WO2024031680A1 - 设备解绑方法、装置、设备、存储介质及程序产品 - Google Patents
设备解绑方法、装置、设备、存储介质及程序产品 Download PDFInfo
- Publication number
- WO2024031680A1 WO2024031680A1 PCT/CN2022/112256 CN2022112256W WO2024031680A1 WO 2024031680 A1 WO2024031680 A1 WO 2024031680A1 CN 2022112256 W CN2022112256 W CN 2022112256W WO 2024031680 A1 WO2024031680 A1 WO 2024031680A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- binding
- client
- proxy
- information
- client device
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 72
- 238000003860 storage Methods 0.000 title claims abstract description 19
- 230000007774 longterm Effects 0.000 claims description 46
- 238000004590 computer program Methods 0.000 claims description 25
- 238000012217 deletion Methods 0.000 claims description 12
- 230000037430 deletion Effects 0.000 claims description 12
- 239000003795 chemical substances by application Substances 0.000 description 54
- 230000006870 function Effects 0.000 description 8
- 230000008569 process Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 2
- 238000009776 industrial production Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 240000007594 Oryza sativa Species 0.000 description 1
- 235000007164 Oryza sativa Nutrition 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 239000003999 initiator Substances 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 235000009566 rice Nutrition 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000010408 sweeping Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
Definitions
- This application relates to the technical field of the Internet of Things, and in particular to a device unbundling method, device, equipment, storage medium and program product.
- IoT Internet of Things
- IoT devices can often be controlled by client devices.
- the client device can access the Internet of Things, establish a connection with the Internet of Things device, and send control instructions to the Internet of Things device through the established connection to achieve control of the Internet of Things device.
- Embodiments of the present application provide a device unbundling method, device, equipment, storage medium and program product.
- the technical solutions are as follows:
- embodiments of the present application provide a device unbinding method.
- the method is executed by a first device, and the first device is one of a proxy device and a client device; the method includes:
- the binding relationship between the proxy device and the client device When the binding relationship between the proxy device and the client device satisfies the unbinding condition, delete the binding information corresponding to the binding relationship in the first device; the binding relationship is
- the client device controls the Internet of Things device connected to the proxy device through the proxy device.
- inventions of the present application provide a device for unbundling devices.
- the device includes:
- a deletion module configured to delete the binding information corresponding to the binding relationship in the first device when the binding relationship between the proxy device and the client device satisfies the unbinding condition; the binding relationship is used to
- the client device controls the Internet of Things device connected to the proxy device through the proxy device; the first device is one of the proxy device and the client device.
- embodiments of the present application provide a computer device, the computer device is implemented as an information reporting device, and the computer device includes a processor, a memory, and a transceiver;
- a computer program is stored in the memory, and the processor executes the computer program, so that the computer device implements the above device unbinding method.
- embodiments of the present application provide a computer device, which includes a processor, a memory, and a transceiver.
- the memory stores a computer program, and the computer program is configured to be executed by the processor, so as to Implement the above device unbinding method.
- embodiments of the present application also provide a computer-readable storage medium, in which a computer program is stored, and the computer program is loaded and executed by a processor to implement the above device unbinding method.
- the present application also provides a chip, which is used to run in a computer device, so that the computer device executes the above device unbundling method.
- the present application provides a computer program product including computer instructions stored in a computer-readable storage medium.
- the processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device performs the above device unbinding method.
- the present application provides a computer program, which is executed by a processor of a computer device to implement the above device unbinding method.
- one of the proxy devices and the client device can release the above-mentioned binding relationship to delete the device. Binding information related to the binding relationship, thereby improving the security of device control and saving the memory resources of the device.
- Figure 1 is a schematic diagram of the network architecture of the Internet of Things provided by an embodiment of the present application.
- Figure 2 is a flow chart of a device unbinding method provided by an embodiment of the present application.
- Figure 3 is a flow chart of a device unbinding method provided by an embodiment of the present application.
- Figure 4 is a flow chart of a device unbinding method provided by an embodiment of the present application.
- Figure 5 is a flow chart of a device binding method provided by an embodiment of the present application.
- Figure 6 is a block diagram of a device unbundling device provided by an embodiment of the present application.
- Figure 7 is a schematic structural diagram of a computer device provided by an embodiment of the present application.
- the network architecture of the Internet of Things may include: an Internet of Things device 110 (shown as an Internet of Things device 110a, an Internet of Things device 110b, an Internet of Things device 110c, and an Internet of Things device 110d in Figure 1), a proxy device 120, and a client device 130;
- the network architecture may also include a bridge device 140; optionally, the network architecture may also include a cloud server 150.
- the Internet of Things device 110 may refer to a device used to provide client functions or server functions corresponding to the Internet of Things protocol in the Internet of Things.
- the IoT device 110 may be a smart home device, such as a smart switch, a smart lamp, a smart TV, a smart air conditioner, a smart refrigerator, a smart microwave oven, a smart rice cooker, a sweeping robot, etc.
- a smart home device such as a smart switch, a smart lamp, a smart TV, a smart air conditioner, a smart refrigerator, a smart microwave oven, a smart rice cooker, a sweeping robot, etc.
- the IoT device 110 may be an industrial production equipment, such as a lathe, an industrial robot, a solar panel, a wind turbine, etc.
- the Internet of Things device 110 may be a commercial service device, such as an unmanned vending machine or the like.
- the IoT device 110 may be a sensing device, such as a surveillance camera, an infrared sensor, a sound sensor, a temperature sensor, etc.
- the proxy device 120 is a user-side terminal device.
- the agent device 120 can be a smart controller, a smart remote control, a smart phone, a tablet, a smart watch, a smart TV, a smart speaker, etc.; or the agent device 120 can also be a personal computer, such as a desktop computer, a portable computer, Personal workstations and more.
- the proxy device 120 refers to a client entity (which may be a virtual entity) running on a terminal device.
- the proxy device 120 may run in a terminal device and is used to perform operations on Internet of Things devices.
- Application Application, APP
- the client device 130 may be a device having the function of communicating with the agent device 120.
- the client device 130 may be a vehicle-mounted device (such as a vehicle-mounted device), a smart speaker, a smart TV, etc.
- the bridge device 140 is used to implement interaction between two devices supporting different Internet of Things protocols.
- the bridge device 140 provides information conversion and transfer services between IoT devices 110 that support different IoT protocols, or between IoT devices 110 that support different IoT protocols and the proxy device 120 .
- the bridging device 140 may be a device dedicated for bridging, or the bridging device 140 may also be an intelligent device with a bridging function, such as a gateway or a router.
- the cloud server 150 is used to provide connection services between the Internet of Things device 110 and other devices outside the Internet of Things ecosystem (such as the above-mentioned proxy device 120).
- the cloud server 150 may be a cloud platform server of the Internet of Things ecosystem.
- the proxy device 120 can establish a connection with the Internet of Things device 110 through the cloud server 150.
- the proxy device 120 may also directly establish a connection with the Internet of Things device 110 .
- the above-mentioned IoT device 110, proxy device 120, and bridge device 140 may be electronic devices that meet the same or different IoT protocols.
- they may be electronic devices that meet the requirements of the Connectivity Standards Alliance (CSA). Matter protocol for electronic devices.
- CSA Connectivity Standards Alliance
- a secure connection can be established between the IoT device 110a and the IoT device 110c, for example, a secure connection is established based on the Matter specification.
- the IoT device 110b and the IoT device 110d support different protocol specifications, for example, the IoT device 110b is a Zigbee device and the IoT device 110d is a Matter device, the IoT device 110b and the IoT device 110d can connected via a bridge device 140.
- a binding relationship can be established between the proxy device and the client device.
- the binding relationship may be initiated by a proxy device.
- the proxy device can establish a binding relationship between the proxy device and the client device; the binding relationship is used by the client device to control the Internet of Things devices connected to the proxy device through the proxy device.
- the proxy device may add first binding device information corresponding to the client device in the first cluster.
- the first binding device information includes at least one of the following information:
- Protocol version information of the client device
- the controllable device list of the client device contains the device information of the IoT devices that the client device supports control among the IoT devices connected to the proxy device;
- the device information of the Internet of Things device includes at least one of the following information:
- the online status of the IoT device includes online or offline.
- IOT Agent Binding Cluster IOT Agent Binding Cluster
- Table 1 the attributes contained in the above-mentioned IOT Agent Binding Cluster can be shown in Table 1 below.
