloud server and the second cloud server, the first cloud server can be divided into a first device management unit and a first user management unit, etc., and the second cloud server can be divided into The second device management unit, the second user management unit, etc., each management unit can divide and cooperate to process data.
例如,第一云服务器可以通过第一用户管理单元接收客户端发起的针对物联网设备的第一绑定请求,第一云服务器可以通过第一用户管理单元响应于第一绑定请求,向第二云服务器发送验证请求,第一云服务器可以通过第一用户管理单元基于接收到的第一授权认证信息生成第二授权认证信息并将第二授权认证信息发送给客户端。第一云服务器还可以通过第一设备管理单元,接收客户端发送的控制指令,将控制指令发送给物联网设备,以基于控制指令对物联网设备进行控制,等等。For example, the first cloud server may receive the first binding request for the IoT device initiated by the client through the first user management unit, and the first cloud server may respond to the first binding request through the first user management unit to the second When the second cloud server sends a verification request, the first cloud server may generate second authorization and authentication information based on the received first authorization and authentication information through the first user management unit and send the second authorization and authentication information to the client. The first cloud server may also receive the control instruction sent by the client through the first device management unit, and send the control instruction to the IoT device, so as to control the IoT device based on the control instruction, and so on.
第二云服务器可以通过第二用户管理单元,接收第一云服务器发送的验证请求,并基于验证请求对第一云服务器进行身份验证,若身份验证通过,则通过第二用户管理单元,向所述第一云服务器发送第一授权认证信息。第二云服务器可以通过第二设备管理单元,响应客户端发送的第二绑定请求,为登录在客户端的用户账号生成令牌信息,并基于令牌信息对物联网设备进行绑定。第二云服务器还可以通过第二设备管理单元,接收第一设备管理单元发送的控制指令,通过第二设备管理单元,基于控制指令对物联网设备进行控制,等等。The second cloud server can receive the verification request sent by the first cloud server through the second user management unit, and perform identity verification on the first cloud server based on the verification request. The first cloud server sends the first authorization and authentication information. The second cloud server may respond to the second binding request sent by the client through the second device management unit, generate token information for the user account logged in at the client, and bind the IoT device based on the token information. The second cloud server may also receive the control instruction sent by the first device management unit through the second device management unit, and control the IoT device based on the control instruction through the second device management unit, and so on.
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见下文针对物联网设备绑定方法的详细描述,此处不做赘述。In the above-mentioned embodiments, the descriptions of each embodiment have their own emphases. For the part that is not described in detail in a certain embodiment, please refer to the detailed description of the IoT device binding method below, and details will not be described here.
需要说明的是,图1所示的物联网设备绑定方法应用的场景示意图仅仅是一个示例,本申请实施例描述的物联网设备绑定方法应用以及场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着物联网设备绑定方法应用的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。It should be noted that the schematic diagram of the application scenario of the IoT device binding method shown in Figure 1 is just an example, and the application and scenarios of the IoT device binding method described in the embodiment of this application are for the purpose of illustrating the embodiment of the application more clearly The technical solution does not constitute a limitation to the technical solution provided by the embodiment of this application. Those of ordinary skill in the art know that with the evolution of the application of the IoT device binding method and the emergence of new business scenarios, the technology provided by the embodiment of this application The scheme is also applicable to similar technical problems.
以下分别进行详细说明。需说明的是,以下实施例的描述顺序不作为对实施例优选顺序的限定。Each will be described in detail below. It should be noted that the description sequence of the following embodiments is not intended to limit the preferred sequence of the embodiments.
本实施例将从物联网设备绑定装置的角度进行描述,该物联网设备绑定装置具体可以集成在云服务器中,该云服务器可以是第一云服务器。This embodiment will be described from the perspective of an apparatus for binding an Internet of Things device. The apparatus for binding an Internet of Things device may specifically be integrated in a cloud server, and the cloud server may be a first cloud server.
请参阅图2,图2是本申请一实施例提供的物联网设备绑定方法的流程示意图。该物联网设备绑定方法可以包括:Please refer to FIG. 2 . FIG. 2 is a schematic flowchart of a method for binding IoT devices provided by an embodiment of the present application. The IoT device binding method may include:
101、第一云服务器接收客户端发起的针对物联网设备的第一绑定请求,客户端登录有用户账号。101. The first cloud server receives a first binding request for an IoT device initiated by a client, and the client logs in with a user account.
其中,第一绑定请求可以是客户端发送的用于请求将登录在客户端上的用户账号与物联网设备进行绑定的请求。Wherein, the first binding request may be a request sent by the client for requesting to bind the user account logged on the client with the IoT device.
其中,用户账号为与客户端对应的账号,用户账号可以通过客户端预先进行注册得到,第一云服务器存储有该用户账号以及该用户账号对应的信息,例如,用户年龄、性别或者星座等用户信息,以及操作记录等信息。Wherein, the user account is an account corresponding to the client, and the user account can be registered through the client in advance, and the first cloud server stores the user account and the information corresponding to the user account, for example, the user's age, gender or constellation information, and information such as operation records.
比如,具体可以是第一云服务器接收用户在客户端上进行点击或滑动等操作触发的针对物联网设备的第一绑定请求。可选地,客户端可以显示包含物联网设备列表的设置界面,该物联网设备列表可以包括一个或多个物联网设备。例如,该物联网设备列表包含物联网设备A、物联网设备B和物联网设备C。For example, it may specifically be that the first cloud server receives the first binding request for the IoT device triggered by operations such as clicking or sliding on the client. Optionally, the client may display a setting interface including a list of IoT devices, and the list of IoT devices may include one or more IoT devices. For example, the IoT device list includes IoT device A, IoT device B and IoT device C.
用户可以在设置界面内,选择想要进行绑定的物联网设备,例如,当用户当前想要对物联网设备A进行绑定时,用户在设置界面内可以通过点击选择物联网设备A,从触发客户端生成针对所选择的物联网设备A的第一绑定请求。The user can select the IoT device to be bound in the setting interface. For example, when the user currently wants to bind the IoT device A, the user can click to select the IoT device A in the setting interface, from The client is triggered to generate a first binding request for the selected IoT device A.
可选地,客户端还可以接收用户输入的语音信息或手势信息等,生成针对所选择的物联网设备的第一绑定请求。例如,客户端获取用户输入的语音信息或手势信息等,通过对语音信息或手势信息等进行识别或确认,确定用户想要绑定的物联网设备,然后根据该选择的物联网设备生成第一绑定请求。Optionally, the client may also receive voice information or gesture information input by the user, and generate a first binding request for the selected IoT device. For example, the client obtains voice information or gesture information input by the user, identifies or confirms the voice information or gesture information, determines the IoT device that the user wants to bind, and then generates the first IoT device according to the selected IoT device. bind request.
第一云服务器接收客户端发送的第一绑定请求,该第一绑定请求的具体类型和内容等可以根据实际需要进行灵活设置,具体在此处不做限定。The first cloud server receives the first binding request sent by the client. The specific type and content of the first binding request can be flexibly set according to actual needs, and are not specifically limited here.
102、第一云服务器响应于第一绑定请求,指示与物联网设备匹配的第二云服务器,对与客户端匹配的第一云服务器进行身份验证。102. In response to the first binding request, the first cloud server instructs a second cloud server that matches the IoT device, and performs identity verification on the first cloud server that matches the client.
本申请中,第一云服务器在接收到第一绑定请求后,根据该第一绑定请求确定与该物联网设备对应的第二云服务器,并向第二云服务器发送请求,以指示与物联网设备匹配的第二云服务器,对第一云服务器进行身份验证。In this application, after receiving the first binding request, the first cloud server determines the second cloud server corresponding to the IoT device according to the first binding request, and sends a request to the second cloud server to indicate the The second cloud server matched with the IoT device performs identity verification on the first cloud server.
可选地,第一云服务器响应第一绑定请求向第一云服务器发送的验证请求中可以携带能够证明第一云服务器的身份的信息,第二云服务器中可以存储有一个白名单,白名单包括可信任对象,第二云服务器通过第一云服务器发送的请求携带的信息与白名单进行比较,判断白名单中是否存在第一云服务器,以对第一云服务器进行身份验证,提高安全性。Optionally, the verification request sent by the first cloud server to the first cloud server in response to the first binding request may carry information capable of proving the identity of the first cloud server, and a white list may be stored in the second cloud server. The list includes trusted objects, and the second cloud server compares the information carried in the request sent by the first cloud server with the white list to determine whether the first cloud server exists in the white list, so as to authenticate the first cloud server and improve security sex.
可选地,第一云服务器响应第一绑定请求向第一云服务器发送的验证请求可以携带第一云服务器的验证信息,第二云服务器能够基于验证信息对第一云服务器进行身份验证。Optionally, the verification request sent by the first cloud server to the first cloud server in response to the first binding request may carry verification information of the first cloud server, and the second cloud server can perform identity verification on the first cloud server based on the verification information.
其中,验证信息可以是第二云服务器用于验证第一云服务器身份的信息,例如,验证信息可以是第一云服务器的唯一标识信息、或者是身份认证机构授予的数字证书等。Wherein, the verification information may be information used by the second cloud server to verify the identity of the first cloud server, for example, the verification information may be unique identification information of the first cloud server, or a digital certificate issued by an identity authentication authority.
例如,数字证书可以是第一云服务器和第二云服务器共同信任的身份认证机构,对第一云服务器进行认证后,向第一云服务器颁发的数字证书。For example, the digital certificate may be a digital certificate issued to the first cloud server by an identity authentication authority trusted by both the first cloud server and the second cloud server after authenticating the first cloud server.
第一云服务器指示第二云服务器基于数字证书,对第一云服务器进行身份认证。由于第二云服务器同样信任身份认证机构,当第二云服务器接收到第一云服务器发送的第一数字证书时,可以根据数字证书确认第一云服务器的身份,完成对第一云服务器的身份认证。The first cloud server instructs the second cloud server to perform identity authentication on the first cloud server based on the digital certificate. Since the second cloud server also trusts the identity authentication authority, when the second cloud server receives the first digital certificate sent by the first cloud server, it can confirm the identity of the first cloud server according to the digital certificate, and complete the identification of the first cloud server. certified.
需要说明的是,本申请中,第一云服务器向第二云服务器发送的请求,除了可以包括上述第一云服务器的验证信息之外,还可以包括与第一云服务器相关的能够使得第二云服务器对第一云服务器进行身份认证的其他信息,本申请对此不作限定。It should be noted that, in this application, the request sent by the first cloud server to the second cloud server may include, in addition to the above-mentioned verification information of the first cloud server, information related to the first cloud server that enables the second Other information that the cloud server performs identity authentication on the first cloud server, which is not limited in this application.
103、若第二云服务器对第一云服务器身份验证通过,则第一云服务器接收第二云服务器返回的第一授权认证信息。103. If the second cloud server passes the identity verification of the first cloud server, the first cloud server receives the first authorization authentication information returned by the second cloud server.
其中,第一授权认证信息可以包括客户端与第二云服务器进行相互认证所需要的信息,例如,可以包括客户端和第二云服务器之间进行相互认证的协议、协议的版本号、以及基于协议进行认证的授权页面的相关信息等。除此之外,授权认证信息还可以包括客户端与第二云服务器进行相互认证所需的其他信息,本申请对此不作限定。Wherein, the first authorization and authentication information may include information required for mutual authentication between the client and the second cloud server, for example, may include the protocol for mutual authentication between the client and the second cloud server, the version number of the protocol, and information based on The relevant information of the authorization page for authentication by the protocol, etc. In addition, the authorization authentication information may also include other information required for mutual authentication between the client and the second cloud server, which is not limited in this application.
在一实施例中,第一授权认证信息可以包括第二云服务器为第一云服务器生成的身份标识(例如ClientId@ OAuth2)、授权页面的统一资源定位符(Uniform Resource Locator,URL)、以及协议及版本等信息。除此之外,授权认证信息还可以包括客户端与第二云服务器进行相互认证所需的其他信息,本申请对此不作限定。In an embodiment, the first authorization authentication information may include the identity generated by the second cloud server for the first cloud server (such as ClientId@OAuth2), the Uniform Resource Locator (Uniform Resource Locator, URL) of the authorization page, and the protocol and version information. In addition, the authorization authentication information may also include other information required for mutual authentication between the client and the second cloud server, which is not limited in this application.
其中,授权页面可以是通过URL访问的网页页面,也可以是第二云服务器对应的应用程序(application,APP)中的通过URL展示的页面,或者是第二云服务器对应的小程序中通过URL跳转的页面等。Wherein, the authorization page may be a webpage accessed through a URL, or a page displayed through a URL in an application (APP) corresponding to the second cloud server, or a page displayed through a URL in a small program corresponding to the second cloud server. redirected pages, etc.
本申请中,在第二云服务器接收到第一云服务器发送的请求,并基于请求对第一云服务器进行身份验证且验证通过之后,第二云服务器向第一云服务器发送第一授权认证信息。In this application, after the second cloud server receives the request sent by the first cloud server and authenticates the first cloud server based on the request and passes the verification, the second cloud server sends the first authorization authentication information to the first cloud server .
比如,具体可以是:若第一云服务器指示第二云服务器进行身份认证,且身份认证通过,表示第一云服务器和第二云服务器之间相互信任,则第二云服务器向第一云服务器发送第一授权认证信息,第一云服务器接收第二云服务器返回的第一授权认证信息。For example, it may specifically be: if the first cloud server instructs the second cloud server to perform identity authentication, and if the identity authentication passes, it means that the first cloud server and the second cloud server trust each other, then the second cloud server sends the first cloud server The first authorization and authentication information is sent, and the first cloud server receives the first authorization and authentication information returned by the second cloud server.
例如,客户端与第二云服务器通过OAuth2.0进行相互认证,则第一云服务器接收到第二云服务器返回的授权认证信息可以包括OAuth协议、OAuth协议的版本(例如2.0)、以及授权页面的访问地址(例如URL)等。For example, if the client and the second cloud server authenticate each other through OAuth2.0, the authorization authentication information received by the first cloud server from the second cloud server may include the OAuth protocol, the version of the OAuth protocol (for example, 2.0), and the authorization page access address (such as URL), etc.
104、根据第一授权认证信息向客户端发送第二授权认证信息,以使得客户端基于第二授权认证信息向第二云服务器发送第二绑定请求,第二绑定请求用于指示第二云服务器基于第二授权认证信息,为用户账号生成令牌信息,并基于令牌信息对物联网设备进行绑定。104. Send second authorization and authentication information to the client according to the first authorization and authentication information, so that the client sends a second binding request to the second cloud server based on the second authorization and authentication information, and the second binding request is used to indicate the second The cloud server generates token information for the user account based on the second authorization and authentication information, and binds the IoT device based on the token information.
其中,令牌信息可以是表征具有控制物联网设备的权限的对象的标识信息,例如,登录在客户端上的用户账号基于令牌信息向物联网设备发送控制指令,则该控制指令对于物联网设备而言是合法的,是可被执行的。Wherein, the token information may be identification information representing an object having the authority to control the IoT device. For example, if a user account logged on to the client sends a control command to the IoT device based on the token information, the control command is important for the IoT device. As far as the device is concerned, it is legal and executable.
其中,绑定可以是对第二云服务器对物联网设备和登录在客户端的用户账号建立关联关系的过程,具体地,以物联网设备在第二云服务器中的身份标识为物联网设备序列号为例进行说明:第二云服务器针对登录在客户端的用户账号生成令牌信息,通过令牌信息可以确定发送请求或者指令的对象,第二云服务器将登录在客户端上的用户账号对应的令牌信息和物联网设备的设备序列号进行绑定。Wherein, binding may be a process of establishing an association relationship between the second cloud server and the IoT device and the user account logged in at the client, specifically, the identity of the IoT device in the second cloud server is identified as the serial number of the IoT device Take an example to illustrate: the second cloud server generates token information for the user account logged in on the client, and the object to send the request or instruction can be determined through the token information, and the second cloud server will log in the user account corresponding to the client. The license plate information is bound with the device serial number of the IoT device.
本申请实施例中,当第一云服务器接收到第二云服务器发送的第一授权认证信息之后,根据第一授权认证信息生成第二授权认证信息,并将第二授权认证信息发送给客户端。In this embodiment of the application, after the first cloud server receives the first authorization and authentication information sent by the second cloud server, it generates the second authorization and authentication information according to the first authorization and authentication information, and sends the second authorization and authentication information to the client .
本申请实施例中,第二授权认证信息可以包括第一授权认证信息的内容。可选地,第二授权认证信息除了包括第一授权认证信息的内容,还可以包含其他的内容,例如,第一云服务器的相关信息。In this embodiment of the present application, the second authorization and authentication information may include content of the first authorization and authentication information. Optionally, besides the content of the first authorization and authentication information, the second authorization and authentication information may also include other contents, for example, information about the first cloud server.
例如,第一授权认证信息包括第一云服务器的身份标识(例如ClientId@ OAuth2)、授权页面的统一资源定位符(Uniform Resource Locator,URL)、以及协议及版本等信息,当第一云服务器接收到该第一授权认证信息之后,在第一授权认证信息的基础上加入第一云服务器的回调地址信息callback_url,从而生成第二授权认证信息,将第二授权认证信息发送给客户端。For example, the first authorization authentication information includes the identity of the first cloud server (such as ClientId@ OAuth2), the uniform resource locator (Uniform Resource Locator, URL) of the authorization page, and the protocol and version information, after the first cloud server receives the first authorization authentication information, it adds The callback address information callback_url of the first cloud server generates second authorization and authentication information, and sends the second authorization and authentication information to the client.
客户端在接收到第二授权认证信息后,通过第二授权认证信息与第二云服务器进行认证后,向第二云服务器发第二绑定请求,请求第二云服务器根据第二授权认证信息,对登录在客户端上的用户账号生成令牌信息。第二云服务器为登录在客户端的用户账号生成令牌信息之后,将令牌信息与物联网设备进行绑定,具体地可以将令牌信息和物联网设备的身份标识进行绑定,并将令牌信息发送给客户端。客户端则在接收到第二云服务器发送的令牌信息后,将令牌信息与登录在客户端的用户账号进行绑定,第二云服务器将令牌信息与物联网设备进行绑定,客户端将用户账号与令牌信息进行绑定,完成绑定过程,令牌信息作为绑定的中间桥梁,实现不需要交互用户信息即可实现绑定。After receiving the second authorization and authentication information, the client sends a second binding request to the second cloud server after authenticating with the second cloud server through the second authorization and authentication information, requesting the second cloud server to , to generate token information for the user account logged in on the client. After the second cloud server generates token information for the user account logged in at the client, it binds the token information with the IoT device, specifically, it can bind the token information with the identity of the IoT device, and Card information is sent to the client. After receiving the token information sent by the second cloud server, the client binds the token information with the user account logged in the client, the second cloud server binds the token information with the IoT device, and the client Bind the user account with the token information to complete the binding process. The token information is used as an intermediate bridge for binding, so that the binding can be realized without interacting user information.
在一实施例中,当用户通过客户端控制物联网时,客户端向第二云服务器发送携带令牌信息的控制指令,第二云服务器根据令牌信息确定用户所要控制的物联网设备,并将控制指令发送给物联网设备。In one embodiment, when the user controls the Internet of Things through the client, the client sends a control instruction carrying token information to the second cloud server, and the second cloud server determines the Internet of Things device to be controlled by the user according to the token information, and Send control commands to IoT devices.
在另一实施例中,第二云服务器为登录在客户端的用户账号生成令牌信息之后,第二云服务器将令牌信息发送给所要绑定的物联网设备,并将令牌信息发送给客户端,客户端将用户账号与令牌信息进行绑定,完成绑定过程。In another embodiment, after the second cloud server generates the token information for the user account logged in the client, the second cloud server sends the token information to the IoT device to be bound, and sends the token information to the client On the terminal, the client binds the user account with the token information to complete the binding process.
当用户通过客户端控制物联网设备时,客户端向物联网设备发送携带令牌信息的控制指令,物联网设备判断控制指令中的令牌信息以及存储的控制指令是否一致,若一致,则执行该控制指令,若不一致,则不执行该控制指令。When the user controls the IoT device through the client, the client sends a control command carrying token information to the IoT device, and the IoT device judges whether the token information in the control command is consistent with the stored control command, and if they are consistent, execute If the control instruction is inconsistent, the control instruction will not be executed.
可以理解的是,第二云服务器没有获取的到登录在客户端的用户账号信息,第二云服务器对第一云服务器进行身份验证时,是利用第一云服务器的数字证书,验证通过后,第二云服务器会对登录在客户端的用户账号生成令牌信息,客户端通过令牌信息访问第二云服务器,因此,绑定过程中,第二云服务器以及物联网设备没有获取到登录在客户端的用户账号的相关信息,用户的信息没有泄露,提高了绑定过程中的信息安全性。It is understandable that the second cloud server does not obtain the user account information logged in at the client. When the second cloud server authenticates the first cloud server, it uses the digital certificate of the first cloud server. After the verification is passed, the second cloud server The second cloud server will generate token information for the user account logged in on the client, and the client accesses the second cloud server through the token information. Therefore, during the binding process, the second cloud server and the IoT device do not obtain the information logged on the client. The relevant information of the user account and the user's information are not leaked, which improves the information security in the binding process.
在实际应用中,可以是根据功能或用途等对第一云服务器以及第二云服务器进行单元划分,均衡第一云服务器以及第二云服务器的负载,提高第一云服务器以及第二云服务器的响应速率,即在一实施例中,第一云服务器可以包括第一设备管理单元,第二云服务器可以包括第二设备管理单元,物联网设备绑定方法对物联网设备进行绑定之后,具体可以包括:In practical applications, the first cloud server and the second cloud server can be divided into units according to functions or purposes, etc., to balance the loads of the first cloud server and the second cloud server, and to increase the capacity of the first cloud server and the second cloud server. Response rate, that is, in an embodiment, the first cloud server may include a first device management unit, and the second cloud server may include a second device management unit. After the IoT device binding method binds the IoT device, specifically Can include:
通过第一设备管理单元,接收客户端发送的控制指令;receiving a control instruction sent by the client through the first device management unit;
通过第一设备管理单元,将控制指令通过第二设备管理单元发送给物联网设备,以基于控制指令对物联网设备进行控制。The first device management unit sends the control command to the IoT device through the second device management unit, so as to control the IoT device based on the control command.
其中,第一设备管理单元可以是第一云服务器中执行指定特定功能的一个单元,例如,可以执行接收客户端发送的控制指令的功能。Wherein, the first device management unit may be a unit in the first cloud server that performs a specified function, for example, may perform a function of receiving a control instruction sent by a client.
其中,第二设备管理单元可以是第二云服务器中指定执行特定功能的一个单元,例如,可以执行将控制指令发送给物联网设备的功能。Wherein, the second device management unit may be a unit designated to perform a specific function in the second cloud server, for example, may perform a function of sending a control command to an IoT device.
其中,控制指令可以是客户端告诉物联网设备执行特定操作的代码。Wherein, the control instruction may be a code for the client to tell the IoT device to perform a specific operation.
例如,具体可以是第一云服务器通过第一设备管理单元接收客户端发送的针对物联网设备的控制指令,将控制指令保存至数据库中或者是缓存中,第一设备管理单元从数据库或者是缓存中获取控制指令,将控制指令发送第二云服务器的第二设备管理单元,第二设备管理单元将控制指令给物联网设备,以使得物联网基于控制指令执行相应的操作。For example, it may be specifically that the first cloud server receives the control instruction for the IoT device sent by the client through the first device management unit, and saves the control instruction in the database or the cache, and the first device management unit retrieves the information from the database or the cache. The control instruction is obtained from the cloud server, and the control instruction is sent to the second device management unit of the second cloud server, and the second device management unit sends the control instruction to the IoT device, so that the IoT device performs corresponding operations based on the control instruction.
为了减少数据的交互,提高对控制指令的响应速度,第一云服务器接收控制指令后,直接将控制指令发送给物联网设备,即在一实施例中,第一云服务器包括第一设备管理单元,物联网设备绑定方法对物联网设备进行绑定之后,具体还可以包括:In order to reduce the interaction of data and improve the response speed to the control command, the first cloud server directly sends the control command to the IoT device after receiving the control command, that is, in one embodiment, the first cloud server includes a first device management unit , after the IoT device binding method binds the IoT device, it can also specifically include:
通过第一设备管理单元,接收客户端发送的控制指令;receiving a control instruction sent by the client through the first device management unit;
通过第一设备管理单元,将控制指令发送给物联网设备,以基于控制指令对物联网设备进行控制。The first device management unit sends the control instruction to the Internet of Things device, so as to control the Internet of Things device based on the control instruction.
比如,具体可以是第一云服务器通过第一设备管理单元,接收客户端发送的控制指令,并通过第一设备管理单元将控制指令发送给物联网设备,以使得物联网基于控制指令执行相应的操作。For example, specifically, the first cloud server may receive the control instruction sent by the client through the first device management unit, and send the control instruction to the Internet of Things device through the first device management unit, so that the Internet of Things executes corresponding operations based on the control instruction. operate.
在一实施例中,客户端可以响应用户的操作生成控制指令,直接将控制指令发送给物联网设备,以使得物联网基于控制指令执行相应的操作。In an embodiment, the client may generate a control command in response to the user's operation, and directly send the control command to the IoT device, so that the IoT device performs a corresponding operation based on the control command.
由上可知,本申请实施例可以接收客户端发起的针对物联网设备的第一绑定请求,客户端登录有用户账号;响应于第一绑定请求,指示与物联网设备匹配的第二云服务器,对与客户端匹配的第一云服务器进行身份验证;接收第二云服务器返回的第一授权认证信息,第一授权认证信息为第二云服务器对第一云服务器的身份验证通过后发送的;基于第一授权认证信息向客户端发送第二授权认证信息,以使得客户端基于第二授权认证信息向第二云服务器发送第二绑定请求,第二绑定请求用于指示第二云服务器基于第二授权认证信息,为用户账号生成令牌信息,并基于令牌信息对物联网设备进行绑定。该方案可以实现第一云服务器和第二云服务器之间不需要交互用户信息,以及不需要通过商务合同进行保障的前提下,将登陆在客户端的用户账号对物联网设备进行绑定,提高了物联网设备绑定的效率。As can be seen from the above, the embodiment of the present application can receive the first binding request for the IoT device initiated by the client, and the client has logged in with a user account; in response to the first binding request, indicate the second cloud that matches the IoT device. The server performs identity verification on the first cloud server that matches the client; receives the first authorization authentication information returned by the second cloud server, and the first authorization authentication information is sent after the second cloud server passes the identity verification of the first cloud server based on the first authorization and authentication information to send the second authorization and authentication information to the client, so that the client sends a second binding request to the second cloud server based on the second authorization and authentication information, and the second binding request is used to indicate the second The cloud server generates token information for the user account based on the second authorization and authentication information, and binds the IoT device based on the token information. This solution can bind the user account logged in the client to the IoT device under the premise that the first cloud server and the second cloud server do not need to exchange user information and do not need to be guaranteed by a business contract, which improves the Internet of Things. The efficiency of IoT device bonding.
在上述实施例的基础上,下面将举例做进一步详细说明。On the basis of the above-mentioned embodiments, examples will be given below for further detailed description.
本实施例将从物联网设备绑定装置的角度进行描述,该物联网设备绑定装置具体可以集成在云服务器中,该云服务器可以是第二云服务器。This embodiment will be described from the perspective of an apparatus for binding an Internet of Things device. The apparatus for binding an Internet of Things device may specifically be integrated in a cloud server, and the cloud server may be a second cloud server.
本申请实施例提供的一种物联网设备绑定方法,该方法可以由第二云服务器执行,如图3所示,该物联网设备绑定方法的具体流程可以如下:An IoT device binding method provided in an embodiment of the present application can be executed by a second cloud server. As shown in FIG. 3 , the specific process of the IoT device binding method can be as follows:
201、接收第一云服务器发送的验证请求,验证请求为第一云服务器响应客户端发起的针对物联网设备的第一绑定请求发送的,客户端登录有用户账号。201. Receive a verification request sent by a first cloud server, where the verification request is sent by the first cloud server in response to a first binding request for an IoT device initiated by a client, and the client has a user account logged in.
其中,第一云服务器和第二云服务器可以是上述实施例中提及的第一云服务器。例如,第一云服务器与第二云服务器可以为不同厂商的所提供的私有云服务器。Wherein, the first cloud server and the second cloud server may be the first cloud server mentioned in the foregoing embodiments. For example, the first cloud server and the second cloud server may be private cloud servers provided by different manufacturers.
其中,验证请求可以是第一云服务器发送的用于请求第二云服务器进行身份验证的请求信息。Wherein, the verification request may be request information sent by the first cloud server for requesting the second cloud server to perform identity verification.
比如,具体可以是:第一云服务器可以响应于客户端发送针对物联网设备的绑定请求,生成验证请求,并将验证请求发送给第二云服务器,此时第二云服务器可以接收第一云服务器发送的验证请求。For example, it may specifically be: the first cloud server may generate a verification request in response to the binding request sent by the client for the IoT device, and send the verification request to the second cloud server. At this time, the second cloud server may receive the first The verification request sent by the cloud server.
202、基于验证请求对第一云服务器进行身份验证。202. Perform identity verification on the first cloud server based on the verification request.
比如,具体可以是第一云服务器接收到第一云服务器发送的验证请求后,根据验证请求携带的信息对第一云服务器进行身份验证,例如,第一云服务器可以携带标识,第二云服务器根据该标识,与预设的标识列表进行比较,若标识列表中包括该标识,则对第一云服务器的验证通过,若标识列表中不包括该标识,则对第一云服务器的验证不通过。For example, after receiving the verification request sent by the first cloud server, the first cloud server may perform identity verification on the first cloud server according to the information carried in the verification request. For example, the first cloud server may carry an identification, and the second cloud server may According to the identification, compare with the preset identification list, if the identification list includes the identification, then the verification of the first cloud server is passed, if the identification list does not include the identification, then the verification of the first cloud server fails .
为了防止出现通过修改标识信息以获取第二云服务器的信任的情况,提高身份验证的安全性和可靠性,验证请求还可以携带验证信息,验证信息可以是第二云服务器用于验证第一云服务器身份的信息,例如,可以是第三方信任机构提供的数字证书,即在一实施例中,步骤“接收第一云服务器发送的验证请求,基于验证请求对第一云服务器进行身份验证”,具体可以包括:In order to prevent the situation of obtaining the trust of the second cloud server by modifying the identification information and improve the security and reliability of identity verification, the verification request can also carry verification information, which can be used by the second cloud server to verify the first cloud server. The server identity information, for example, may be a digital certificate provided by a third-party trust agency, that is, in one embodiment, the step "receive the verification request sent by the first cloud server, and perform identity verification on the first cloud server based on the verification request", Specifically can include:
接收第一云服务器基于响应客户端的绑定请求发送的验证请求,验证请求携带第一云服务器的验证信息;receiving a verification request sent by the first cloud server based on the binding request in response to the client, where the verification request carries verification information of the first cloud server;
基于验证信息对第一云服务器进行身份验证。Perform identity verification on the first cloud server based on the verification information.
其中,验证信息可以是第二云服务器用于验证第一云服务器身份的信息,例如,第一云服务器的唯一标识信息、或者是身份认证机构授予的数字证书。Wherein, the verification information may be information used by the second cloud server to verify the identity of the first cloud server, for example, unique identification information of the first cloud server, or a digital certificate issued by an identity authentication authority.
比如,具体可以是用户在客户端触发向第一云服务器发送绑定请求,第一云服务器响应该请求向第二云服务器发送验证请求,验证请求携带验证信息。For example, specifically, the user triggers sending a binding request to the first cloud server on the client side, and the first cloud server sends a verification request to the second cloud server in response to the request, and the verification request carries verification information.