- logo name type illustrate 0 bindingIOTClientInfo List[bindingDeviceInfo] binding information
- Table 1 above shows that the IOT Agent Binding Cluster contains the binding IOT Client Info attribute.
- the value of this attribute is a list containing one or more binding device information (bindingDeviceInfo).
- bindingDeviceInfo in the above Table 1 can be as shown in the following Table 2.
- logo name direction answer necessity illustrate 0 deregisterIOTClient C->S Y M Unbind IOTClient
- the proxy device may notify the client device of the establishment of the binding relationship between the proxy device and the client device.
- the notification can include binding type, access type and other information.
- the client device can also set corresponding binding information in the local second cluster.
- IOT Client Cluster the definition of IOT Client Cluster can be as shown in Table 5 below.
- logo name type illustrate 0 VendorID string Manufacturer's logo 1 SupportedDeviceTypes deviceTypeList List of possible supported devices 2 bindingSource List[clientBindingInfo] binding information
- VendorID in the above Table 5 is represented by the manufacturer; SupportedDeviceTypes corresponds to the device type of the IoT device supported by the client device in the above device control capability information, and the value is a list of device types; bindingSource corresponds to the client binding information list.
- the structure (struct) of deviceTypeList in the above Table 5 can be as shown in the following Table 6.
- AllDevices in the above Table 6 corresponds to the above first support information;
- DeviceTypeList in the above Table 6 corresponds to the above device type list.
- the device type list contains the device type ID of one or more IoT devices that the client device supports control; and when AllDevices is TRUE, the value of AllDevices is empty.
- the clientBindingInfo structure in Table 5 above is used to record the binding relationship between the IOT Client (i.e., the client device) and the IOT Agent (i.e., the agent device).
- the IOT Client can determine whether to use this information in the subsequent device control process based on this information. Save the list of controllable devices and other information sent by the IOT Agent.
- clientBindingInfo can be shown in Table 7 below.
- AgentID contains the ID of the device that has established a binding relationship with the client device.
- the value of BindingType in Table 7 above indicates whether the binding relationship is long-term or temporary.
- the value of the above BindingType when the value of the above BindingType is 0, it means that the binding relationship is temporary binding. After the subsequent client device controls the IoT device connected to the device corresponding to the IOT agent ID, it does not need to save the IOT agent ID corresponding to the IoT device. Information such as the list of controllable devices sent by the device. On the contrary, when the value of the above BindingType is 1, it means that the binding relationship is long-term binding. After the subsequent client device controls the IoT device connected to the device corresponding to the IOT agent ID, the device corresponding to the IOT agent ID can be saved and sent. The list of controllable devices and other information can be used next time to control the IoT devices connected to the device corresponding to the IOT agent ID.
- the client device can control the IoT devices in the IOT ecosystem connected to the agent device through the agent device.
- the client device can obtain the controllable device information from the agent device, and the agent device sends the controllable device information to the client device;
- the controllable device information includes the information of at least one Internet of Things device connected to the agent device;
- the client device according to The above controllable device information sends control instructions to the agent device;
- the agent device receives the control instructions sent by the client device according to the controllable device information;
- the control instructions are used to control the target device in at least one Internet of Things device; the agent device will Control instructions are sent to the target device.
- the above binding relationship still exists between the proxy device and the client device. On the one hand, it will Affects the security of subsequent control of IoT devices. On the other hand, information related to binding relationships will occupy the storage resources of agent devices and client devices.
- embodiments of the present application provide a device unbinding method, which can unbind the established binding relationship between the proxy device and the client device.
- FIG 2 shows a flow chart of a device unbinding method provided by an embodiment of the present application.
- the method can be executed by a first device, which is one of a proxy device and a client device; for example, The proxy device may be the proxy device 120 in the network architecture shown in Figure 1, and the client device may be the client device 130 in the network architecture shown in Figure 1; the method may include the following steps:
- Step 201 When the binding relationship between the proxy device and the client device meets the unbinding condition, delete the binding information corresponding to the binding relationship in the first device; the binding relationship is used by the client device through the proxy device , control the IoT devices connected to the agent device.
- deleting the binding information corresponding to the binding relationship in the first device includes:
- the first binding device information includes at least one of the following information:
- Protocol version information of the client device
- the controllable device list of the client device contains the device information of the IoT devices that the client device supports control among the IoT devices connected to the proxy device;
- the device information of the Internet of Things device includes at least one of the following information:
- the online status of the IoT device includes online or offline.
- deleting the binding information corresponding to the binding relationship in the first device includes:
- the above first client binding information includes at least one of the following information:
- Binding type information is used to indicate the binding type of the binding relationship between the proxy device and the client device; the binding type includes temporary binding or long-term binding;
- the access type information is used to indicate the access type of the client device to the Internet of Things device connected to the proxy device; the access type includes bridge access or proxy access.
- the method also includes:
- the controllable device list contains the device information of the IoT devices that the client device supports control among the IoT devices connected to the proxy device.
- the unbinding conditions include any of the following conditions:
- the binding type of the binding relationship between the proxy device and the client device is temporary binding
- the first device is a client device, receiving a user instruction to cancel the binding relationship
- the binding type of the binding relationship between the proxy device and the client device is temporary binding
- the first device is the client device
- the Methods when the unbinding condition is that the binding type of the binding relationship between the proxy device and the client device is long-term binding, and a user instruction to unbind the binding relationship is received, the Methods also include:
- the second device is another device among the proxy device and the client device except the first device; the unbinding message is used to indicate deletion of binding information corresponding to the binding relationship.
- one of the proxy devices and the client device can cancel the binding relationship to delete the binding relationship. Binding information related to the binding relationship in the device, thereby improving the security of device control and saving memory resources of the device.
- the first device may be a proxy device or a client device, and the binding type of the above binding relationship may be long-term binding or temporary binding. .
- the initiator of the above binding relationship may be a proxy device or a client device.
- Figure 3 shows a device unbinding method provided by an embodiment of the present application.
- the flow chart of the method can be executed interactively by a proxy device and a client device; for example, the proxy device can be the proxy device 120 in the network architecture shown in Figure 1, and the client device can be the network architecture shown in Figure 1 client device 130; the method may include the following steps:
- Step 301 When the binding type of the binding relationship between the proxy device and the client device is long-term binding, the proxy device receives a user instruction to cancel the binding relationship.
- the proxy device when the above-mentioned binding relationship is a long-term binding relationship, when the proxy device receives a user instruction to release the binding relationship, it can determine that the above-mentioned binding relationship satisfies the conditions for release.
- Step 302 The proxy device deletes the first binding device information corresponding to the client device in the first cluster of proxy devices.
- the above-mentioned first cluster may be called IOT Agent Binding Cluster.
- the first binding device information includes at least one of the following information:
- Protocol version information of the client device
- the controllable device list of the client device contains the device information of the IoT devices that the client device supports control among the IoT devices connected to the proxy device;
- the above protocol version information may be a version number of the Internet of Things protocol supported by the client device.
- a controllable device list can be set in the bound device information corresponding to each client device to save the device information of the Internet of Things devices that the client device can control.
- the device information of the Internet of Things device includes at least one of the following information:
- the online status of the IoT device includes online or offline.
- the online status of the above-mentioned Internet of Things device can be used to indicate whether the Internet of Things device can currently accept control.
- the proxy device deletes the first binding device information corresponding to the client device in the first cluster of proxy devices, which may refer to deleting the binding device corresponding to the client device in the IOT Agent Binding Cluster. information(bindingDeviceInfo).
- Step 303 The proxy device sends an unbinding message to the client device; the client device receives the unbinding message.
- the unbinding message may be used to instruct the client device to delete the binding information corresponding to the binding relationship in the client device.
- the client device if the client device is regarded as the first device and the proxy device is regarded as the second device, then when the binding type of the binding relationship between the proxy device and the client device is long-term binding, the client device Upon receiving the unbinding message sent by the proxy device, it can be determined that the above binding relationship meets the unbinding conditions.
- the proxy device sends an unbinding message to the client device, which may be called an unbinding relationship notification.
- Step 304 The client device deletes the first client binding information corresponding to the proxy device in the second cluster of the client device.
- the second cluster contains at least one of the following information:
- the client binding information list contains the client binding information of the established binding relationship.
- the above-mentioned manufacturer information may be the manufacturer identification of the manufacturer of the client device.
- the above client binding information list may contain multiple client binding information, and each client binding information may correspond to an established binding relationship between a client device and other devices (proxy devices) (used to Other devices are agents that control IoT devices connected to other devices).
- proxy devices used to Other devices are agents that control IoT devices connected to other devices.
- the second cluster contains at least one of the following information:
- the first support information is used to indicate whether the client device supports controlling all types of Internet of Things devices;
- the device type list contains type identification information of device types of Internet of Things devices that the client device supports control.
- the value of the above-mentioned first support information may be a bool value.
- the value of the first support information is True, it means that the client device supports controlling all types of Internet of Things devices; when the value of the first support information is False (False), it means that the client device does not support controlling all types of IoT devices.
- the above device type list may contain identifiers of one or more device types to indicate that the client device supports the control of IoT devices corresponding to these device types.
- the above first client binding information includes at least one of the following information:
- Binding type information is used to indicate the binding type of the binding relationship between the proxy device and the client device; the binding type includes temporary binding or long-term binding;
- the access type information is used to indicate the access type of the client device to the Internet of Things device connected to the proxy device; the access type includes bridge access or proxy access.
- the above-mentioned second cluster and various information in the second cluster can be referred to the above-mentioned Table 5 to Table 7, and will not be described again here.
- the client device when the client device deletes the first client binding information corresponding to the proxy device in the second cluster of the client device, the IOT Client Cluster shown in Table 5 above can be combined with the proxy device.
- the client binding information (clientBindingInfo) corresponding to the device is deleted.
- the client device can also delete the controllable device list stored in the client device; wherein, the controllable device list includes Internet of Things devices connected to the proxy device, and the client device supports control Device information for IoT devices.
- the user when the user uses the client device and uses the proxy device as a proxy to control the Internet of Things devices connected to the proxy device, the user can first obtain a list of controllable devices from the proxy device, which includes the list of controllable devices connected to the proxy device.
- the client device supports device information of each IoT device controlled.
- the device information of each of the above-mentioned Internet of Things devices is also called controllable device information, and may include information of endpoints in the Internet of Things devices.
- the device information of each of the above Internet of Things devices may be a device information list, and the content contained in the device information list may refer to the above Table 8.
- cluster_Info For the structure of the cluster information (cluster_Info) in Table 10 above, please refer to Table 11 below.
- the method set in Table 11 above includes specific functions of the corresponding device.
- the events in Table 11 above may be events reported by the Internet of Things device to other devices (such as APP), such as door lock_door not closed, etc.
- attribute information (attribute_Info) in Table 11 above, please refer to Table 12 below.
- logo name type illustrate 0 attributeID Uint16 attribute identifier 1 Value Current property status
- Event_Info For the structure of the event information (event_Info) in Table 11 above, please refer to Table 14 below.
- logo name type illustrate 0 eventID Uint16 event identifier
- the client device when the client device deletes the above binding relationship, the device information of each Internet of Things device obtained from the proxy device can be deleted together.
- the user when a long-term binding relationship has been established between the proxy device and the client device, the user can trigger the proxy device to release the above-mentioned binding relationship to delete the proxy.
- the binding information related to the binding relationship in the device, and the agent device can also notify the IoT device to release the above binding relationship, thereby improving the security of device control and saving the memory resources of the device.
- FIG. 4 shows the device solution provided by an embodiment of the present application.
- a flow chart of a binding method which can be executed interactively by a proxy device and a client device; for example, the proxy device can be the proxy device 120 in the network architecture shown in Figure 1, and the client device can be the proxy device 120 in the network architecture shown in Figure 1 Client device 130 in the network architecture; the method may include the following steps:
- Step 401 When the binding type of the binding relationship between the proxy device and the client device is long-term binding, the client device receives a user instruction to cancel the binding relationship.
- the client device when the above-mentioned binding relationship is a long-term binding relationship, when the client device receives a user instruction to release the binding relationship, it can determine that the above-mentioned binding relationship satisfies the conditions for release.
- Step 402 The client device deletes the first client binding information corresponding to the proxy device in the second cluster of the client device.
- the second cluster contains at least one of the following information:
- the client binding information list contains the client binding information of the established binding relationship.
- the second cluster contains at least one of the following information:
- the first support information is used to indicate whether the client device supports controlling all types of Internet of Things devices;
- the device type list contains type identification information of device types of Internet of Things devices that the client device supports control.
- the above first client binding information includes at least one of the following information:
- Binding type information is used to indicate the binding type of the binding relationship between the proxy device and the client device; the binding type includes temporary binding or long-term binding;
- the access type information is used to indicate the access type of the client device to the Internet of Things device connected to the proxy device; the access type includes bridge access or proxy access.
- the above-mentioned second cluster and various information in the second cluster can be referred to the above-mentioned Table 5 to Table 7, and will not be described again here.
- the client device when the client device deletes the first client binding information corresponding to the proxy device in the second cluster of the client device, the IOT Client Cluster shown in Table 5 above can be combined with the proxy device.
- the client binding information (clientBindingInfo) corresponding to the device is deleted.
- the client device can also delete the controllable device list stored in the client device; wherein, the controllable device list includes Internet of Things devices connected to the proxy device, and the client device supports control Device information for IoT devices.
- step 402 For the execution process of step 402, reference may be made to the description under step 304 in the embodiment shown in FIG. 3, which will not be described again here.
- Step 403 The client device sends an unbinding message to the proxy device; the proxy device receives the unbinding message.
- the unbinding message may be used to instruct the proxy device to delete the binding information corresponding to the binding relationship in the proxy device.
- the proxy device when the binding type of the binding relationship between the proxy device and the client device is long-term binding, the proxy device receives By sending an unbinding message to the client device, it can be determined that the above binding relationship meets the unbinding conditions.
- the unbinding message sent by the client device to the proxy device may be called a binding relationship deletion request.
- Step 404 The proxy device deletes the first binding device information corresponding to the client device in the first cluster of proxy devices.
- the above-mentioned first cluster may be called IOT Agent Binding Cluster.
- the first binding device information includes at least one of the following information:
- Protocol version information of the client device
- the controllable device list of the client device contains the device information of the IoT devices that the client device supports control among the IoT devices connected to the proxy device;
- the device information of the Internet of Things device includes at least one of the following information:
- the online status of the IoT device includes online or offline.
- the online status of the above-mentioned Internet of Things device can be used to indicate whether the Internet of Things device can currently accept control.
- the proxy device deletes the first binding device information corresponding to the client device in the first cluster of proxy devices, which may refer to deleting the binding device corresponding to the client device in the IOT Agent Binding Cluster. information(bindingDeviceInfo).
- step 404 For the execution process of step 404, reference may be made to the description under step 302 in the embodiment shown in FIG. 3, which will not be described again here.
- the proxy device may also return a notification of completion of the binding relationship to the client device.
- the user when a long-term binding relationship has been established between the proxy device and the client device, the user can trigger the client device to release the above binding relationship to delete the binding relationship.
- Binding information and device information list related to the binding relationship in the client device, and the client device can also notify the agent device to release the above-mentioned binding relationship, thereby improving the security of device control and saving the memory of the device resource effects.
- Figure 5 shows a flow chart of a device unbinding method provided by an embodiment of the present application.
- This method can be performed by the client.
- Device execution for example, the client device can be the client device 130 in the network architecture shown in Figure 1; the method can include the following steps:
- Step 501 When the binding type of the binding relationship between the proxy device and the client device is temporary binding, the client device detects that the binding relationship satisfies the cancellation condition.
- the binding information corresponding to the binding relationship may not exist in the proxy device. Accordingly, , only the client device needs to unbind the relationship.
- the above-mentioned unbinding condition may be: when the binding type of the binding relationship between the proxy device and the client device is temporary binding, and the first device is a client device, the user who receives the unbinding relationship instruction.
- the binding type of the binding relationship between the proxy device and the client device is temporary binding
- the first device is the client device
- the client device when the binding type of the binding relationship between the proxy device and the client device is temporary binding, when the client device receives a user instruction to release the binding relationship initiated by the user (active release), or, When the client device detects that the secure connection between the proxy device and the client device is lost (passive release), the client device can determine that the above binding relationship meets the release conditions.
- Step 502 The client device deletes the first client binding information corresponding to the proxy device in the second cluster of the client device.
- the second cluster contains at least one of the following information:
- the client binding information list contains the client binding information of the established binding relationship.
- the second cluster contains at least one of the following information:
- the first support information is used to indicate whether the client device supports controlling all types of Internet of Things devices;
- the device type list contains type identification information of device types of Internet of Things devices that the client device supports control.