第二云服务器接收到验证请求后,根据请求携带的验证信息对第一云服务器进行验证。After receiving the verification request, the second cloud server verifies the first cloud server according to the verification information carried in the request.
在一实施例中,验证信息可以是第一云服务器和第二云服务器共同信任的身份认证机构,对第一云服务器进行认证后,向第一云服务器颁发的数字证书。In an embodiment, the verification information may be a digital certificate issued to the first cloud server by an identity authentication authority trusted by both the first cloud server and the second cloud server after authenticating the first cloud server.
由于第二云服务器信任该身份认证机构,因此,当第二云服务器接收到该数字证书时,可以根据数字证书确定第一云服务器是可信任的,即第二云服务器对第一云服务器的验证通过。Since the second cloud server trusts the identity authentication authority, when the second cloud server receives the digital certificate, it can be determined according to the digital certificate that the first cloud server is trustworthy, that is, the second cloud server is trustworthy to the first cloud server. Verification passed.
203、若身份验证通过,则向第一云服务器发送第一授权认证信息,以使得第一云服务器基于第一授权认证信息向客户端发送第二授权认证信息。203. If the identity verification passes, send first authorization and authentication information to the first cloud server, so that the first cloud server sends second authorization and authentication information to the client based on the first authorization and authentication information.
其中,第一授权认证信息可以是客户端与第二云服务器进行相互认证所需要的信息,例如,客户端和第二云服务器之间进行相互认证的协议、协议的版本号、提供相互认证的授权页面等信息。Wherein, the first authorization authentication information may be information required for mutual authentication between the client and the second cloud server, for example, the protocol for mutual authentication between the client and the second cloud server, the version number of the protocol, the Authorization page and other information.
其中,第二授权认证信息可以包括第一授权认证信息的内容。可选的,第二授权认证信息除了包括第一授权认证信息的内容,还可以包含其他的内容,例如,第一云服务器的相关信息。Wherein, the second authorization authentication information may include the content of the first authorization authentication information. Optionally, the second authorization and authentication information may include other contents besides the content of the first authorization and authentication information, for example, information about the first cloud server.
例如,第一授权认证信息包括第一云服务器的身份标识(例如ClientId@ OAuth2)、授权页面的统一资源定位符(Uniform Resource Locator,URL)、以及协议及版本等信息,当第一云服务器接收到该第一授权认证信息之后,在第一授权认证信息的基础上加入第一云服务器的回调地址信息callback_url,从而生成第二授权认证信息,将第二授权认证信息发送给客户端。For example, the first authorization authentication information includes the identity of the first cloud server (such as ClientId@ OAuth2), the uniform resource locator (Uniform Resource Locator, URL) of the authorization page, and the protocol and version information, after the first cloud server receives the first authorization authentication information, it adds The callback address information callback_url of the first cloud server generates second authorization and authentication information, and sends the second authorization and authentication information to the client.
比如,具体可以是若第二云服务器对第一云服务器的验证通过,则向第一云服务器发送第一授权认证信息,以使得第一云服务器在第一授权认证信息的基础上,加上自身的回调地址信息,生成第二授权认证信息,并向客户端发送第二授权认证信息。For example, if the second cloud server passes the verification of the first cloud server, it may send the first authorization and authentication information to the first cloud server, so that the first cloud server adds own callback address information, generate the second authorization authentication information, and send the second authorization authentication information to the client.
204、响应于客户端基于第二授权认证信息发送的第二绑定请求,为用户账号生成令牌信息,并基于令牌信息对物联网设备进行绑定。204. In response to the second binding request sent by the client based on the second authorization and authentication information, generate token information for the user account, and bind the IoT device based on the token information.
比如,具体可以是第一云服务器将第二授权认证信息发送给客户端之后,登录在客户端上的用户账号通过第二授权认证信息中包含的内容与第二云服务器进行认证后,向第二云服务器发送第二绑定请求。For example, after the first cloud server sends the second authorization authentication information to the client, after the user account logged in on the client is authenticated with the second cloud server through the content contained in the second authorization authentication information, the second authorization authentication information is sent to the second cloud server. The second cloud server sends a second binding request.
第二云服务器响应终端发送的第二绑定请求,为登录在客户端上的用户账号生成令牌信息,并将令牌信息与客户端所请求绑定的物联网设备进行绑定,具体地,可以是将令牌信息和物联网设备的设备标识进行绑定。The second cloud server responds to the second binding request sent by the terminal, generates token information for the user account logged on the client, and binds the token information to the IoT device requested by the client to be bound, specifically , which can be to bind the token information with the device identifier of the IoT device.
在一实施例中,步骤“响应于客户端基于第二授权认证信息发送的第二绑定请求,为用户账号生成令牌信息,并基于令牌信息对物联网设备进行绑定”,具体可以包括:In an embodiment, the step of "generating token information for the user account in response to the second binding request sent by the client based on the second authorization and authentication information, and binding the IoT device based on the token information" can specifically be include:
接收客户端基于第一云服务器发送的第二授权认证信息,反馈的同意绑定信息;Receiving the consent binding information fed back by the client based on the second authorization authentication information sent by the first cloud server;
基于同意绑定信息,针对用户账号生成令牌信息,并将令牌信息发送给客户端,以使客户端基于令牌信息将用户账户与物联网设备进行绑定;Based on the agreed binding information, generate token information for the user account, and send the token information to the client, so that the client can bind the user account with the IoT device based on the token information;
基于令牌信息对物联网设备进行绑定。Bind IoT devices based on token information.
其中,同意绑定信息可以是表示客户端同意与物联网设备进行绑定发送的信息,例如,表示客户端同意与物联网设备进行绑定的信息为1,表示客户端不同意与物联网设备进行绑定得信息为0,即若用户同意绑定,则同意绑定信息为1。Wherein, the consent binding information may be information indicating that the client agrees to bind with the IoT device, for example, the information indicating that the client agrees to bind with the IoT device is 1, indicating that the client does not agree to bind with the IoT device The binding information is 0, that is, if the user agrees to the binding, the consent binding information is 1.
比如,具体可以是若第二云服务器对第一云服务器验证通过,向第一云服务器发送第一授权认证信息,第一云服务器基于第一授权认证信息,将第二授权认证信息发送给客户端,客户端根据第二授权认证信息中的授权网页的URL访问授权网页,用户在该授权网页上进行绑定确认,客户端响应用户在授权网页上的确认操作,向第二云服务器发送同意绑定信息。For example, specifically, if the second cloud server passes the verification of the first cloud server, it sends the first authorization and authentication information to the first cloud server, and the first cloud server sends the second authorization and authentication information to the client based on the first authorization and authentication information. end, the client accesses the authorized webpage according to the URL of the authorized webpage in the second authorization authentication information, the user confirms the binding on the authorized webpage, and the client responds to the user's confirmation operation on the authorized webpage, and sends a consent to the second cloud server binding information.
第二云服务器可以根据同意绑定信息生成令牌信息,将令牌信息与客户端所请求绑定的物联网设备进行绑定,并将令牌信息发送给客户端,以使得客户端在接收到令牌信息后,将令牌信息与登录在客户端上的用户账号进行绑定。The second cloud server can generate token information according to the agreed binding information, bind the token information with the IoT device requested by the client, and send the token information to the client, so that the client receives After obtaining the token information, bind the token information with the user account logged in on the client.
在一实施例中,步骤“基于令牌信息对物联网设备进行绑定”,具体可以包括:In an embodiment, the step of "binding the IoT device based on the token information" may specifically include:
响应客户端携带令牌信息发送的信息获取请求,生成设备绑定信息,并将设备绑定信息发送给客户端;Respond to the information acquisition request sent by the client carrying the token information, generate device binding information, and send the device binding information to the client;
若客户端返回的信息与设备绑定信息相匹配,则基于令牌信息对物联网设备进行绑定。If the information returned by the client matches the device binding information, the IoT device is bound based on the token information.
其中,信息获取请求可以是用于请求第二云服务器生成设备绑定信息的请求。Wherein, the information acquisition request may be a request for requesting the second cloud server to generate device binding information.
其中,设备绑定信息可以是设备绑定码,设备绑定信息的具体类型和包含内容等可以根据实际需要进行灵活设置,具体在此处不做限定,例如,设备绑定信息可以是一串数字或者是字符串等形式。Among them, the device binding information can be a device binding code, and the specific type and content of the device binding information can be flexibly set according to actual needs, which is not limited here. For example, the device binding information can be a string of numbers or strings.
比如,具体可以是客户端携带令牌信息向第二云服务器发起获取设备绑定信息的信息获取请求,即请求第二云服务生成设备绑定信息。For example, it may specifically be that the client carries the token information and initiates an information acquisition request for acquiring device binding information to the second cloud server, that is, requests the second cloud service to generate the device binding information.
第二云服务器可以根据接收到的信息获取请求携带的令牌信息,验证发送信息获取请求的对象的身份,若验证通过,则生成相应的设备绑定信息,并将设备绑定信息发送给客户端。The second cloud server can verify the identity of the object sending the information acquisition request according to the token information carried in the received information acquisition request, and if the verification is passed, generate corresponding device binding information and send the device binding information to the client end.
用户可以通过客户端查看设备绑定信息,并在客户端提供的用户界面输入其获取到的设备绑定信息,客户端响应用户的输入操作,向第二云服务器返回用户输入的信息。第二云服务器根据客户端返回的信息,以及自身生成的设备绑定信息进行比较,若二者一致,则将令牌信息与客户端所请求绑定的物联网设备进行绑定。The user can view the device binding information through the client, and input the obtained device binding information on the user interface provided by the client, and the client responds to the user's input operation and returns the information entered by the user to the second cloud server. The second cloud server compares the information returned by the client with the device binding information generated by itself, and if the two are consistent, binds the token information with the IoT device requested by the client.
可选的,为了提高安全性,可以为设备绑定信息设置有效期,若客户端在有效期外发送该设备绑定信息,第二云服务器确定该终端发送的设备绑定信息为无效信息,不对物联网设备进行绑定。Optionally, in order to improve security, a validity period can be set for the device binding information. If the client sends the device binding information outside the validity period, the second cloud server will determine that the device binding information sent by the terminal is invalid information, which is not valid. Internet-connected devices are bound.
在一实施例中,步骤“将令牌信息发送给客户端”,具体可以包括:In an embodiment, the step of "sending token information to the client" may specifically include:
获取第一云服务器的回调地址信息;Obtain the callback address information of the first cloud server;
基于回调地址信息,向第一云服务器发送令牌信息。Based on the callback address information, the token information is sent to the first cloud server.
其中,回调地址信息可以是第一云服务器的地址信息,用于指示第二云服务器基于回调地址信息返回令牌信息。Wherein, the callback address information may be address information of the first cloud server, and is used to instruct the second cloud server to return token information based on the callback address information.
比如,具体可以是第一云服务器获取回调地址信息,将回调地址信息和第一授权认证信息发送给客户端,以使得客户端根据接收到的第二授权认证信息,访问授权页面,授权页面内可以包括确认控件,确认控件可以用于供用户操作进行绑定确认,客户端响应用户在授权页面针对确认控件的操作,例如可以点击等操作触发该控件,向第二云服务器发送同意绑定信息,以及发送回调地址信息。For example, it may specifically be that the first cloud server obtains the callback address information, and sends the callback address information and the first authorization authentication information to the client, so that the client accesses the authorization page according to the received second authorization authentication information. A confirmation control can be included, and the confirmation control can be used for user operation to confirm the binding. The client responds to the user's operation on the confirmation control on the authorization page, such as clicking and other operations to trigger the control, and sends the consent binding information to the second cloud server , and send callback address information.
第二云服务器根据回调地址信息将令牌信息发送第一云服务器。The second cloud server sends the token information to the first cloud server according to the callback address information.
在实际应用中,可以是根据功能或用途等对第一云服务器和第二云服务器进行单元划分,均衡第一云服务器和第二云服务器的负载,提高第一云服务器和第二云服务器的响应速率,即在一实施例中,第一云服务器可以包括第一设备管理单元,对物联网设备进行绑定后,物联网设备绑定方法具体还可以包括:In practical applications, the first cloud server and the second cloud server can be divided into units according to functions or purposes, etc., to balance the loads of the first cloud server and the second cloud server, and to increase the capacity of the first cloud server and the second cloud server. Response rate, that is, in an embodiment, the first cloud server may include a first device management unit, and after binding the IoT device, the IoT device binding method may specifically include:
接收第一设备管理单元发送的控制指令;receiving a control instruction sent by the first device management unit;
基于控制指令对物联网设备进行控制。IoT devices are controlled based on control commands.
其中,第一设备管理单元可以是第一云服务器中执行指定特定功能的一个单元,例如,可以执行将客户端发送的控制指令发送给第二云服务器的功能。Wherein, the first device management unit may be a unit in the first cloud server that performs a specified function, for example, may perform a function of sending a control command sent by the client to the second cloud server.
比如,具体可以是第二云服务器接收第一云服务器的第一设备管理单元发送的控制指令,并将控制指令发送给物联网设备,以使得物联网设备基于接收到的控制指令执行相应的操作。For example, it may specifically be that the second cloud server receives the control instruction sent by the first device management unit of the first cloud server, and sends the control instruction to the IoT device, so that the IoT device performs a corresponding operation based on the received control instruction .
可选的,第二云服务器可以包括第二设备管理单元,第二设备管理单元可以是第二云服务器中指定执行特定功能的一个单元,例如,可以执行接收第一云服务器的第一设备管理单元发送的控制指令,将控制指令发送给物联网设备以对物联网设备进行控制的功能。Optionally, the second cloud server may include a second device management unit, and the second device management unit may be a unit designated to perform a specific function in the second cloud server, for example, it may receive the first device management of the first cloud server The control command sent by the unit is the function of sending the control command to the IoT device to control the IoT device.
比如,具体可以是第二云服务器通过第二设备管理单元接收第一云服务器的第一设备管理单元发送的控制指令,并通过第二设备管理单元将控制指令发送给物联网设备,以使得物联网设备基于接收到的控制指令执行相应的操作。For example, specifically, the second cloud server may receive the control instruction sent by the first device management unit of the first cloud server through the second device management unit, and send the control instruction to the IoT device through the second device management unit, so that the IoT Networked devices perform corresponding operations based on the received control instructions.
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见上文针对物联网设备绑定方法的详细描述,此处不再赘述。In the above-mentioned embodiments, the descriptions of each embodiment have their own emphases. For the part not described in detail in a certain embodiment, please refer to the detailed description of the binding method for IoT devices above, and will not be repeated here.
由上可知,本申请实施例通过接收第一云服务器发送的验证请求,验证请求为第一云服务器响应客户端发送的第一绑定请求发送的,客户端登录有用户账号;基于验证请求对第一云服务器进行身份验证;若身份验证通过,则向第一云服务器发送第一授权认证信息,以使得第一云服务器基于第一授权认证信息生成第二授权认证信息,并将第二授权认证信息发送给客户端;响应于客户端基于第二授权认证信息发送的第二绑定请求,为用户账号生成令牌信息,并基于令牌信息对物联网设备进行绑定。该方案可以实现第一云服务器和第二云服务器之间不需要交互用户信息,以及不需要通过商务合同进行保障的前提下,将对物联网设备进行绑定,提高了物联网设备绑定的效率。As can be seen from the above, the embodiment of the present application receives the verification request sent by the first cloud server, and the verification request is sent by the first cloud server in response to the first binding request sent by the client, and the client has a user account logged in; The first cloud server performs identity verification; if the identity verification is passed, the first authorization authentication information is sent to the first cloud server, so that the first cloud server generates second authorization authentication information based on the first authorization authentication information, and the second authorization The authentication information is sent to the client; in response to the second binding request sent by the client based on the second authorization and authentication information, token information is generated for the user account, and the IoT device is bound based on the token information. This solution can realize the binding of IoT devices on the premise that the first cloud server and the second cloud server do not need to exchange user information and do not need to be guaranteed by business contracts, which improves the binding efficiency of IoT devices. efficiency.