- the above first client binding information includes at least one of the following information:
- Binding type information is used to indicate the binding type of the binding relationship between the proxy device and the client device; the binding type includes temporary binding or long-term binding;
- the access type information is used to indicate the access type of the client device to the Internet of Things device connected to the proxy device; the access type includes bridge access or proxy access.
- the above-mentioned second cluster and various information in the second cluster can be referred to the above-mentioned Table 5 to Table 7, and will not be described again here.
- the client device when the client device deletes the first client binding information corresponding to the proxy device in the second cluster of the client device, the IOT Client Cluster shown in Table 5 above can be combined with the proxy device.
- the client binding information (clientBindingInfo) corresponding to the device is deleted.
- the client device can also delete the controllable device list stored in the client device; wherein, the controllable device list includes Internet of Things devices connected to the proxy device, and the client device supports control Device information for IoT devices.
- step 502 For the execution process of step 502, reference may be made to the description under step 304 in the embodiment shown in FIG. 3, which will not be described again here.
- the above cancellation conditions are: the binding type of the binding relationship between the proxy device and the client device is temporary binding, and when the client device receives a user instruction to release the binding relationship, the client device releases the binding relationship. After the above binding relationship is established, the connection with the proxy device can also be ended.
- the user when a temporary binding relationship has been established between the proxy device and the client device, the user can trigger the client device to release the above binding relationship, or the client can The end device can release the above binding relationship when it detects that the secure connection with the proxy device is lost, thereby improving the security of device control and saving the memory resources of the device.
- the above-mentioned cancellation of the binding relationship is divided into the cancellation of the long-term binding relationship and the cancellation of the temporary binding relationship.
- the long-term binding relationship can be divided into the cancellation of the binding relationship actively initiated by the IOT Client and the cancellation of the binding relationship actively initiated by the IOT Agent.
- the lifting of the temporary binding is divided into the lifting initiated by the user on the IOT Client and the passive lifting after the IOT Client detects the connection loss.
- the lifting of the binding relationship involved in the above embodiments of this application may include the following steps:
- the user initiates the release of the long-term binding relationship between the IOT Client and the IOT Agent on the IOT Client.
- IOT Client deletes the binding information and device information list corresponding to the above long-term binding relationship in IOT Client.
- IOT Client notifies IOT Agent to delete the binding information corresponding to the above long-term binding relationship in IOT Agent Binding cluster.
- IOT Agent deletes the binding information corresponding to the above long-term binding relationship.
- IOT Agent notifies IOT Client that the above long-term binding relationship has been deleted.
- the user initiates the release of the long-term binding relationship between the IOT Client and the IOT Agent on the IOT Agent.
- IOT Agent deletes the binding information corresponding to the above long-term binding relationship in the IOT Agent Binding cluster.
- IOT Agent notifies IOT Client to delete the above long-term binding relationship.
- IOT Agent deletes the binding information and device information list corresponding to the above long-term binding relationship in IOT Client.
- the IOT Client deletes the binding information and device information list corresponding to the above temporary binding in the IOT Client.
- IOT Client initiates the termination of the connection.
- the client device unbinds the temporary binding on its own:
- IOT Client detects that the secure connection is lost.
- IOT Client automatically deletes the binding information and device information list corresponding to the above temporary binding in IOT Client.
- FIG. 6 shows a block diagram of a device unbundling device provided by an embodiment of the present application.
- the device unbinding device 600 has the function of being executed by a proxy device or a client device in implementing any of the methods shown in FIGS. 2 to 5 .
- the device may include:
- the deletion module 601 is configured to delete the binding information corresponding to the binding relationship in the first device when the binding relationship between the proxy device and the client device satisfies the unbinding condition; the binding relationship is
- the client device controls the Internet of Things device connected to the proxy device through the proxy device; the first device is one of the proxy device and the client device.
- the deletion module 601 is configured to delete, in the first cluster of the proxy devices, corresponding to the client device when the first device is the proxy device.
- the first binding device information is configured to delete, in the first cluster of the proxy devices, corresponding to the client device when the first device is the proxy device.
- the first binding device information includes at least one of the following information:
- the identification information of the client device is the identification information of the client device.
- the protocol version information of the client device
- the controllable device list of the client device includes device information of the IoT devices that the client device supports control among the IoT devices connected to the proxy device;
- the device information of the Internet of Things device includes at least one of the following information:
- the identification information of the Internet of Things device is the identification information of the Internet of Things device
- the online status of the Internet of Things device includes online or offline.
- the deletion module 601 is configured to delete, in the case where the first device is the client device, the second cluster of the client device that is the same as the proxy device. Corresponding first client binding information.
- the first client binding information includes at least one of the following information:
- the identification information of the proxy device is the identification information of the proxy device
- Binding type information is used to indicate the binding type of the binding relationship between the proxy device and the client device; the binding type includes temporary binding or long-term binding;
- access type information is used to indicate the access type of the client device to the Internet of Things device connected to the proxy device; the access type includes bridge access or proxy access.
- the deletion module 601 is also used to delete a controllable device list stored in the client device; the controllable device list includes Internet of Things devices connected to the proxy device. , the client device supports device information of the controlled Internet of Things device.
- the unbinding condition includes: when the binding type of the binding relationship between the proxy device and the client device is long-term binding, receiving the unbinding condition User instructions for binding relationships.
- the unbinding condition includes: when the binding type of the binding relationship between the proxy device and the client device is long-term binding, receiving a The unbinding message sent.
- the unbinding condition includes: the binding type of the binding relationship between the proxy device and the client device is temporary binding, and the first device is the In the case of the above-mentioned client device, a user instruction to release the binding relationship is received.
- the unbinding condition includes: the binding type of the binding relationship between the proxy device and the client device is temporary binding, and the first device is the In the case of the client device, a loss of the secure connection between the proxy device and the client device is detected.
- the device further includes:
- a sending module configured to send a message when the unbinding condition is that the binding type of the binding relationship between the proxy device and the client device is long-term binding, and a user instruction to release the binding relationship is received.
- an unbinding message is sent to a second device; the second device is another device among the proxy device and the client device except the first device; the unbinding message is Instructing to delete the binding information corresponding to the binding relationship.
- FIG. 7 shows a schematic structural diagram of a computer device 700 provided by an embodiment of the present application.
- the computer device 700 may include a processor 701, a receiver 702, a transmitter 703, a memory 704, and a bus 705.
- the processor 701 includes one or more processing cores.
- the processor 701 executes various functional applications and information processing by running software programs and modules.
- the receiver 702 and the transmitter 703 can be implemented as a communication component, and the communication component can be a communication chip.
- This communication chip can also be called a transceiver.
- Memory 704 is connected to processor 701 through bus 705.
- the memory 704 can be used to store a computer program, and the processor 701 is used to execute the computer program to implement various steps in the above method embodiments.
- memory 704 may be implemented by any type of volatile or non-volatile storage device, or combination thereof, including but not limited to: magnetic or optical disks, electrically erasable programmable Read-only memory, erasable programmable read-only memory, static ready-access memory, read-only memory, magnetic memory, flash memory, programmable read-only memory.
- the collection processor is configured to delete the binding relationship between the proxy device and the client device when the binding relationship meets the unbinding condition. Binding information corresponding to the binding relationship in the first device; the binding relationship is used by the client device to control the Internet of Things device connected to the proxy device through the proxy device; the third A device is one of a proxy device and a client device.
- the process performed by the processor 701 and/or the transceiver in the computer device 700 may refer to the various steps performed by the proxy device or the client device in any of the methods shown in FIGS. 2 to 5 .
- Embodiments of the present application also provide a computer-readable storage medium.
- a computer program is stored in the storage medium.
- the computer program is loaded and executed by a processor to implement the method shown in any one of the above figures 2 to 5. , all or part of the steps performed by the proxy device or the client device.
- This application also provides a chip, which is used to run in a computer device, so that the computer device performs all or part of the methods shown in any one of the above-mentioned Figures 2 to 5, which are performed by the proxy device or the client device. step.
- the application also provides a computer program product, which computer program product or computer program includes computer instructions, and the computer instructions are stored in a computer-readable storage medium.
- the processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device performs the method shown in any one of the above-mentioned Figures 2 to 5, which is executed by the agent device or the client device all or part of the steps.
- This application also provides a computer program, which is executed by the processor of the computer device to implement all or part of the steps executed by the agent device or the client device in any of the methods shown in Figures 2 to 5. .
- Computer-readable media includes computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another.