在上述实施例的基础上,下面将举例做进一步详细说明。On the basis of the above-mentioned embodiments, examples will be given below for further detailed description.
本实施例将从物联网设备绑定系统的角度进行描述,其中,物联网设备绑定系统包括第一云服务器、第二云服务器、与第一云服务器匹配的客户端,以及与第二云服务器匹配的物联网设备,其中,This embodiment will be described from the perspective of the IoT device binding system, wherein the IoT device binding system includes a first cloud server, a second cloud server, a client that matches the first cloud server, and a client that matches the second cloud server. The IoT device matched by the server, where,
客户端可以用于,向第一云服务器发送针对物联网设备的第一绑定请求。The client may be used to send the first binding request for the IoT device to the first cloud server.
第一云服务器可以用于,响应于绑定请求,向第二云服务器发送验证请求,验证请求携带第一云服务器的验证信息,客户端登录有用户账号。The first cloud server may be configured to, in response to the binding request, send a verification request to the second cloud server, where the verification request carries verification information of the first cloud server, and the client is logged in with a user account.
第二云服务器可以用于,基于验证信息对第一云服务器进行身份验证。The second cloud server may be used to authenticate the first cloud server based on the verification information.
第二云服务器可以用于,若身份验证通过,则向第一云服务器返回第一授权认证信息。The second cloud server may be configured to, if the identity verification is passed, return the first authorization authentication information to the first cloud server.
第一云服务器可以用于,基于第一授权认证信息向客户端发送第二授权认证信息。The first cloud server may be configured to send second authorization and authentication information to the client based on the first authorization and authentication information.
客户端可以用于,基于第二授权认证信息向第二云服务器发送第二绑定请求。The client may be configured to send a second binding request to the second cloud server based on the second authorization and authentication information.
第二云服务器可以用于,响应第二绑定请求,基于授权认证信息为登录在客户端的用户账号生成令牌信息,并将令牌信息发送给客户端。The second cloud server may be configured to, in response to the second binding request, generate token information for the user account logged in the client based on the authorization and authentication information, and send the token information to the client.
第二云服务器可以用于,基于令牌信息对物联网设备进行绑定;The second cloud server can be used to bind the IoT device based on the token information;
客户端可以用于,基于令牌信息将用户账号与物联网设备进行绑定。The client can be used to bind the user account with the IoT device based on the token information.
其中名词的含义与上述物联网设备绑定方法中相同,具体实现细节可以参考上述物联网设备绑定方法实施例中的详细说明。The meanings of the nouns are the same as those in the above-mentioned IoT device binding method, and for specific implementation details, refer to the detailed description in the above-mentioned embodiment of the IoT device binding method.
具体地,基于上述物联网设备绑定系统,本申请实施例可以提供的一种物联网设备绑定方法,如图4所示,该物联网设备绑定方法的具体流程可以如下:Specifically, based on the above IoT device binding system, an embodiment of the present application may provide a method for binding an IoT device, as shown in FIG. 4 , the specific process of the IoT device binding method may be as follows:
301、客户端与物联网设备建立连接。301. The client establishes a connection with the IoT device.
比如,具体可以是物联网设备处于配网状态,客户端可以搜索到物联网设备,与物联网设备进行配置,物联网设备对客户端进行验证,例如,客户端向物联网设备发送第一数字证书,该第一数字证书可以是物联网设备和客户端共同信任的第三方认证机构授予客户端的第一数字证书,由于物联网设备信任第三方认证机构,当接收到客户端发送的第一数字证书,可以确认客户端的身份,完成相互认证。For example, it can be specifically that the IoT device is in the network distribution state, the client can search for the IoT device, configure with the IoT device, and the IoT device verifies the client, for example, the client sends the first number to the IoT device Certificate, the first digital certificate can be the first digital certificate granted to the client by a third-party certification body trusted by both the IoT device and the client. Since the IoT device trusts the third-party certification body, when the first digital certificate sent by the client is received The certificate can confirm the identity of the client and complete mutual authentication.
又例如,客户端向物联网设备发送认证信息,认证信息可以是物联网设备的标识信息,例如pin码(Personalidentificationnumber,缩写为PIN),或者是密钥,物联网设备根据预设的认证信息对客户端发送的认证信息进行比较,若一致,则完成对客户端的认证,客户端与物联网设备建立联系。For another example, the client sends authentication information to the IoT device. The authentication information can be the identification information of the IoT device, such as a pin code (Personal identification number, PIN for short), or a key. The authentication information sent by the client is compared, and if they are consistent, the authentication of the client is completed, and the client establishes a connection with the IoT device.
物联网设备可以向客户端发送绑定所需要的信息,比如,需要客户端的身份标识,客户端在后续绑定过程中可以将第一授权认证信息中的第二云服务器为第一云服务器生成身份标识(ClientId@ OAuth2),作为自身的身份标识发送给物联网设备。The Internet of Things device can send the information required for binding to the client, for example, the identity of the client is required, and the client can use the second cloud server in the first authorization and authentication information as the first cloud server during the subsequent binding process. Identity (ClientId@ OAuth2), sent to the IoT device as its own identity.
可选的,客户端发现物联网设备,可以显示连接页面,该连接页面供用户进行确认操作以确认连接,客户端响应用户在连接页面的确认操作,与物联网设备进行配置。Optionally, when the client discovers the IoT device, it may display a connection page, which is for the user to perform a confirmation operation to confirm the connection, and the client responds to the user's confirmation operation on the connection page to configure with the IoT device.
其中,配网状态可以是物联网设备等待与客户端进行关联的状态。Wherein, the network distribution state may be a state in which the IoT device is waiting to be associated with the client.
其中,客户端和物联网设备进行配置的配网方式可以是广播包方式、组播地址方式、设备热点配网、蓝牙配网、手机热点配网、以及路由器配网等,不同的配网方式决定了物联网设备与关联的客户端的通信方式,例如,客户端与物联网设备通过路由器配网的方式进行配置,客户端和物联网之间通过局域网实现通信。Among them, the network distribution method for client and IoT device configuration can be broadcast packet method, multicast address method, device hotspot distribution network, Bluetooth distribution network, mobile phone hotspot distribution network, and router distribution network, etc. Different distribution network methods Determines the communication method between the IoT device and the associated client. For example, the client and the IoT device are configured through a router network configuration, and the communication between the client and the IoT is realized through a LAN.
302、客户端向第一云服务器的第一用户管理单元发送第一绑定请求。302. The client sends a first binding request to the first user management unit of the first cloud server.
比如,具体可以是客户端向第一云服务器的第一用户管理单元发起第一绑定请求。For example, specifically, the client may initiate a first binding request to the first user management unit of the first cloud server.
303、第一云服务器的第一用户管理单元响应客户端的第一绑定请求,向第二云服务器的第二用户管理单元发送身份验证请求。303. The first user management unit of the first cloud server sends an identity verification request to the second user management unit of the second cloud server in response to the first binding request of the client.
比如,具体可以是第一云服务器的第一用户管理单元接收到客户端发送的第一绑定请求后,向第二云服务器的第二用户管理单元发起身份验证请求,以与第二云服务器相互身份验证。For example, after receiving the first binding request sent by the client, the first user management unit of the first cloud server may initiate an identity verification request to the second user management unit of the second cloud server to communicate with the second cloud server Mutual authentication.
例如,第一云服务器的发送的身份验证请求可以携带第二数字证书,其中,第二数字证书可以是第一云服务器和第二云服务器共同信任的第三方认证机构,授予第一云服务器的数字证书。For example, the identity verification request sent by the first cloud server may carry a second digital certificate, wherein the second digital certificate may be a third-party certification authority trusted by both the first cloud server and the second cloud server, and granted to the first cloud server. digital certificate.
304、第二云服务器的第二用户管理单元对第一云服务器进行身份验证。304. The second user management unit of the second cloud server performs identity verification on the first cloud server.
比如,具体可以是第二云服务器的第二用户管理单元通过第一云服务器的第一用户管理单元发送的第二数字证书,对第一云服务器进行身份验证,若该第二数字证书为共同信任的第三方机构授予的,则对第一云服务器的验证通过。若该第二数字证书不是共同信任的第三方机构授予的,则对第一云服务器的验证不通过。For example, it may specifically be that the second user management unit of the second cloud server performs identity verification on the first cloud server through the second digital certificate sent by the first user management unit of the first cloud server. If it is granted by a trusted third-party organization, the verification of the first cloud server is passed. If the second digital certificate is not granted by a mutually trusted third-party organization, the verification of the first cloud server fails.
305、若验证通过,则第二云服务器的第二用户管理单元向第一云服务器的第一用户管理单元返回第一授权认证信息。305. If the verification passes, the second user management unit of the second cloud server returns the first authorization and authentication information to the first user management unit of the first cloud server.
若第二云服务器对第一云服务器验证通过,则向第一云服务器的第一用户管理单元返回第一授权认证信息,第一授权认证信息可以包括客户端和第二云服务器之间进行相互认证的协议、协议的版本号、提供相互认证的授权页面的相关信息等。例如,客户端与第二云服务器通过OAuth2.0进行相互认证,则第一云服务器接收到第二云服务器返回的第二云服务器为第一云服务器生成的身份标识、授权认证信息可以包括OAuth协议、以及版本2.0、授权页面的访问地址等。If the second cloud server passes the verification of the first cloud server, it will return the first authorization authentication information to the first user management unit of the first cloud server, and the first authorization authentication information may include the interaction between the client and the second cloud server. The authentication protocol, the version number of the protocol, the relevant information of the authorization page that provides mutual authentication, etc. For example, if the client and the second cloud server perform mutual authentication through OAuth2.0, then the first cloud server receives the identity and authorization information generated by the second cloud server for the first cloud server returned by the second cloud server. agreement, and version 2.0, the access address of the authorization page, etc.
若验证不通过,则第二云服务器不向第一云服务器返回授权认证信息,第二云服务器还可以向客户端发送身份认证不通过的提示信息。If the authentication fails, the second cloud server does not return authorization authentication information to the first cloud server, and the second cloud server may also send a prompt message that the identity authentication fails to pass to the client.
306、第一云服务器的第一用户管理单元将第一授权认证信息和回调地址信息发送至客户端。306. The first user management unit of the first cloud server sends the first authorization authentication information and callback address information to the client.
比如,具体可以是第一云服务器的第一用户管理单元获取第一云服务器的回调地址信息,将第一授权认证信息和回调地址信息发送给客户端。For example, it may specifically be that the first user management unit of the first cloud server acquires callback address information of the first cloud server, and sends the first authorization authentication information and callback address information to the client.
307、客户端根据第一授权认证信息访问授权页面。307. The client accesses the authorization page according to the first authorization authentication information.
比如,具体可以是客户端根据第一授权认证信息中的授权页面的访问地址(URL)访问授权页面,比如通过浏览器访问URL指向的授权页面,或者根据URL跳转至第二云服务器对应的app内的授权页面,或者根据URL跳转至第二云服务器对应的小程序内的授权页面。For example, it may specifically be that the client accesses the authorization page according to the access address (URL) of the authorization page in the first authorization authentication information, such as accessing the authorization page pointed to by the URL through a browser, or jumping to the corresponding URL of the second cloud server according to the URL. The authorization page in the app, or jump to the authorization page in the applet corresponding to the second cloud server according to the URL.
用户可以在授权页面输入账号密码,该账号密码可以是用户针对第二云服务器申请的账号和密码,用户通过输入账号和密码,表示授权登录在客户端的用户账号访问第一云服务器的指定信息。第二云服务器对账号和密码进行校验后,为登录在客户端的用户账号生成令牌信息。The user can enter the account password on the authorization page. The account password can be the account and password applied by the user for the second cloud server. By entering the account and password, the user indicates that the user account logged in at the client is authorized to access the specified information of the first cloud server. After verifying the account number and password, the second cloud server generates token information for the user account logged in at the client.
可选的,在将登录在客户端的用户账号(为了区分,以下称为第一用户账号)与物联网设备进行绑定之前,可以先将物联网设备与用户在第二云服务器注册的用户帐账号(该用户账号即用户在授权页面输入的账号,为了区别,以下称为第二用户账号)进行绑定,当登录在客户端的第一用户账号对物联网设备发送指令时,物联网设备可以将指令同步至第二云服务器中第二用户账号的对应的数据中,具体可以通过先将第二用户账号与物联网设备进行绑定,再第一用户账号和物联网设备进行绑定,可以实现即使物联网设备被不同的物联网系统的用户账号控制,第二云服务器也能获取该物联网设备被控制的信息,第二云服务器对应厂商的工作人员可以及时获取物联网设备的控制情况,及时阻止对物联网设备的攻击操作,提高物联网设备的安全性。Optionally, before binding the user account logged in on the client (for the sake of distinction, hereinafter referred to as the first user account) to the IoT device, the IoT device can first be bound to the user account registered by the user on the second cloud server. account (the user account is the account entered by the user on the authorization page, for the sake of distinction, hereinafter referred to as the second user account) for binding, when the first user account logged in on the client sends instructions to the IoT device, the IoT device can Synchronize the command to the corresponding data of the second user account in the second cloud server. Specifically, you can first bind the second user account with the IoT device, and then bind the first user account with the IoT device. Realize that even if the IoT device is controlled by a user account of a different IoT system, the second cloud server can obtain the information of the IoT device being controlled, and the staff of the manufacturer corresponding to the second cloud server can obtain the control status of the IoT device in time , Prevent attacks on IoT devices in time, and improve the security of IoT devices.
308、客户端响应用户基于针对授权页面的确认操作,生成信息获取请求。308. The client responds to the user's confirmation operation on the authorization page, and generates an information acquisition request.
比如,具体可以是用户在该授权页面内输入第二用户账号以及第二用户账号的密码后,对确认控件进行确定操作,例如点击确认控件,终端响应用户在授权页面上的确认操作,获取用户输入的第二用户账号和密码,向第二设备管理单元发送请求,第二设备管理单元对第二用户账号和密码进行验证通过后,响应该请求向客户端返回一个临时令牌,临时令牌可以是code,客户端接收到code后,基于code和回调地址信息从第二设备管理单元获取令牌信息,令牌信息可以是token,第二云服务器的第二用户管理单元根据临时令牌生成令牌信息,并基于回调地址信息所指示的地址,将令牌信息发送客户端。For example, after the user enters the second user account and the password of the second user account in the authorization page, the user performs a confirmation operation on the confirmation control, such as clicking the confirmation control, and the terminal responds to the user's confirmation operation on the authorization page to obtain the user's password. The input second user account and password send a request to the second device management unit, and the second device management unit returns a temporary token to the client in response to the request after the second device management unit has verified the second user account and password. It can be a code. After the client receives the code, it obtains the token information from the second device management unit based on the code and the callback address information. The token information can be a token, and the second user management unit of the second cloud server generates it based on the temporary token. Token information, and send the token information to the client based on the address indicated by the callback address information.
客户端基于令牌信息生成信息获取请求,信息获取请求携带令牌信息。The client generates an information acquisition request based on the token information, and the information acquisition request carries the token information.
309、客户端向第二设备管理单元发送信息获取请求。309. The client sends an information acquisition request to the second device management unit.
比如,具体可以是客户端携带令牌信息向第二设备管理单元发送信息获取请求。For example, it may specifically be that the client carries the token information and sends an information acquisition request to the second device management unit.
310、第二云服务器的第二设备管理单元响应信息获取请求,向客户端发送设备绑定信息。310. The second device management unit of the second cloud server sends device binding information to the client in response to the information acquisition request.
比如,具体可以是客户端基于令牌信息向第二云服务器的第二设备管理单元发起获取设备绑定信息的请求,即请求第二设备管理单元生成设备绑定信息。第二设备管理单元校验令牌信息是否合法,若合法,则生成设备绑定信息,并向客户端发送设备绑定信息。For example, specifically, the client may initiate a request to the second device management unit of the second cloud server to obtain device binding information based on the token information, that is, request the second device management unit to generate the device binding information. The second device management unit checks whether the token information is valid, and if it is valid, generates device binding information and sends the device binding information to the client.