- Storage media can be any available media that can be accessed by a general purpose or special purpose computer.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
一种设备解绑方法、装置、设备、存储介质及程序产品,属于物联网技术领域。该方法由第一设备执行,该第一设备是代理设备和客户端设备中的一个;该方法包括:在该代理设备和该客户端设备之间的绑定关系满足解绑条件的情况下,删除该第一设备中与该绑定关系对应的绑定信息(201);该绑定关系用于该客户端设备通过该代理设备,对该代理设备连接的物联网设备进行控制。上述方案可以提高设备控制的安全性,以及,节约设备的内存资源的效果。
Description
本申请涉及物联网技术领域,特别涉及一种设备解绑方法、装置、设备、存储介质及程序产品。
随着物联网(Internet of Things,IoT)技术的不断发展,越来越多的物联网设备在智能家居、工业生产等诸多领域给用户的生产生活带来了极大的便利性。
在相关技术中,物联网设备通常可以由客户端设备进行控制。具体的,客户端设备可以接入物联网,并与物联网设备之间建立连接,通过建立的连接向物联网设备发送控制指令,以实现对物联网设备的控制。
发明内容
本申请实施例提供了一种设备解绑方法、装置、设备、存储介质及程序产品。所述技术方案如下:
一方面,本申请实施例提供了设备解绑方法,所述方法由第一设备执行,所述第一设备是代理设备和客户端设备中的一个;所述方法包括:
在所述代理设备和所述客户端设备之间的绑定关系满足解绑条件的情况下,删除所述第一设备中与所述绑定关系对应的绑定信息;所述绑定关系用于所述客户端设备通过所述代理设备,对所述代理设备连接的物联网设备进行控制。
另一方面,本申请实施例提供了一种设备解绑装置,所述装置包括:
删除模块,用于在代理设备和客户端设备之间的绑定关系满足解绑条件的情况下,删除第一设备中与所述绑定关系对应的绑定信息;所述绑定关系用于所述客户端设备通过所述代理设备,对所述代理设备连接的物联网设备进行控制;所述第一设备是所述代理设备和所述客户端设备中的一个。
另一方面,本申请实施例提供了一种计算机设备,所述计算机设备实现为信息上报设备,所述计算机设备包括处理器、存储器和收发器;
存储器中存储有计算机程序,处理器执行所述计算机程序,以使得计算机设备实现上述设备解绑方法。
再一方面,本申请实施例提供了一种计算机设备,所述计算机设备包括处理器、存储器和收发器,所述存储器存储有计算机程序,所述计算机程序用于被所述处理器执行,以实现上述设备解绑方法。
又一方面,本申请实施例还提供了一种计算机可读存储介质,所述存储介质中存储有计算机程序,所述计算机程序由处理器加载并执行以实现上述设备解绑方法。
又一方面,本申请还提供了一种芯片,所述芯片用于在计算机设备中运行,以使得所述计算机设备执行上述设备解绑方法。
又一方面,本申请提供了一种计算机程序产品,该计算机程序产品包括计算机指令,该计算机指令存储在计算机可读存储介质中。计算机设备的处理器从计算机可读存储介质读取该计算机指令,处理器执行该计算机指令,使得该计算机设备执行上述设备解绑方法。
又一方面,本申请提供了一种计算机程序,该计算机程序由计算机设备的处理器执行,以实现上述设备解绑方法。
通过本申请实施例提供的技术方案,在代理设备和客户端设备之间已建立有绑定关系的 情况下,代理设备和客户端设备中的一个设备可以解除上述绑定关系,以删除该设备中与该绑定关系相关的绑定信息,从而达到提高设备控制的安全性,以及,节约设备的内存资源的效果。
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请一个实施例提供的物联网的网络架构的示意图;
图2是本申请一个实施例提供的设备解绑方法的流程图;
图3是本申请一个实施例提供的设备解绑方法的流程图;
图4是本申请一个实施例提供的设备解绑方法的流程图;
图5是本申请一个实施例提供的设备绑定方法的流程图;
图6是本申请一个实施例提供的设备解绑装置的框图;
图7是本申请一个实施例提供的计算机设备的结构示意图。
为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施方式作进一步地详细描述。
本申请实施例描述的网络架构以及业务场景是为了更加清楚地说明本申请实施例的技术方案,并不构成对本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
请参考图1,其示出了本申请一个实施例提供的物联网的网络架构的示意图。该物联网的网络架构可以包括:物联网设备110(图1中示出为物联网设备110a、物联网设备110b、物联网设备110c、物联网设备110d)、代理设备120以及客户端设备130;可选的,该网络架构还可以包括桥接设备140;可选的,该网络架构还可以包括云端服务器150。
物联网设备110可以是指在物联网中,用于提供物联网协议对应的客户端功能或者服务端功能的设备。
比如,物联网设备110可以是智能家居设备,例如,智能开关、智能灯具、智能电视、智能空调、智能冰箱、智能微波炉、智能电饭煲、扫地机器人等等。
或者,物联网设备110可以是工业生产设备,例如,车床、工业机器人、太阳能面板、风力发电机等等。
或者,物联网设备110可以是商业服务设备,例如,无人售货机等等。
或者,物联网设备110可以是传感设备,例如,监控摄像头、红外传感器、声音传感器、温度传感器等等。
在一种可能的实现方式中,代理设备120是用户侧的终端设备。比如,代理设备120可以是智能控制器、智能遥控器、智能手机、平板电脑、智能手表、智能电视、智能音箱等等;或者,代理设备120也可以是个人电脑,比如台式电脑、便携式计算机、个人工作站等等。
在另一种可能的实现方式中,代理设备120是指基于终端设备运行的客户端实体(可以是虚拟实体),例如,代理设备120可以是运行在终端设备中,用于对物联网设备进行访问、控制、以及管理等操作的应用程序(Application,APP)。
客户端设备130可以是具有与代理设备120进行通信功能的设备,比如,客户端设备130可以车载设备(比如车机设备)、智能音箱、智能电视等等。
桥接设备140用于实现支持不同物联网协议的两个设备之间的交互。桥接设备140在支 持不同物联网协议的物联网设备110之间,或者,在支持不同物联网协议的物联网设备110和代理设备120之间,提供信息转换和传递的服务。
桥接设备140可以是专用于进行桥接的设备,或者,桥接设备140也可以是具有桥接功能的智能设备,比如网关或者路由器等等。
云端服务器150用于提供物联网设备110与物联网生态之外的其它设备(比如上述代理设备120)之间的连接服务。其中,云端服务器150可以是物联网生态的云端平台服务器。
其中,代理设备120可以通过云端服务器150,与物联网设备110建立连接。
或者,代理设备120也可以直接与物联网设备110建立连接。
在本申请实施例中,上述物联网设备110、代理设备120、桥接设备140可以是满足相同或者不同的物联网协议的电子设备,比如,可以是满足连接标准联盟(Connectivity Standards Alliance,CSA)下的Matter协议的电子设备。
在图1中,当物联网设备110a和物联网设备110c之间支持相同的协议规范时,物联网设备110a和物联网设备110c之间可以建立安全连接,比如,基于Matter规范建立安全连接。
当物联网设备110b和物联网设备110d之间支持不同的协议规范,比如,物联网设备110b是Zigbee设备,而物联网设备110d是Matter设备时,物联网设备110b和物联网设备110d之间可以通过桥接设备140相连。
在本申请实施例中,为了实现客户端设备通过代理设备,对代理设备连接的IOT生态系统中的物联网设备的控制,代理设备和客户端设备之间可以建立绑定关系。比如,在本申请实施例的一个可能的实现方案中,该绑定关系可以由代理设备发起建立。
比如,代理设备可以建立代理设备与客户端设备之间的绑定关系;该绑定关系用于客户端设备通过代理设备,对代理设备连接的物联网设备进行控制。
在一种可能的实现方式中,代理设备建立代理设备与客户端设备之间的绑定关系的过程中,可以在第一群集中添加与客户端设备对应的第一绑定设备信息。
在一种可能的实现方式中,第一绑定设备信息中包含以下信息中的至少一项:
客户端设备的标识信息;
客户端设备的协议版本信息;
客户端设备的可控设备列表;可控设备列表中包含代理设备连接的物联网设备中,客户端设备支持控制的物联网设备的设备信息;
可控设备列表的版本信息。
在一种可能的实现方式中,物联网设备的设备信息包括以下信息中的至少一项:
物联网设备的标识信息;
物联网设备的在线状态;在线状态包括在线或离线。
以上述第一群集是IOT Agent Binding Cluster(IOT代理绑定群集)为例,上述IOT Agent Binding Cluster包含的属性可以如下述表1所示。
表1
标识 | 名称 | 类型 | 说明 |
0 | bindingIOTClientInfo | List[bindingDeviceInfo] | 绑定信息 |
上述表1示出,IOT Agent Binding Cluster中包含绑定IOT客户端binding IOT Client Info属性,该属性的值是包含一条或者多条绑定设备信息(bindingDeviceInfo)的列表。
其中,上述表1中的bindingDeviceInfo的结构体可以如下述表2所示。
表2
其中,上述表2中的onlineStatus的结构体可以如下述表3所示。
表3
上述IOT Agent Binding Cluster对应的命令可以如下述表4所示。
表4
标识 | 名称 | 方向 | 应答 | 必要性 | 说明 |
0 | deregisterIOTClient | C->S | Y | M | 解绑IOTClient |
在本申请实施例中,代理设备在绑定关系建立过程中,或者,在绑定关系建立完成后,可以将建立代理设备和客户端设备之间的绑定关系的情况通知给客户端设备,该通知中可以包含绑定类型、访问类型等信息。相应的,客户端设备也可以在本地的第二群集中设置对应的绑定信息。
在一种示例性的方案中,以第二群集是IOT Client Cluster为例,IOT Client Cluster的定义可以如下述表5所示。
表5
标识 | 名称 | 类型 | 说明 |
0 | VendorID | string | 厂商标识 |
1 | SupportedDeviceTypes | deviceTypeList | 支持的可能设备列表 |
2 | bindingSource | List[clientBindingInfo] | 绑定信息 |
上述表5中的VendorID为厂商表示;SupportedDeviceTypes对应的是上述设备控制能力信息中的客户端设备支持控制的物联网设备的设备类型,值为一个设备类型列表;bindingSource对应的是客户端绑定信息列表。
其中,上述表5中的deviceTypeList的结构体(struct)可以如下述表6所示。
表6
其中,上述表6中的AllDevices对应的是上述第一支持信息;上述表6中的DeviceTypeList对应的是上述设备类型列表。其中,当AllDevices为FALSE时,该设备类型列表中包含一个或多个客户端设备支持控制的物联网设备的设备类型的ID;而当该AllDevices为TRUE时,AllDevices的值为空。
上述表5中的clientBindingInfo的结构体用于记录IOT Client(即客户端设备)与IOT Agent(即代理设备)的绑定关系,IOT Client可以根据该信息,确定在后续的设备控制过程中,是否保存IOT Agent发送过来的可控设备的列表等信息。
其中,clientBindingInfo的结构体可以如下述表7所示。
表7
在上述表7中,AgentID包含与客户端设备之间建立了绑定关系的设备的ID。上述表7中的BindingType的值则表示该绑定关系是长期绑定还是临时绑定。
可选的,当上述BindingType的值为0时,表示绑定关系为临时绑定,后续客户端设备对IOT代理ID对应的设备连接的物联网设备控制结束后,可以不保存IOT代理ID对应的设备发送过来的可控设备的列表等信息。反之,当上述BindingType的值为1时,表示绑定关系为长期绑定,后续客户端设备对IOT代理ID对应的设备连接的物联网设备控制结束后,可以保存IOT代理ID对应的设备发送过来的可控设备的列表等信息,以便下次对该IOT代理ID对应的设备连接的物联网设备进行控制时使用。
在代理设备和客户端设备之间建立了上述绑定关系之后,客户端设备即可以通过代理设备对代理设备连接的IOT生态中的物联网设备进行控制。
具体比如,客户端设备可以向代理设备获取可控设备信息,代理设备向客户端设备发送可控设备信息;该可控设备信息包含代理设备连接的至少一个物联网设备的信息;客户端设备根据上述可控设备信息,向代理设备发送控制指令;代理设备接收客户端设备根据可控设备信息发送的控制指令;该控制指令用于对至少一个物联网设备中的目标设备进行控制;代理设备将控制指令发送给目标设备。
然后,当用户不再需要使用该客户端设备,通过代理设备对代理设备连接的IOT生态中的物联网设备进行控制时,上述绑定关系依然存在于代理设备和客户端设备中,一方面会影响后续对物联网设备的控制的安全性,另一方面,绑定关系相关的信息会占用代理设备和客户端设备的存储资源。
对于上述问题,本申请实施例提供了一种设备解绑的方法,可以解除代理设备和客户端设备之间已建立的绑定关系。
请参考图2,其示出了本申请一个实施例提供的设备解绑方法的流程图,该方法可以由第一设备执行,该第一设备是代理设备和客户端设备中的一个;比如,该代理设备可以是图1所示的网络架构中的代理设备120,该客户端设备可以是图1所示的网络架构中的客户端设备130;该方法可以包括如下几个步骤:
步骤201,在代理设备和客户端设备之间的绑定关系满足解绑条件的情况下,删除第一设备中与绑定关系对应的绑定信息;绑定关系用于客户端设备通过代理设备,对代理设备连接的物联网设备进行控制。
在一种可能的实现方式中,在第一设备是代理设备的情况下,删除第一设备中与绑定关系对应的绑定信息,包括:
删除代理设备的第一群集中,与客户端设备对应的第一绑定设备信息。
在一种可能的实现方式中,第一绑定设备信息中包含以下信息中的至少一项:
客户端设备的标识信息;
客户端设备的协议版本信息;
客户端设备的可控设备列表;可控设备列表中包含代理设备连接的物联网设备中,客户端设备支持控制的物联网设备的设备信息;
可控设备列表的版本信息。
在一种可能的实现方式中,物联网设备的设备信息包括以下信息中的至少一项:
物联网设备的标识信息;
物联网设备的在线状态;在线状态包括在线或离线。
在一种可能的实现方式中,在第一设备是客户端设备的情况下,删除第一设备中与绑定关系对应的绑定信息,包括:
删除客户端设备的第二群集中,与代理设备对应的第一客户端绑定信息。
在一种可能的实现方式中,上述第一客户端绑定信息包括以下信息中的至少一种:
代理设备的标识信息;
绑定类型信息;绑定类型用于指示代理设备与客户端设备之间的绑定关系的绑定类型;绑定类型包括临时绑定或者长期绑定;
以及,访问类型信息;访问类型信息用于指示客户端设备对代理设备连接的物联网设备的访问类型;访问类型包括桥接访问或者代理访问。
在一种可能的实现方式中,该方法还包括:
删除客户端设备中存储的可控设备列表;可控设备列表中包含代理设备连接的物联网设备中,客户端设备支持控制的物联网设备的设备信息。
在一种可能的实现方式中,解绑条件包括以下条件中的任意一种:
在代理设备和客户端设备之间的绑定关系的绑定类型为长期绑定的情况下,接收到解除绑定关系的用户指令;
在代理设备和客户端设备之间的绑定关系的绑定类型为长期绑定的情况下,接收到第二设备发送的解除绑定消息;
在代理设备和客户端设备之间的绑定关系的绑定类型为临时绑定,且第一设备是客户端设备的情况下,接收到解除绑定关系的用户指令;
或者,在代理设备和客户端设备之间的绑定关系的绑定类型为临时绑定,且第一设备是客户端设备的情况下,检测到代理设备和客户端设备之间的安全连接丢失。
在一种可能的实现方式中,在解绑条件为代理设备和客户端设备之间的绑定关系的绑定类型为长期绑定,且接收到解除绑定关系的用户指令的情况下,该方法还包括:
向第二设备发送解除绑定消息;第二设备是代理设备和客户端设备中除了第一设备之外的另一设备;解除绑定消息用于指示删除与绑定关系对应的绑定信息。
综上所述,在本申请实施例中,在代理设备和客户端设备之间已建立有绑定关系的情况下,代理设备和客户端设备中的一个设备可以解除上述绑定关系,以删除该设备中与该绑定关系相关的绑定信息,从而达到提高设备控制的安全性,以及,节约设备的内存资源的效果。