311、客户端将设备绑定信息发送至物联网设备。311. The client sends device binding information to the IoT device.
比如,具体可以是客户端接收到设备绑定信息后,显示该设备绑定信息,并显示一用户界面,以供基于接收的设备绑定信息输入信息,客户端响应用户的输入操作,获取用户输入的信息,并将信息发送给物联网设备。For example, after receiving the device binding information, the client may display the device binding information and display a user interface for inputting information based on the received device binding information. Entered information, and send the information to the IoT device.
312、物联网设备将设备绑定信息发送至第二云服务器的第二设备管理单元。312. The IoT device sends device binding information to the second device management unit of the second cloud server.
比如,具体可以是物联网设备将客户端发送给的用户输入的信息发送至第二云服务器的第二设备管理单元。For example, it may specifically be that the IoT device sends the information input by the user sent by the client to the second device management unit of the second cloud server.
313、第二云服务器的第二设备管理单元对物联网设备进行绑定。313. The second device management unit of the second cloud server binds the IoT device.
比如,具体可以是第二设备管理单元根据物联网设备发送的用户输入的信息,和生成的设备绑定信息进行比较,若物联网设备发送的信息和生成的设备绑定信息一致,则第二云服务器将为登录在客户端的第一用户账号生成的令牌信息与物联网设备进行绑定。For example, it may specifically be that the second device management unit compares the information input by the user sent by the IoT device with the generated device binding information, and if the information sent by the IoT device is consistent with the generated device binding information, then the second The cloud server will bind the token information generated by the first user account logged in the client with the IoT device.
可选的,第二云服务器将令牌信息和物联网设备进行绑定之后,向客户端返回绑定成功的提示信息,客户端响应该提示信息,将登录在客户端的第一用户账号与令牌信息进行绑定,可以理解的是,登录在客户端的第一用户账号通过令牌信息作为中间桥梁实现与物联网设备进行绑定,通过绑定关系第一用户账号-令牌信息和令牌信息-物联网设备,实现第一用户账号与物联网设备的间接绑定。Optionally, after the second cloud server binds the token information with the IoT device, it returns a prompt message indicating that the binding is successful to the client. It is understandable that the first user account logged in to the client uses the token information as an intermediate bridge to realize the binding with the IoT device, and through the binding relationship between the first user account-token information and token Information-Internet of Things device, realizes the indirect binding of the first user account and the Internet of Things device.
可选的,为了提高安全性,可以对令牌信息设置有效期,当令牌信息失效时,用户可以通过上述方式再次对物联网设备进行绑定,第二云服务器和客户端会相应更新绑定关系。Optionally, in order to improve security, a valid period can be set for the token information. When the token information expires, the user can bind the IoT device again through the above method, and the second cloud server and the client will update the binding accordingly. relation.
可选的,可以在用户每次通过令牌信息访问第二云服务器或者控制物联网设备时,则更新令牌信息的有效期,例如,若用户连续48小时没有访问第二云服务器,则令牌信息失效,当用户在48小时内进行访问时,将有效期再次更新为48小时。Optionally, each time the user accesses the second cloud server or controls the IoT device through the token information, the validity period of the token information can be updated. For example, if the user does not access the second cloud server for 48 consecutive hours, the token The information expires, and when the user visits within 48 hours, the validity period will be updated to 48 hours again.
314、客户端响应用户的控制操作,生成控制指令。314. The client generates a control instruction in response to the user's control operation.
比如,具体可以是接收用户在客户端的显示页面内,执行针对物联网设备的控制操作,客户端响应用户的控制操作,生成携带与登录在客户端的用户账号对应的令牌信息的控制指令。例如,当物联网设备为空调时,可以在客户端的针对空调控制的显示页面内,接收用户输入的针对空调的温度、运行模式、以及风速等运行参数的调节操作,基于调节操作生成携带令牌信息的控制指令。又例如,当物联网设备为电视时,可以在客户端的针对电视控制的显示页面内,接收用户输入的针对电视的音量、节目切换、以及亮度等运行参数的调节操作,基于调节操作携带与登录在客户端的用户账号对应的令牌信息的生成控制指令。For example, it may specifically be that the user performs a control operation on the IoT device in the display page of the client, and the client responds to the user's control operation and generates a control command carrying token information corresponding to the user account logged in on the client. For example, when the IoT device is an air conditioner, the adjustment operation of the air conditioner's temperature, operation mode, and wind speed input by the user can be received in the display page of the client for air conditioner control, and the carrying token can be generated based on the adjustment operation. information control instructions. For another example, when the Internet of Things device is a TV, it can receive user-input adjustment operations for operating parameters such as volume, program switching, and brightness of the TV in the display page for TV control on the client, and carry and log in based on the adjustment operations. The generation control instruction of the token information corresponding to the user account of the client.
315、客户端将控制指令发送至第二云服务器的第二设备管理单元。315. The client sends the control instruction to the second device management unit of the second cloud server.
比如,具体可以是客户端将控制指令发送至第二云服务器的第二设备管理单元。For example, it may specifically be that the client sends the control instruction to the second device management unit of the second cloud server.
316、第二云服务器的第二设备管理单元将控制指令发送至物联网设备。316. The second device management unit of the second cloud server sends the control instruction to the IoT device.
比如,具体可以是第二设备管理单元根据控制指令中携带的令牌信息,以及令牌信息与物联网设备的绑定关系,确定控制指令所要控制的物联网设备,将控制指令发送给对应的物联网设备。For example, specifically, the second device management unit may determine the IoT device to be controlled by the control command according to the token information carried in the control command and the binding relationship between the token information and the IoT device, and send the control command to the corresponding IoT devices.
317、物联网设备根据接收到的控制指令执行相应的操作。317. The IoT device performs a corresponding operation according to the received control instruction.
比如,具体可以是物联网设备根据接收到的控制指令执行相应的操作。For example, it may specifically be that the IoT device executes corresponding operations according to the received control instructions.
例如,当物联网设备为空调时,空调可以根据接收到的温度调节指令(即控制指令),对温度进行调节。又例如,当物联网设备为电视时,电视可以根据接收到的音量调节指令(即控制指令),对音量进行调节。For example, when the IoT device is an air conditioner, the air conditioner may adjust the temperature according to the received temperature adjustment instruction (ie, control instruction). For another example, when the Internet of Things device is a TV, the TV can adjust the volume according to the received volume adjustment command (that is, the control command).
由上可知,本申请实施例中,客户端与物联网设备建立连接,客户端可以向第一云服务器的第一用户管理单元发送绑定请求,第一云服务器的第一用户管理单元响应客户端的第一绑定请求,向第二云服务器的第二用户管理单元发起身份验证请求,第二云服务器的第二用户管理单元对第一云服务器进行身份验证,若验证通过,则第二云服务器的第二用户管理单元向第一云服务器的第一用户管理单元返回第一授权认证信息,第一云服务器的第一用户管理单元将第一授权认证信息和回调地址信息发送至客户端,客户端根据第一授权认证信息访问授权页面,客户端基于针对授权页面的确认操作,客户端向第二设备管理单元发送信息获取请求,第二云服务器的第二设备管理单元响应信息获取请求,向客户端发送设备绑定信息,客户端将设备绑定信息发送至物联网设备 物联网设备将设备绑定信息发送至第二云服务器的第二设备管理单元,第二云服务器的第二设备管理单元对物联网设备进行绑定,客户端响应用户的控制操作,生成控制指令,客户端将控制指令发送至第一云服务器的第一设备管理单元,第一云服务器的第一设备管理单元将控制指令发送至第二云服务器的第二设备管理单元,第二云服务器的第二设备管理单元将控制指令发送至物联网设备,物联网设备根据接收到的控制指令执行相应的操作。该方案可以实现第一云服务器和第二云服务器之间不需要交互用户信息,以及不需要通过商务合同进行保障的前提下,将对物联网设备进行绑定,不仅保证了用户隐私的安全性,而且提高了物联网设备绑定的效率,以及提高了数据交互的安全性。 As can be seen from the above, in the embodiment of this application, the client establishes a connection with the IoT device, the client can send a binding request to the first user management unit of the first cloud server, and the first user management unit of the first cloud server responds to the client The first binding request of the terminal sends an identity verification request to the second user management unit of the second cloud server, and the second user management unit of the second cloud server performs identity verification on the first cloud server. If the verification is passed, the second cloud The second user management unit of the server returns the first authorization authentication information to the first user management unit of the first cloud server, and the first user management unit of the first cloud server sends the first authorization authentication information and callback address information to the client, The client accesses the authorization page according to the first authorization authentication information, and based on the confirmation operation for the authorization page, the client sends an information acquisition request to the second device management unit, and the second device management unit of the second cloud server responds to the information acquisition request, Send the device binding information to the client, the client sends the device binding information to the IoT device , the IoT device sends the device binding information to the second device management unit of the second cloud server, and the second The device management unit binds the IoT device, the client responds to the user's control operation and generates a control command, and the client sends the control command to the first device management unit of the first cloud server, and the first device management unit of the first cloud server The unit sends the control command to the second device management unit of the second cloud server, and the second device management unit of the second cloud server sends the control command to the IoT device, and the IoT device performs corresponding operations according to the received control command. This solution can realize that the first cloud server and the second cloud server do not need to exchange user information, and under the premise of not needing to guarantee through business contracts, IoT devices will be bound, which not only ensures the security of user privacy , and improve the efficiency of IoT device binding, and improve the security of data interaction.
为了便于更好地实施本申请实施例提供的物联网设备绑定方法,在一实施例中还提供了一种物联网设备绑定装置。其中名词的含义与上述物联网设备绑定方法中相同,具体实现细节可以参考方法实施例中的说明。In order to facilitate better implementation of the IoT device binding method provided in the embodiment of the present application, an IoT device binding device is also provided in an embodiment. The meanings of the nouns are the same as those in the above IoT device binding method, and for specific implementation details, please refer to the description in the method embodiments.
该物联网设备绑定装置具体可以集成在云服务器中,该云服务器可以是第一云服务器,如图5所示,该物联网设备绑定装置可以包括:第一接收模块401、响应模块402、第二接收模块403和第一绑定模块404等,具体可以如下:The IoT device binding device may specifically be integrated in a cloud server, and the cloud server may be a first cloud server. As shown in FIG. 5 , the IoT device binding device may include: a first receiving module 401, a response module 402 , the second receiving module 403 and the first binding module 404, etc., specifically as follows:
第一接收模块401:用于接收客户端发起的针对物联网设备的第一绑定请求,客户端登录有用户账号。The first receiving module 401: for receiving the first binding request for the IoT device initiated by the client, where the client is logged in with a user account.
响应模块402:用于响应于第一绑定请求,指示与物联网设备匹配的第二云服务器,对与客户端匹配的第一云服务器进行身份验证。Response module 402: for responding to the first binding request, indicating the second cloud server matching the IoT device, and performing identity verification on the first cloud server matching the client.
可选的,响应模块402可以包括发送子模块和指示子模块,具体地:Optionally, the response module 402 may include a sending submodule and an indication submodule, specifically:
发送子模块:用于响应于第一绑定请求,向第二云服务器发送验证请求,验证请求携带与客户端匹配的第一云服务器的验证信息。Sending sub-module: used to send a verification request to the second cloud server in response to the first binding request, where the verification request carries verification information of the first cloud server that matches the client.
指示子模块:用于根据验证请求指示第二云服务器,基于验证信息对第一云服务器进行身份验证。Instructing submodule: used to instruct the second cloud server according to the verification request, and perform identity verification on the first cloud server based on the verification information.
第二接收模块403:用于接收第二云服务器返回的第一授权认证信息,第一授权认证信息为第二云服务器对第一云服务器的身份验证通过后发送的。The second receiving module 403 is used to receive the first authorization and authentication information returned by the second cloud server. The first authorization and authentication information is sent after the identity verification of the first cloud server by the second cloud server is passed.
第一绑定模块404:用于根据第一授权认证信息向客户端发送第二授权认证信息,以使得客户端基于第二授权认证信息向第二云服务器发送第二绑定请求,第二绑定请求用于指示第二云服务器为用户账号生成令牌信息,并基于令牌信息对物联网设备进行绑定。The first binding module 404: used to send the second authorization and authentication information to the client according to the first authorization and authentication information, so that the client sends a second binding request to the second cloud server based on the second authorization and authentication information, and the second binding The predetermined request is used to instruct the second cloud server to generate token information for the user account, and to bind the IoT device based on the token information.
可选的,第一绑定模块404可以包括获取子模块和发送子模块,具体地:Optionally, the first binding module 404 may include an acquisition submodule and a sending submodule, specifically:
获取子模块:用于获取回调地址信息。Obtaining submodules: used to obtain callback address information.
生成模块:用于基于第一授权认证信息生成第二授权认证信息;A generating module: used to generate second authorization and authentication information based on the first authorization and authentication information;
信息生成模块:用于基于第一授权认证信息和回调地址信息生成第二授权认证信息;An information generating module: used to generate second authorization and authentication information based on the first authorization and authentication information and callback address information;
发送子模块:用于将第二授权认证信息发送给客户端,回调地址信息用于指示第二云服务器返回令牌信息。Sending sub-module: used to send the second authorization and authentication information to the client, and the callback address information is used to instruct the second cloud server to return the token information.
可选的,物联网设备绑定装置可以包括第四接收模块和第二发送模块,具体地:Optionally, the IoT device binding device may include a fourth receiving module and a second sending module, specifically:
第四接收模块:用于通过第一设备管理单元,接收客户端发送的控制指令。The fourth receiving module: used for receiving the control instruction sent by the client through the first device management unit.
第二接收模块:用于通过第一设备管理单元,将控制指令通过第二设备管理单元发送给物联网设备,以基于控制指令对物联网设备进行控制。The second receiving module: used for sending the control command to the IoT device through the second device management unit through the first device management unit, so as to control the IoT device based on the control command.
可选的,物联网设备绑定装置可以包括第五接收模块和第三发送模块,具体地:Optionally, the IoT device binding device may include a fifth receiving module and a third sending module, specifically:
第五接收模块:用于通过第一设备管理单元,接收客户端发送的控制指令。The fifth receiving module: used for receiving the control instruction sent by the client through the first device management unit.
第三接收模块:用于通过第一设备管理单元,将控制指令发送给物联网设备,以基于控制指令对物联网设备进行控制。The third receiving module: used for sending the control command to the IoT device through the first device management unit, so as to control the IoT device based on the control command.
由上可知,本申请实施例通过第一接收模块401接收客户端发起的针对物联网设备的第一绑定请求,客户端登录有用户账号;通过响应模块402响应于第一绑定请求,指示与物联网设备匹配的第二云服务器,对与客户端匹配的第一云服务器进行身份验证;第二接收模块403接收第二云服务器返回的第一授权认证信息;通过第一绑定模块404基于第一授权认证信息,向客户端发送第二授权认证信息,以使客户端基于第二授权认证信息向第二云服务器发送第二绑定请求,第二绑定请求用于指示第二云服务器为用户账号生成令牌信息,并基于令牌对物联网设备进行绑定,该方案可以实现第一云服务器和第二云服务器之间不需要交互用户信息,以及不需要通过商务合同进行保障的前提下,将对物联网设备进行绑定,提高了物联网设备绑定的效率。As can be seen from the above, the embodiment of the present application receives the first binding request for the Internet of Things device initiated by the client through the first receiving module 401, and the client has logged in with a user account; responds to the first binding request through the response module 402, indicating The second cloud server matching the IoT device performs identity verification on the first cloud server matching the client; the second receiving module 403 receives the first authorization authentication information returned by the second cloud server; through the first binding module 404 Based on the first authorization and authentication information, send second authorization and authentication information to the client, so that the client sends a second binding request to the second cloud server based on the second authorization and authentication information, and the second binding request is used to indicate that the second cloud The server generates token information for the user account, and binds the IoT device based on the token. This solution can realize that there is no need to exchange user information between the first cloud server and the second cloud server, and there is no need to guarantee through business contracts Under the premise, the IoT devices will be bound, improving the efficiency of IoT device binding.
为了便于更好地实施本申请施例提供的物联网设备绑定方法,在一实施例中还提供了一种物联网设备绑定装置。其中名词的含义与上述物联网设备绑定方法中相同,具体实现细节可以参考方法实施例中的说明。In order to facilitate better implementation of the IoT device binding method provided in the embodiment of the present application, an IoT device binding device is also provided in an embodiment. The meanings of the nouns are the same as those in the above IoT device binding method, and for specific implementation details, please refer to the description in the method embodiments.
该物联网设备绑定装置具体可以集成在云服务器中,该云服务器可以是第二云服务器,如图6所示,该物联网设备绑定装置可以包括:第三接收模块501、验证模块502、发送模块503和第二绑定模块504等,具体可以如下:The IoT device binding device can specifically be integrated in a cloud server, and the cloud server can be a second cloud server. As shown in FIG. 6 , the IoT device binding device can include: a third receiving module 501, a verification module 502 , the sending module 503 and the second binding module 504, etc., the details may be as follows:
第三接收模块501:用于接收第一云服务器发送的验证请求,验证请求为第一云服务器响应客户端发起的针对物联网设备的第一绑定请求发送的,客户端登录有用户账号。The third receiving module 501: used to receive the verification request sent by the first cloud server, the verification request is sent by the first cloud server in response to the first binding request for the IoT device initiated by the client, and the client has a user account logged in.
验证模块502:用于基于验证请求对第一云服务器进行身份验证。Verification module 502: configured to perform identity verification on the first cloud server based on the verification request.
可选的,验证模块502可以包括发送子模块和验证子模块,具体地:Optionally, the verification module 502 may include a sending submodule and a verification submodule, specifically:
发送子模块:用于接收第一云服务器基于响应客户端的第一绑定请求发送的验证请求,验证请求携带第一云服务器的验证信息。Sending sub-module: used to receive a verification request sent by the first cloud server based on the response to the first binding request of the client, where the verification request carries verification information of the first cloud server.
验证子模块:用于基于验证信息对第一云服务器进行身份验证。Verification sub-module: used for authenticating the first cloud server based on the verification information.
发送模块503:用于若身份验证通过,则向第一云服务器发送第一授权认证信息,以使得第一云服务器将基于第一授权认证信息向发送给客户端发送第二授权认证信息。Sending module 503: configured to send first authorization and authentication information to the first cloud server if identity verification is passed, so that the first cloud server will send second authorization and authentication information to the sending client based on the first authorization and authentication information.
第二绑定模块504:用于响应于客户端基于第二授权认证信息发送的请求,为用户账号生成令牌信息,并基于令牌信息对物联网设备进行绑定。The second binding module 504 is configured to generate token information for the user account in response to the request sent by the client based on the second authorization and authentication information, and bind the IoT device based on the token information.
可选的,第二绑定模块504可以包括接收子模块和生成子模块,具体地:Optionally, the second binding module 504 may include a receiving submodule and a generating submodule, specifically:
接收子模块:用于接收客户端基于第一云服务器发送的第二授权认证信息,反馈的同意绑定信息。The receiving sub-module is used to receive the consent binding information fed back by the client based on the second authorization and authentication information sent by the first cloud server.
生成子模块:用于基于同意绑定信息,针对用户账号生成令牌信息,并将令牌信息发送给客户端,以使客户端基于令牌信息将用户账户与物联网设备进行绑定;Generation sub-module: used to generate token information for the user account based on the consent binding information, and send the token information to the client, so that the client can bind the user account with the IoT device based on the token information;
基于令牌信息对物联网设备进行绑定。Bind IoT devices based on token information.
可选的,生成子模块具体用于:响应客户端携带令牌信息发送的信息获取请求,生成设备绑定信息,并将设备绑定信息发送给客户端;Optionally, the generation sub-module is specifically used to: respond to the information acquisition request sent by the client carrying the token information, generate device binding information, and send the device binding information to the client;
若客户端返回的信息与设备绑定信息相匹配,则基于令牌信息对物联网设备进行绑定。If the information returned by the client matches the device binding information, the IoT device is bound based on the token information.
可选的,生成子模块具体用于:Optionally, generate submodules specifically for:
获取第一云服务器的回调地址信息。Get the callback address information of the first cloud server.
基于回调地址信息,向第一云服务器发送令牌信息,以使得第一云服务器将令牌信息发送给客户端。Based on the callback address information, the token information is sent to the first cloud server, so that the first cloud server sends the token information to the client.
可选的,物联网设备绑定装置可以包括第六接收模块和控制模块,具体地:Optionally, the IoT device binding device may include a sixth receiving module and a control module, specifically:
第六接收模块:用于接收第一设备管理单元发送的控制指令。The sixth receiving module: used for receiving the control instruction sent by the first device management unit.
控制模块:用于通过基于控制指令对物联网设备进行控制。Control module: used to control IoT devices based on control commands.
由上可知,本申请实施例通过第三接收模块501接收第一云服务器发送的验证请求;通过验证模块502基于验证请求对第一云服务器进行身份验证;若身份验证通过,则由发送模块503向第一云服务器发送第一授权认证信息,以使得第一云服务器基于第一授权认证信息向客户端发送第二授权认证信息;通过第二绑定模块504响应于客户端基于第二授权认证信息发送的第二绑定请求,为用户账号生成令牌信息,并基于令牌信息对物联网设备进行绑定。该方案可以实现第一云服务器和第二云服务器之间不需要交互用户信息,以及不需要通过商务合同进行保障的前提下,将对物联网设备进行绑定,提高了物联网设备绑定的效率。As can be seen from the above, the embodiment of the present application receives the verification request sent by the first cloud server through the third receiving module 501; through the verification module 502, the first cloud server is authenticated based on the verification request; if the identity verification passes, the sending module 503 Send the first authorization authentication information to the first cloud server, so that the first cloud server sends the second authorization authentication information to the client based on the first authorization authentication information; through the second binding module 504, respond to the client based on the second authorization authentication The second binding request sent by the information generates token information for the user account, and binds the IoT device based on the token information. This solution can realize the binding of IoT devices on the premise that the first cloud server and the second cloud server do not need to exchange user information and do not need to be guaranteed by business contracts, which improves the binding efficiency of IoT devices. efficiency.
本申请实施例还提供一种云服务器,该云服务器可以是第一云服务器或第二云服务器等,如图7所示,其示出了本申请实施例所涉及的云服务器的结构示意图,具体来讲:The embodiment of the present application also provides a cloud server, which can be a first cloud server or a second cloud server, etc., as shown in FIG. 7 , which shows a schematic structural diagram of the cloud server involved in the embodiment of the present application. Specifically:
该云服务器可以包括一个或者一个以上处理核心的处理器1001、一个或一个以上计算机可读存储介质(也可以称为存储介质)的存储器1002、电源1003和输入单元1004等部件。本领域技术人员可以理解,图7中示出的云服务器结构并不构成对云服务器的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。其中:The cloud server may include a processor 1001 of one or more processing cores, a memory 1002 of one or more computer-readable storage media (also referred to as storage media), a power supply 1003, an input unit 1004 and other components. Those skilled in the art can understand that the cloud server structure shown in FIG. 7 does not constitute a limitation to the cloud server, and may include more or less components than those shown in the figure, or combine some components, or arrange different components. in:
处理器1001是该云服务器的控制中心,利用各种接口和线路连接整个云服务器的各个部分,通过运行或执行存储在存储器1002内的软件程序和/或模块,以及调用存储在存储器1002内的数据,执行云服务器的各种功能和处理数据,从而对云服务器进行整体监控。可选的,处理器1001可包括一个或多个处理核心;优选的,处理器1001可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和计算机程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器1001中。The processor 1001 is the control center of the cloud server. It uses various interfaces and lines to connect various parts of the entire cloud server, and runs or executes software programs and/or modules stored in the memory 1002, and calls stored in the memory 1002. Data, perform various functions of the cloud server and process data, so as to monitor the cloud server as a whole. Optionally, the processor 1001 may include one or more processing cores; preferably, the processor 1001 may integrate an application processor and a modem processor, wherein the application processor mainly processes operating systems, user interfaces, and computer programs, etc. , the modem processor mainly handles wireless communications. It can be understood that the foregoing modem processor may not be integrated into the processor 1001 .
存储器1002可用于存储软件程序以及模块,处理器1001通过运行存储在存储器1002的软件程序以及模块,从而执行各种功能应用以及数据处理。存储器1002可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的计算机程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据云服务器的使用所创建的数据等。此外,存储器1002可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。相应地,存储器1002还可以包括存储器控制器,以提供处理器1001对存储器1002的访问。The memory 1002 can be used to store software programs and modules, and the processor 1001 executes various functional applications and data processing by running the software programs and modules stored in the memory 1002 . The memory 1002 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, a computer program required by at least one function (such as a sound playback function, an image playback function, etc.); Data, etc. created by the use of cloud servers. In addition, the memory 1002 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage devices. Correspondingly, the memory 1002 may further include a memory controller to provide the processor 1001 with access to the memory 1002 .
云服务器还包括给各个部件供电的电源1003,优选的,电源1003可以通过电源管理系统与处理器1001逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。电源1003还可以包括一个或一个以上的直流或交流电源、再充电系统、电源故障检测电路、电源转换器或者逆变器、电源状态指示器等任意组件。The cloud server also includes a power supply 1003 for supplying power to various components. Preferably, the power supply 1003 can be logically connected to the processor 1001 through the power management system, so that functions such as charging, discharging, and power consumption management can be realized through the power management system. The power supply 1003 may also include one or more DC or AC power supplies, recharging systems, power failure detection circuits, power converters or inverters, power status indicators and other arbitrary components.
该云服务器还可包括输入单元1004,该输入单元1004可用于接收输入的数字或字符信息,以及产生与用户设置以及功能控制有关的键盘、鼠标、操作杆、光学或者轨迹球信号输入。The cloud server can also include an input unit 1004, which can be used to receive input numbers or character information, and generate keyboard, mouse, joystick, optical or trackball signal input related to user settings and function control.
尽管未示出,云服务器还可以包括显示单元等,在此不再赘述。具体在本实施例中,云服务器中的处理器1001会按照如下的指令,将一个或一个以上的计算机程序的进程对应的可执行文件加载到存储器1002中,并由处理器1001来运行存储在存储器1002中的计算机程序,从而实现各种功能,如下:Although not shown, the cloud server may also include a display unit, etc., which will not be repeated here. Specifically, in this embodiment, the processor 1001 in the cloud server will load one or more executable files corresponding to the process of the computer program into the memory 1002 according to the following instructions, and the processor 1001 will run the executable file stored in the The computer program in memory 1002, thereby realizes various functions, as follows:
当云服务器为第一云服务器时,可以接收客户端发起的针对物联网设备的第一绑定请求;响应于第一绑定请求,指示与物联网设备匹配的第二云服务器,对与客户端匹配的第一云服务器进行身份验证;接收第二云服务器返回的第一授权认证信息,第一授权认证信息为第二云服务器对第一云服务器的身份验证通过后发送的;根据第一授权认证信息向客户端发送第二授权认证信息,以使得客户端基于第二授权认证信息向第二云服务器发送第二绑定请求,第二绑定请求用于指示第二云服务器为用户账号生成令牌信息,并基于令牌信息对物联网设备进行绑定。When the cloud server is the first cloud server, it can receive the first binding request for the Internet of Things device initiated by the client; in response to the first binding request, indicate the second cloud server that matches the Internet of Things device; The first cloud server matched with the terminal performs identity verification; receives the first authorization authentication information returned by the second cloud server, and the first authorization authentication information is sent after the second cloud server passes the identity verification of the first cloud server; according to the first The authorization authentication information sends second authorization authentication information to the client, so that the client sends a second binding request to the second cloud server based on the second authorization authentication information, and the second binding request is used to indicate that the second cloud server is a user account Generate token information and bind IoT devices based on the token information.
以及,当云服务器为第二云服务器时,可以接收第一云服务器发送的验证请求,验证请求为第一云服务器响应客户端发起的针对物联网设备的第一绑定请求发送的,客户端登录有用户账号;基于验证请求对第一云服务器进行身份验证;若身份验证通过,则向第一云服务器发送第一授权认证信息,以使得第一云服务器将基于第一授权认证信息向客户端发送第二授权认证信息;响应于客户端基于第二授权认证信息发送的第二绑定请求,为用户账号生成令牌信息,并基于令牌信息对物联网设备进行绑定。And, when the cloud server is the second cloud server, it can receive the verification request sent by the first cloud server, the verification request is sent by the first cloud server in response to the first binding request for the IoT device initiated by the client, and the client Log in with a user account; based on the verification request, the first cloud server is authenticated; if the identity verification is passed, then the first authorization authentication information is sent to the first cloud server, so that the first cloud server will send the client based on the first authorization authentication information The terminal sends the second authorization and authentication information; in response to the second binding request sent by the client based on the second authorization and authentication information, generates token information for the user account, and binds the IoT device based on the token information.
根据本申请的一个方面,提供了一种计算机程序产品或计算机程序,该计算机程序产品或计算机程序包括计算机指令,该计算机指令存储在计算机可读存储介质中。云服务器的处理器从计算机可读存储介质读取该计算机指令,处理器执行该计算机指令,使得该云服务器执行上述实施例中各种可选实现方式中提供的方法。According to an aspect of the present application there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the cloud server reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the cloud server executes the methods provided in various optional implementation manners in the foregoing embodiments.
本领域普通技术人员可以理解,上述实施例的各种方法中的全部或部分步骤可以通过计算机程序来完成,或通过计算机程序控制相关的硬件来完成,该计算机程序可以存储于一计算机可读存储介质中,并由处理器进行加载和执行。Those of ordinary skill in the art can understand that all or part of the steps in the various methods of the above-mentioned embodiments can be completed by a computer program, or by controlling related hardware through a computer program, and the computer program can be stored in a computer-readable storage media and is loaded and executed by the processor.
为此,本申请实施例提供一种存储介质,其中存储有计算机程序,该计算机程序,能够被处理器进行加载,以执行本申请实施例所提供的任一种物联网设备绑定方法。To this end, an embodiment of the present application provides a storage medium, in which a computer program is stored, and the computer program can be loaded by a processor to execute any IoT device binding method provided in the embodiment of the present application.
以上各个操作的具体实施可参见前面的实施例,在此不再赘述。For the specific implementation of the above operations, reference may be made to the foregoing embodiments, and details are not repeated here.
其中,该存储介质可以包括:只读存储器(ROM,ReadOnlyMemory)、随机存取记忆体(RAM,RandomAccessMemory)、磁盘或光盘等。Wherein, the storage medium may include: a read only memory (ROM, ReadOnlyMemory), a random access memory (RAM, RandomAccessMemory), a magnetic disk or an optical disk, and the like.
由于该存储介质中所存储的计算机程序,可以执行本申请实施例所提供的任一种物联网设备绑定方法中的步骤,因此,可以实现本申请实施例所提供的任一种物联网设备绑定方法所能实现的有益效果,详见前面的实施例,在此不再赘述。Since the computer program stored in the storage medium can execute the steps in any IoT device binding method provided in the embodiments of the present application, therefore, any IoT device provided in the embodiments of the present application can be realized For the beneficial effects that can be achieved by the binding method, refer to the previous embodiments for details, and will not be repeated here.
以上对本申请实施例所提供的一种物联网设备绑定方法、装置、系统、云服务器和存储介质进行了详细介绍,本文中应用了具体个例对本申请的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本申请的方法及其核心思想;同时,对于本领域的技术人员,依据本申请的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本申请的限制。The above is a detailed introduction to the IoT device binding method, device, system, cloud server and storage medium provided by the embodiment of the present application. In this paper, specific examples are used to illustrate the principle and implementation of the present application. The above The description of the embodiments is only used to help understand the method of the present application and its core idea; meanwhile, for those skilled in the art, according to the thought of the application, there will be changes in the specific implementation and scope of application. In summary As stated above, the content of this specification should not be construed as limiting the application.

Claims (20)

  1. 一种物联网设备绑定方法,其中,包括:A method for binding an Internet of Things device, including:
    接收客户端发起的针对物联网设备的第一绑定请求,所述客户端登录有用户账号;receiving a first binding request for an IoT device initiated by a client, the client logging in with a user account;
    响应于所述第一绑定请求,指示与所述物联网设备匹配的第二云服务器,对与所述客户端匹配的第一云服务器进行身份验证;Responding to the first binding request, indicating a second cloud server matching the IoT device, and performing identity verification on the first cloud server matching the client;
    接收所述第二云服务器返回的第一授权认证信息,所述第一授权认证信息为所述第二云服务器对所述第一云服务器的身份验证通过后发送的;receiving the first authorization authentication information returned by the second cloud server, where the first authorization authentication information is sent after the identity verification of the first cloud server by the second cloud server;
    根据所述第一授权认证信息向所述客户端发送第二授权认证信息,以使得所述客户端基于所述第二授权认证信息向第二云服务器发送第二绑定请求,所述第二绑定请求用于指示所述第二云服务器为所述用户账号生成令牌信息,并基于所述令牌信息对所述物联网设备进行绑定。Send second authorization and authentication information to the client according to the first authorization and authentication information, so that the client sends a second binding request to the second cloud server based on the second authorization and authentication information, and the second The binding request is used to instruct the second cloud server to generate token information for the user account, and bind the IoT device based on the token information.
  2. 根据权利要求1所述的物联网设备绑定方法,其中,所述响应于所述第一绑定请求,指示与所述物联网设备匹配的第二云服务器,对与所述客户端匹配的第一云服务器进行身份验证,包括:The IoT device binding method according to claim 1, wherein, in response to the first binding request, indicating a second cloud server that matches the IoT device, and for a second cloud server that matches the client The first cloud server performs identity verification, including:
    响应于所述第一绑定请求,向所述第二云服务器发送验证请求,所述验证请求携带与所述客户端匹配的第一云服务器的验证信息;In response to the first binding request, send a verification request to the second cloud server, where the verification request carries verification information of the first cloud server that matches the client;
    根据所述验证请求指示所述第二云服务器,基于所述验证信息对所述第一云服务器进行身份验证。Instructing the second cloud server according to the verification request to perform identity verification on the first cloud server based on the verification information.
  3. 根据权利要求1所述的物联网设备绑定方法,其中,所述根据所述第一授权认证信息向所述客户端发送第二授权认证信息,包括:The IoT device binding method according to claim 1, wherein the sending the second authorization authentication information to the client according to the first authorization authentication information comprises:
    获取回调地址信息;Obtain callback address information;
    基于所述第一授权认证信息和所述回调地址信息生成所述第二授权认证信息;generating the second authorization and authentication information based on the first authorization and authentication information and the callback address information;
    将所述第二授权认证信息发送给所述客户端,所述回调地址信息用于指示所述第二云服务器向所述客户端返回令牌信息。Send the second authorization and authentication information to the client, and the callback address information is used to instruct the second cloud server to return token information to the client.
  4. 根据权利要求1所述的物联网设备绑定方法,其中,所述第一云服务器包括第一设备管理单元,所述第二云服务器包括第二设备管理单元,所述方法还包括:The IoT device binding method according to claim 1, wherein the first cloud server includes a first device management unit, the second cloud server includes a second device management unit, and the method further includes:
    通过所述第一设备管理单元,接收所述客户端发送的控制指令;receiving a control instruction sent by the client through the first device management unit;
    通过所述第一设备管理单元,将所述控制指令通过所述第二设备管理单元发送给所述物联网设备,以基于所述控制指令对所述物联网设备进行控制。The first device management unit sends the control instruction to the Internet of Things device through the second device management unit, so as to control the Internet of Things device based on the control instruction.
  5. 根据权利要求1所述的物联网设备绑定方法,其中,所述第一云服务器包括第一设备管理单元,所述方法还包括:The IoT device binding method according to claim 1, wherein the first cloud server includes a first device management unit, and the method further includes:
    通过所述第一设备管理单元,接收所述客户端发送的控制指令;receiving a control instruction sent by the client through the first device management unit;
    通过所述第一设备管理单元,将所述控制指令发送给所述物联网设备,以基于所述控制指令对所述物联网设备进行控制。The first device management unit sends the control instruction to the Internet of Things device, so as to control the Internet of Things device based on the control instruction.
  6. 根据权利要求1所述的物联网设备绑定方法,其中,所述第一授权认证信息包括所述客户端与所述第二云服务器进行相互认证所需的信息,所述相互认证所需的信息包括协议信息,协议版本信息,以及基于协议进行认证的授权页面的信息。The IoT device binding method according to claim 1, wherein the first authorization and authentication information includes information required for mutual authentication between the client and the second cloud server, and information required for the mutual authentication The information includes protocol information, protocol version information, and information about the authorization page for authentication based on the protocol.
  7. 一种物联网设备绑定方法,其中,包括:A method for binding an Internet of Things device, including:
    接收第一云服务器发送的验证请求,所述验证请求为所述第一云服务器响应客户端发起的针对物联网设备的第一绑定请求发送的,所述客户端登录有用户账号;Receive a verification request sent by the first cloud server, where the verification request is sent by the first cloud server in response to the first binding request for the IoT device initiated by the client, and the client has a user account logged in;
    基于所述验证请求对所述第一云服务器进行身份验证;performing identity verification on the first cloud server based on the verification request;
    若身份验证通过,则向所述第一云服务器发送第一授权认证信息,以使得所述第一云服务器将基于所述第一授权认证信息向所述客户端发送第二授权认证信息;If the identity verification is passed, sending first authorization authentication information to the first cloud server, so that the first cloud server will send second authorization authentication information to the client based on the first authorization authentication information;
    响应于所述客户端基于所述第二授权认证信息发送的第二绑定请求,为所述用户账号生成令牌信息,并基于所述令牌信息对所述物联网设备进行绑定。In response to the second binding request sent by the client based on the second authorization and authentication information, generate token information for the user account, and bind the IoT device based on the token information.
  8. 根据权利要求7所述的物联网设备绑定方法,其中,所述接收第一云服务器发送的验证请求,基于所述验证请求对所述第一云服务器进行身份验证,包括:The IoT device binding method according to claim 7, wherein said receiving the verification request sent by the first cloud server, and performing identity verification on the first cloud server based on the verification request comprises:
    接收第一云服务器基于响应所述客户端发起的针对所述物联网设备的第一绑定请求发送的验证请求,所述验证请求携带所述第一云服务器的验证信息;receiving a verification request sent by the first cloud server in response to the first binding request for the IoT device initiated by the client, where the verification request carries verification information of the first cloud server;
    基于所述验证信息对所述第一云服务器进行身份验证。Perform identity verification on the first cloud server based on the verification information.
  9. 根据权利要求7所述的物联网设备绑定方法,其中,所述响应于所述客户端基于所述第二授权认证信息发送的第二绑定请求,为所述用户账号生成令牌信息,并基于所述令牌信息对所述物联网设备进行绑定,包括:The IoT device binding method according to claim 7, wherein in response to the second binding request sent by the client based on the second authorization and authentication information, generating token information for the user account, And bind the IoT device based on the token information, including:
    接收所述客户端基于所述第一云服务器发送的第二授权认证信息,反馈的同意绑定信息;receiving the consent binding information fed back by the client based on the second authorization and authentication information sent by the first cloud server;
    基于所述同意绑定信息,针对所述用户账号生成令牌信息,并将所述令牌信息发送给所述客户端,以使所述客户端基于所述令牌信息将所述用户账户与所述物联网设备进行绑定;Based on the consent binding information, generate token information for the user account, and send the token information to the client, so that the client associates the user account with the token information based on the token information The IoT device is bound;
    基于所述令牌信息对所述物联网设备进行绑定。Binding the IoT device based on the token information.
  10. 根据权利要求9所述的物联网设备绑定方法,其中,所述基于所述令牌信息对所述物联网设备进行绑定,包括:The IoT device binding method according to claim 9, wherein said binding said IoT device based on said token information comprises:
    响应所述客户端携带所述令牌信息发送的信息获取请求,生成设备绑定信息,并将所述设备绑定信息发送给所述客户端;Responding to the information acquisition request sent by the client carrying the token information, generating device binding information, and sending the device binding information to the client;
    若所述客户端返回的信息与所述设备绑定信息相匹配,则基于所述令牌信息对所述物联网设备进行绑定。If the information returned by the client matches the device binding information, the IoT device is bound based on the token information.
  11. 根据权利要求10所述的物联网设备绑定方法,其中,所述响应所述客户端携带所述令牌信息发送的信息获取请求,生成设备绑定信息,包括:The IoT device binding method according to claim 10, wherein said generating device binding information in response to the information acquisition request sent by the client carrying the token information includes:
    根据接收到的信息获取请求所携带的令牌信息,验证发送所述信息获取请求的对象的身份;Verifying the identity of the object sending the information acquisition request according to the token information carried in the received information acquisition request;
    若验证通过,则生成设备绑定信息。If the verification is passed, device binding information is generated.
  12. 根据权利要求10所述的物联网设备绑定方法,其中,所述将所述令牌信息发送给所述客户端,包括:The IoT device binding method according to claim 10, wherein said sending said token information to said client comprises:
    获取所述第一云服务器的回调地址信息;Obtain callback address information of the first cloud server;
    基于所述回调地址信息,向所述第一云服务器发送令牌信息,以使得所述第一云服务器将所述令牌信息发送给所述客户端。Based on the callback address information, send token information to the first cloud server, so that the first cloud server sends the token information to the client.
  13. 根据权利要求7所述的物联网设备绑定方法,其中,所述第一云服务器包括第一设备管理单元,所述方法还包括:The IoT device binding method according to claim 7, wherein the first cloud server includes a first device management unit, and the method further includes:
    接收所述第一设备管理单元发送的控制指令;receiving a control instruction sent by the first device management unit;
    基于所述控制指令对所述物联网设备进行控制。The Internet of Things device is controlled based on the control instruction.
  14. 一种物联网设备绑定装置,其中,包括:A device binding device for the Internet of Things, including:
    第一接收模块,用于接收客户端发起的针对物联网设备的第一绑定请求,所述客户端登录有用户账号;The first receiving module is configured to receive a first binding request for an IoT device initiated by a client, the client logging in with a user account;
    响应模块,用于响应于所述第一绑定请求,指示与所述物联网设备匹配的第二云服务器,对与所述客户端匹配的第一云服务器进行身份验证;A response module, configured to, in response to the first binding request, indicate a second cloud server matching the IoT device, and perform identity verification on the first cloud server matching the client;
    第二接收模块,用于接收所述第二云服务器返回的第一授权认证信息,所述第一授权认证信息为所述第二云服务器对所述第一云服务器的身份验证通过后发送的;The second receiving module is configured to receive the first authorization and authentication information returned by the second cloud server, the first authorization and authentication information is sent after the second cloud server passes the identity verification of the first cloud server ;
    第一绑定模块,用于根据所述第一授权认证信息向所述客户端发送第二授权认证信息,以使得所述客户端基于所述第二授权认证信息向第二云服务器发送第二绑定请求,所述第二绑定请求用于指示所述第二云服务器为所述用户账号生成令牌信息,并基于所述令牌信息对所述物联网设备进行绑定。The first binding module is configured to send second authorization and authentication information to the client according to the first authorization and authentication information, so that the client sends the second authorization and authentication information to the second cloud server based on the second authorization and authentication information. A binding request, the second binding request is used to instruct the second cloud server to generate token information for the user account, and bind the IoT device based on the token information.
  15. 一种物联网设备绑定装置,其中,包括:A device binding device for the Internet of Things, including:
    第三接收模块,用于接收第一云服务器发送的验证请求,所述验证请求为所述第一云服务器响应客户端发起的针对物联网设备的第一绑定请求发送的,所述客户端登录有用户账号;The third receiving module is configured to receive the verification request sent by the first cloud server, the verification request is sent by the first cloud server in response to the first binding request for the IoT device initiated by the client, the client Log in with a user account;
    验证模块,用于基于所述验证请求对所述第一云服务器进行身份验证;a verification module, configured to perform identity verification on the first cloud server based on the verification request;
    发送模块,用于若身份验证通过,则向所述第一云服务器发送第一授权认证信息,以使得所述第一云服务器基于所述第一授权认证信息向所述客户端发送第二授权认证信息;A sending module, configured to send first authorization and authentication information to the first cloud server if the identity verification is passed, so that the first cloud server sends a second authorization to the client based on the first authorization and authentication information Certification Information;
    第二绑定模块,用于响应于所述客户端基于所述授权认证信息发送的第二绑定请求,为所述用户账号生成令牌信息,并基于所述令牌信息对所述物联网设备进行绑定。The second binding module is configured to generate token information for the user account in response to the second binding request sent by the client based on the authorization and authentication information, and perform an authentication on the Internet of Things based on the token information The device is bound.
  16. 一种物联网设备绑定系统,其中,所述物联网设备绑定系统包括第一云服务器、第二云服务器、与所述第一云服务器匹配的客户端,以及与所述第二云服务器匹配的物联网设备,其中,An IoT device binding system, wherein the IoT device binding system includes a first cloud server, a second cloud server, a client that matches the first cloud server, and a client that matches the second cloud server Matching IoT devices, where,
    所述客户端用于,向所述第一云服务器发送针对所述物联网设备的第一绑定请求,所述客户端登录有用户账号;The client is configured to send a first binding request for the IoT device to the first cloud server, and the client is logged in with a user account;
    所述第一云服务器用于,响应于所述第一绑定请求,向所述第二云服务器发送验证请求,所述验证请求携带所述第一云服务器的验证信息;The first cloud server is configured to, in response to the first binding request, send a verification request to the second cloud server, where the verification request carries verification information of the first cloud server;
    所述第二云服务器用于,基于所述验证信息对所述第一云服务器进行身份验证;The second cloud server is configured to perform identity verification on the first cloud server based on the verification information;
    所述第二云服务器用于,若身份验证通过,则向所述第一云服务器返回第一授权认证信息;The second cloud server is configured to return first authorization and authentication information to the first cloud server if the identity verification is passed;
    所述第一云服务器用于,基于所述第一授权认证信息向所述客户端发送第二授权认证信息;The first cloud server is configured to send second authorization and authentication information to the client based on the first authorization and authentication information;
    所述客户端用于,基于所述第二授权认证信息向所述第二云服务器发送第二绑定请求;The client is configured to send a second binding request to the second cloud server based on the second authorization and authentication information;
    所述第二云服务器用于,响应所述第二绑定请求,基于所述第二授权认证信息为登录在所述客户端的用户账号生成令牌信息,并将所述令牌信息发送给所述客户端;The second cloud server is configured to, in response to the second binding request, generate token information for the user account logged in on the client based on the second authorization and authentication information, and send the token information to the the client;
    所述第二云服务器用于,基于所述令牌信息对所述物联网设备进行绑定;The second cloud server is configured to bind the IoT device based on the token information;
    所述客户端用于,基于所述令牌信息将所述用户账号与所述物联网设备进行绑定。The client is configured to bind the user account with the IoT device based on the token information.
  17. 根据权利要求16所述的物联网设备绑定系统,其特征在于,所述客户端与所述第一云服务器属于同一物联网系统。The IoT device binding system according to claim 16, wherein the client and the first cloud server belong to the same IoT system.
  18. 根据权利要求16所述的物联网设备绑定系统,其特征在于,所述物联网设备与所述第二云服务器属于同一物联网系统。The IoT device binding system according to claim 16, wherein the IoT device and the second cloud server belong to the same IoT system.
  19. 一种云服务器,其中,包括处理器和存储器,所述存储器中存储有计算机程序,所述处理器调用所述存储器中的计算机程序时,执行如权利要求1 至6任一项所述的物联网设备绑定方法,或者,执行如权利要求7至13任一项所述的物联网设备绑定方法。A cloud server, which includes a processor and a memory, and a computer program is stored in the memory, and when the processor invokes the computer program in the memory, it executes the object described in any one of claims 1 to 6 A method for binding an Internet-connected device, or performing the method for binding an Internet-of-things device according to any one of claims 7 to 13.
  20. 一种存储介质,其中,所述存储介质用于存储计算机程序,所述计算机程序被处理器加载,以执行权利要求1至6任一项所述的物联网设备绑定方法,或者,执行如权利要求7至13任一项所述的物联网设备绑定方法。A storage medium, wherein the storage medium is used to store a computer program, and the computer program is loaded by a processor to execute the IoT device binding method according to any one of claims 1 to 6, or to execute the method as described in The IoT device binding method according to any one of claims 7 to 13.
PCT/CN2022/099279 2021-08-05 2022-06-16 Internet of things device binding method, apparatus and system, and cloud server and storage medium WO2023011016A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110898234.2A CN113746633B (en) 2021-08-05 2021-08-05 Internet of things equipment binding method, device, system, cloud server and storage medium
CN202110898234.2 2021-08-05

Publications (1)

Publication Number Publication Date
WO2023011016A1 true WO2023011016A1 (en) 2023-02-09

Family

ID=78730238

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/099279 WO2023011016A1 (en) 2021-08-05 2022-06-16 Internet of things device binding method, apparatus and system, and cloud server and storage medium

Country Status (2)

Country Link
CN (1) CN113746633B (en)
WO (1) WO2023011016A1 (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113839917B (en) * 2021-06-30 2023-10-31 海信(广东)空调有限公司 Voice information processing method, data processing platform and equipment cloud server
CN113746633B (en) * 2021-08-05 2023-10-17 深圳Tcl新技术有限公司 Internet of things equipment binding method, device, system, cloud server and storage medium
CN114500617B (en) * 2021-12-24 2023-11-28 青岛海尔科技有限公司 Internet equipment control method and device, storage medium and electronic equipment
CN114866251B (en) * 2022-04-25 2023-07-07 中国银联股份有限公司 Equipment interconnection security authentication system, method, device, server and medium
CN117440377A (en) * 2022-07-21 2024-01-23 荣耀终端有限公司 Communication system, method and electronic equipment
WO2024031681A1 (en) * 2022-08-12 2024-02-15 Oppo广东移动通信有限公司 Device binding method and apparatus, and device, storage medium and program product
CN115412920A (en) * 2022-08-16 2022-11-29 杭州萤石软件有限公司 Internet of things equipment binding system, method and device and electronic equipment
WO2024050754A1 (en) * 2022-09-08 2024-03-14 Oppo广东移动通信有限公司 Method for starting client, first device, configuration device, and cloud platform
CN116055147B (en) * 2022-12-30 2024-08-16 中国电子科技集团公司第三十研究所 Cloud service light-weight identity authentication method based on identification
CN116112236B (en) * 2023-01-06 2024-11-29 深圳感臻智能股份有限公司 Authentication and data transmission method based on intelligent device ecology and intelligent television
CN117729050B (en) * 2024-01-23 2024-11-26 深圳技威时代科技有限公司 A system and method for securely binding a device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180288617A1 (en) * 2017-04-04 2018-10-04 Dell Products L.P. Transferable ownership tokens for discrete, identifiable devices
CN111327583A (en) * 2019-08-22 2020-06-23 刘高峰 Identity authentication method, intelligent equipment and authentication server
CN111639319A (en) * 2020-06-02 2020-09-08 北京字节跳动网络技术有限公司 User resource authorization method, device and computer readable storage medium
US20200296135A1 (en) * 2019-03-12 2020-09-17 Nxp B.V. Certificate provisioning and customer binding mechanisms using device group identification token
CN112738805A (en) * 2020-12-30 2021-04-30 青岛海尔科技有限公司 Device control method and apparatus, storage medium, and electronic device
CN113746633A (en) * 2021-08-05 2021-12-03 深圳Tcl新技术有限公司 Internet of things equipment binding method, device and system, cloud server and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995710B (en) * 2017-12-29 2022-06-24 上海智显光电科技有限公司 Local area network equipment management system and method
CN110944035A (en) * 2019-10-22 2020-03-31 珠海格力电器股份有限公司 Internet of things equipment control method and system and readable medium
CN110677248B (en) * 2019-10-30 2022-09-30 宁波奥克斯电气股份有限公司 A security binding method and system based on narrowband Internet of Things
CN111277565B (en) * 2020-01-08 2022-04-12 北京小米松果电子有限公司 Information processing method and device, and storage medium
CN112637245B (en) * 2021-01-13 2022-01-11 广州技象科技有限公司 Internet of things equipment binding method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180288617A1 (en) * 2017-04-04 2018-10-04 Dell Products L.P. Transferable ownership tokens for discrete, identifiable devices
US20200296135A1 (en) * 2019-03-12 2020-09-17 Nxp B.V. Certificate provisioning and customer binding mechanisms using device group identification token
CN111327583A (en) * 2019-08-22 2020-06-23 刘高峰 Identity authentication method, intelligent equipment and authentication server
CN111639319A (en) * 2020-06-02 2020-09-08 北京字节跳动网络技术有限公司 User resource authorization method, device and computer readable storage medium
CN112738805A (en) * 2020-12-30 2021-04-30 青岛海尔科技有限公司 Device control method and apparatus, storage medium, and electronic device
CN113746633A (en) * 2021-08-05 2021-12-03 深圳Tcl新技术有限公司 Internet of things equipment binding method, device and system, cloud server and storage medium

Also Published As

Publication number Publication date
CN113746633B (en) 2023-10-17
CN113746633A (en) 2021-12-03

Similar Documents

Publication Publication Date Title
WO2023011016A1 (en) Internet of things device binding method, apparatus and system, and cloud server and storage medium
US9038138B2 (en) Device token protocol for authorization and persistent authentication shared across applications
TWI400922B (en) Authentication of a principal in a federation
CN103051630B (en) Method, the Apparatus and system of third-party application mandate is realized based on open platform
CN106856475B (en) Authorization server and authentication collaboration system
US9294468B1 (en) Application-level certificates for identity and authorization
US11277404B2 (en) System and data processing method
WO2018145605A1 (en) Authentication method and server, and access control device
US20080320566A1 (en) Device provisioning and domain join emulation over non-secured networks
WO2020057163A1 (en) Mec platform deployment method and device
WO2017024791A1 (en) Authorization processing method and device
RU2683620C1 (en) Method of the data sharing implementation between the client and the virtual desktop, the client and the system
US20130007867A1 (en) Network Identity for Software-as-a-Service Authentication
CN112788031A (en) Envoy architecture-based micro-service interface authentication system, method and device
WO2023005525A1 (en) Configuration method for device control privilege, apparatus, computer device, and storage medium
CN113765655A (en) Access control method, device, equipment and storage medium
US20190028460A1 (en) Low-overhead single sign on
CN114363165A (en) Configuration method of electronic equipment, electronic equipment and server
US11968238B2 (en) Policy management system to provide authorization information via distributed data store
WO2023077922A1 (en) Device connection method and apparatus, and electronic device and computer-readable storage medium
JP2005217679A (en) Authentication server performing authentication of communication partner
JP6848275B2 (en) Program, authentication system and authentication cooperation system
US11943215B1 (en) Object authentication
WO2022006825A1 (en) Device access method in internet of things, apparatus, computer device, and storage medium
CN116208346A (en) Resource scheduling method, device, terminal, platform manager and orchestrator

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22851732

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22851732

Country of ref document: EP

Kind code of ref document: A1