在本申请上述图2所示的实施例中,第一设备可以是代理设备,也可以是客户端设备,并且,上述绑定关系的绑定类型可以是长期绑定,也可以是临时绑定。
其中,对于长期绑定的情况,上述绑定关系的发起端可以是代理设备,也可以是客户端设备。
比如,以上述绑定关系的绑定类型可以是长期绑定,且用户从代理设备侧发起解除绑定为例,请参考图3,其示出了本申请一个实施例提供的设备解绑方法的流程图,该方法可以由代理设备和客户端设备交互执行;比如,该代理设备可以是图1所示的网络架构中的代理设备120,该客户端设备可以是图1所示的网络架构中的客户端设备130;该方法可以包括如下几个步骤:
步骤301,在代理设备和客户端设备之间的绑定关系的绑定类型为长期绑定的情况下,代理设备接收到解除绑定关系的用户指令。
在本申请实施例中,在上述绑定关系是长期绑定的绑定关系的情况下,代理设备接收到解除该绑定关系的用户指令时,可以确定上述绑定关系满足解除条件。
步骤302,代理设备删除代理设备的第一群集中,与客户端设备对应的第一绑定设备信息。
在本申请实施例中,上述第一群集可以被称为IOT Agent Binding Cluster。
在一种可能的实现方式中,第一绑定设备信息中包含以下信息中的至少一项:
客户端设备的标识信息;
客户端设备的协议版本信息;
客户端设备的可控设备列表;可控设备列表中包含代理设备连接的物联网设备中,客户端设备支持控制的物联网设备的设备信息;
可控设备列表的版本信息。
其中,上述协议版本信息可以是客户端设备支持的物联网协议的版本号。
由于一个客户端设备可以能只支持对代理设备连接的物联网设备中的部分物联网设备进行控制,而不同的客户端设备可能支持控制不同类型的物联网设备,因此,在本申请实施例中,可以在每个客户端设备对应的绑定设备信息中,分别设置一个可控设备列表,以保存该客户端设备可以控制的物联网设备的设备信息。
在一种可能的实现方式中,物联网设备的设备信息包括以下信息中的至少一项:
物联网设备的标识信息;
物联网设备的在线状态;在线状态包括在线或离线。
其中,上述物联网设备的在线状态可以用于表示该物联网设备当前是否可以接受控制。
其中,上述第一群集包含的内容,可以参考上述表1至表4,此处不再赘述。
在本申请实施例中,代理设备删除代理设备的第一群集中,与客户端设备对应的第一绑定设备信息,可以是指删除IOT Agent Binding Cluster中,与客户端设备对应的绑定设备信息(bindingDeviceInfo)。
步骤303,代理设备向客户端设备发送解除绑定消息;客户端设备接收该解除绑定消息。
在本申请实施例中,该解除绑定消息可以用于指示客户端设备删除该客户端设备中与绑定关系对应的绑定信息。
其中,若将客户端设备视为第一设备,代理设备视为第二设备,则在代理设备和客户端设备之间的绑定关系的绑定类型为长期绑定的情况下,客户端设备接收到代理设备发送的解除绑定消息,可以确定上述绑定关系满足解除条件。
其中,代理设备向客户端设备发送解除绑定消息,可以被称为解除绑定关系通知。
步骤304,客户端设备删除该客户端设备的第二群集中,与代理设备对应的第一客户端绑定信息。
在一种可能的实现方式中,第二群集中包含以下信息中的至少一项:
客户端设备的厂商信息;
客户端设备的设备控制能力信息;
以及,客户端绑定信息列表;客户端绑定信息列表中包含已建立的绑定关系的客户端绑定信息。
其中,上述厂商信息可以是客户端设备的生产厂商的厂商标识。
上述客户端绑定信息列表中可以包含多个客户端绑定信息,每个客户端绑定信息可以对应一个客户端设备与其它设备(代理设备)之间已建立的绑定关系(用于以其它设备为代理,对其它设备连接的物联网设备进行控制)。
在一种可能的实现方式中,在设备控制能力信息包括客户端设备支持控制的物联网设备的设备类型的情况下,第二群集中包含以下信息中的至少一种:
第一支持信息;第一支持信息用于指示客户端设备是否支持控制全部类型的物联网设备;
以及,设备类型列表;设备类型列表中包含客户端设备支持控制的物联网设备的设备类型的类型标识信息。
其中,上述第一支持信息的值可以为bool值,当第一支持信息的值为真(True)时,表示客户端设备支持控制全部类型的物联网设备;当第一支持信息的值为假(False)时,表示客户端设备不支持控制全部类型的物联网设备。
上述设备类型列表中可以包含一项或者多项设备类型的标识,用于表示客户端设备支持对这些设备类型对应的物联网设备进行控制。
在一种可能的实现方式中,上述第一客户端绑定信息包括以下信息中的至少一种:
代理设备的标识信息;
绑定类型信息;绑定类型用于指示代理设备与客户端设备之间的绑定关系的绑定类型;绑定类型包括临时绑定或者长期绑定;
以及,访问类型信息;访问类型信息用于指示客户端设备对代理设备连接的物联网设备的访问类型;访问类型包括桥接访问或者代理访问。
其中,上述第二群集,以及第二群集中的各项信息可以参考上述表5至表7所示,此处不再赘述。
在本申请实施例中,客户端设备删除该客户端设备的第二群集中,与代理设备对应的第一客户端绑定信息时,可以将上述表5所示的IOT Client Cluster中,与代理设备对应的客户端绑定信息(clientBindingInfo)删除。
在一种可能的实现方式中,客户端设备还可以删除客户端设备中存储的可控设备列表;其中,该可控设备列表中包含代理设备连接的物联网设备中,客户端设备支持控制的物联网设备的设备信息。
在本申请实施例中,用户使用客户端设备,以代理设备为代理,对代理设备连接的物联网设备进行控制的过程中,可以先向代理设备获取可控设备列表,其中包含代理设备连接的物联网设备中,客户端设备支持控制的各个物联网设备的设备信息。
其中,上述各个物联网设备的设备信息也称为可控设备信息,可以包括物联网设备中的端点的信息。
比如,上述各个物联网设备的设备信息可以是一个设备信息列表,该设备信息列表包含的内容可以参考上述表8。
表8
标识 | 名称 | 类型 | 说明 |
0 | DeviceList | List[device_Info] | 设备信息列表 |
上述表8中的device_Info的结构体(struct)可以参考下述表9。
表9
上述表9中的端点信息(endpoint_Info)的结构体可以参考下述表10。
表10
上述表10中的群集信息(cluster_Info)的结构体可以参考下述表11。
表11
标识 | 名称 | 类型 | 说明 |
0 | clusterID | Uint16 | 设备类型(群集标识) |
1 | attribute | List[attribute_Info] | 属性集:设备的状态 |
2 | command | List[command_Info] | 方法集:启动设备行为 |
3 | event | List[event_Info] | 事件集:上报的事件 |
其中,上述表11中的方法集中包含对应设备的特定功能。
上述表11中的事件可以是物联网设备上报给其他设备(例如APP)的事件,例如门锁_门未关等等。
上述表11中的属性信息(attribute_Info)的结构体可以参考下述表12。
表12
标识 | 名称 | 类型 | 说明 |
0 | attributeID | Uint16 | 属性标识 |
1 | Value | 当前属性状态 |
上述表11中的方法信息(command_Info)的结构体可以参考下述表13。
表13
标识 | 名称 | 类型 | 说明 |
0 | commandID | Uint16 | 命令标识 |
上述表11中的事件信息(event_Info)的结构体可以参考下述表14。
表14
标识 | 名称 | 类型 | 说明 |
0 | eventID | Uint16 | 事件标识 |
在本申请实施例中,当客户端设备删除上述绑定关系时,可以将从代理设备获取到的各个物联网设备的设备信息一起删除。
综上所述,在本申请实施例中,在代理设备和客户端设备之间已建立有长期绑定的绑定关系的情况下,用户可以触发代理设备解除上述绑定关系,以删除该代理设备中与该绑定关系相关的绑定信息,并且,代理设备还可以通知物联网设备解除上述绑定关系,从而达到提高设备控制的安全性,以及,节约设备的内存资源的效果。
再比如,以上述绑定关系的绑定类型可以是长期绑定,且用户从客户端设备侧发起解除绑定为例,请参考图4,其示出了本申请一个实施例提供的设备解绑方法的流程图,该方法可以由代理设备和客户端设备交互执行;比如,该代理设备可以是图1所示的网络架构中的代理设备120,该客户端设备可以是图1所示的网络架构中的客户端设备130;该方法可以包括如下几个步骤:
步骤401,在代理设备和客户端设备之间的绑定关系的绑定类型为长期绑定的情况下,客户端设备接收到解除绑定关系的用户指令。
在本申请实施例中,在上述绑定关系是长期绑定的绑定关系的情况下,客户端设备接收到解除该绑定关系的用户指令时,可以确定上述绑定关系满足解除条件。
步骤402,客户端设备删除该客户端设备的第二群集中,与代理设备对应的第一客户端绑定信息。
在一种可能的实现方式中,第二群集中包含以下信息中的至少一项:
客户端设备的厂商信息;
客户端设备的设备控制能力信息;
以及,客户端绑定信息列表;客户端绑定信息列表中包含已建立的绑定关系的客户端绑定信息。
在一种可能的实现方式中,在设备控制能力信息包括客户端设备支持控制的物联网设备的设备类型的情况下,第二群集中包含以下信息中的至少一种:
第一支持信息;第一支持信息用于指示客户端设备是否支持控制全部类型的物联网设备;
以及,设备类型列表;设备类型列表中包含客户端设备支持控制的物联网设备的设备类型的类型标识信息。
在一种可能的实现方式中,上述第一客户端绑定信息包括以下信息中的至少一种:
代理设备的标识信息;
绑定类型信息;绑定类型用于指示代理设备与客户端设备之间的绑定关系的绑定类型;绑定类型包括临时绑定或者长期绑定;
以及,访问类型信息;访问类型信息用于指示客户端设备对代理设备连接的物联网设备的访问类型;访问类型包括桥接访问或者代理访问。
其中,上述第二群集,以及第二群集中的各项信息可以参考上述表5至表7所示,此处不再赘述。
在本申请实施例中,客户端设备删除该客户端设备的第二群集中,与代理设备对应的第一客户端绑定信息时,可以将上述表5所示的IOT Client Cluster中,与代理设备对应的客户端绑定信息(clientBindingInfo)删除。
在一种可能的实现方式中,客户端设备还可以删除客户端设备中存储的可控设备列表;其中,该可控设备列表中包含代理设备连接的物联网设备中,客户端设备支持控制的物联网设备的设备信息。
其中,该步骤402的执行过程可以参考上述图3所示实施例中的步骤304下的描述,此处不再赘述。
步骤403,客户端设备向代理设备发送解除绑定消息;代理设备接收该解除绑定消息。
在本申请实施例中,该解除绑定消息可以用于指示代理设备删除该代理设备中与绑定关系对应的绑定信息。
其中,若将代理设备视为第一设备,客户端设备视为第二设备,则在代理设备和客户端设备之间的绑定关系的绑定类型为长期绑定的情况下,代理设备接收到客户端设备发送的解除绑定消息,可以确定上述绑定关系满足解除条件。
其中,客户端设备向代理设备发送的解除绑定消息,可以被称为删除绑定关系请求。
步骤404,代理设备删除代理设备的第一群集中,与客户端设备对应的第一绑定设备信息。
在本申请实施例中,上述第一群集可以被称为IOT Agent Binding Cluster。
在一种可能的实现方式中,第一绑定设备信息中包含以下信息中的至少一项:
客户端设备的标识信息;
客户端设备的协议版本信息;
客户端设备的可控设备列表;可控设备列表中包含代理设备连接的物联网设备中,客户端设备支持控制的物联网设备的设备信息;
可控设备列表的版本信息。
在一种可能的实现方式中,物联网设备的设备信息包括以下信息中的至少一项:
物联网设备的标识信息;
物联网设备的在线状态;在线状态包括在线或离线。
其中,上述物联网设备的在线状态可以用于表示该物联网设备当前是否可以接受控制。
其中,上述第一群集包含的内容,可以参考上述表1至表4,此处不再赘述。
在本申请实施例中,代理设备删除代理设备的第一群集中,与客户端设备对应的第一绑定设备信息,可以是指删除IOT Agent Binding Cluster中,与客户端设备对应的绑定设备信息(bindingDeviceInfo)。
其中,该步骤404的执行过程可以参考上述图3所示实施例中的步骤302下的描述,此处不再赘述。
可选的,代理设备删除代理设备的第一群集中,与客户端设备对应的第一绑定设备信息 后,还可以向客户端设备返回结束绑定关系完成的通知。
综上所述,在本申请实施例中,在代理设备和客户端设备之间已建立有长期绑定的绑定关系的情况下,用户可以触发客户端设备解除上述绑定关系,以删除该客户端设备中与该绑定关系相关的绑定信息以及设备信息列表,并且,客户端设备还可以通知代理设备解除上述绑定关系,从而达到提高设备控制的安全性,以及,节约设备的内存资源的效果。
再比如,以上述绑定关系的绑定类型可以是短期绑定为例,请参考图5,其示出了本申请一个实施例提供的设备解绑方法的流程图,该方法可以由客户端设备执行;比如,该客户端设备可以是图1所示的网络架构中的客户端设备130;该方法可以包括如下几个步骤:
步骤501,在代理设备和客户端设备之间的绑定关系的绑定类型为临时绑定的情况下,客户端设备检测到绑定关系满足解除条件。
在本申请实施例中,当在代理设备和客户端设备之间的绑定关系的绑定类型为临时绑定的情况下,代理设备中可以不存在绑定关系对应的绑定信息,相应的,只需要客户端设备解除绑定关系即可。
其中,上述解除条件可以为:在代理设备和客户端设备之间的绑定关系的绑定类型为临时绑定,且第一设备是客户端设备的情况下,接收到解除绑定关系的用户指令。
或者,在代理设备和客户端设备之间的绑定关系的绑定类型为临时绑定,且第一设备是客户端设备的情况下,检测到代理设备和客户端设备之间的安全连接丢失。
其中,在代理设备和客户端设备之间的绑定关系的绑定类型为临时绑定的情况下,客户端设备接收到用户发起的解除绑定关系的用户指令时(主动解除),或者,客户端设备检测到代理设备和客户端设备之间的安全连接丢失(被动解除)时,客户端设备可以确定上述绑定关系满足解除条件。
步骤502,客户端设备删除该客户端设备的第二群集中,与代理设备对应的第一客户端绑定信息。
在一种可能的实现方式中,第二群集中包含以下信息中的至少一项:
客户端设备的厂商信息;
客户端设备的设备控制能力信息;
以及,客户端绑定信息列表;客户端绑定信息列表中包含已建立的绑定关系的客户端绑定信息。
在一种可能的实现方式中,在设备控制能力信息包括客户端设备支持控制的物联网设备的设备类型的情况下,第二群集中包含以下信息中的至少一种:
第一支持信息;第一支持信息用于指示客户端设备是否支持控制全部类型的物联网设备;
以及,设备类型列表;设备类型列表中包含客户端设备支持控制的物联网设备的设备类型的类型标识信息。
在一种可能的实现方式中,上述第一客户端绑定信息包括以下信息中的至少一种:
代理设备的标识信息;
绑定类型信息;绑定类型用于指示代理设备与客户端设备之间的绑定关系的绑定类型;绑定类型包括临时绑定或者长期绑定;
以及,访问类型信息;访问类型信息用于指示客户端设备对代理设备连接的物联网设备的访问类型;访问类型包括桥接访问或者代理访问。
其中,上述第二群集,以及第二群集中的各项信息可以参考上述表5至表7所示,此处不再赘述。
在本申请实施例中,客户端设备删除该客户端设备的第二群集中,与代理设备对应的第一客户端绑定信息时,可以将上述表5所示的IOT Client Cluster中,与代理设备对应的客户端绑定信息(clientBindingInfo)删除。
在一种可能的实现方式中,客户端设备还可以删除客户端设备中存储的可控设备列表;其中,该可控设备列表中包含代理设备连接的物联网设备中,客户端设备支持控制的物联网设备的设备信息。
其中,该步骤502的执行过程可以参考上述图3所示实施例中的步骤304下的描述,此处不再赘述。
可选的,在上述解除条件为:在代理设备和客户端设备之间的绑定关系的绑定类型为临时绑定,客户端设备接收到解除绑定关系的用户指令时,客户端设备解除上述绑定关系之后,还可以结束与代理设备之间的连接。
综上所述,在本申请实施例中,在代理设备和客户端设备之间已建立有临时绑定的绑定关系的情况下,用户可以触发客户端设备解除上述绑定关系,或者,客户端设备可以在检测到与代理设备之间的安全连接丢失时解除上述绑定关系,从而达到提高设备控制的安全性,以及,节约设备的内存资源的效果。
在本申请实施例涉及的方案中,上述解除绑定关系分为长期绑定关系的解除和临时绑定关系的解除。长期绑定关系可以分为IOT Client主动发起的绑定关系解除和IOT Agent主动发起的绑定关系解除。其中,由于临时绑定并不记录在IOT Agent上的IOT Agent Binding cluster中,因此临时绑定的解除分为用户主动发起的在IOT Client上解除和IOT Client检测到连接丢失后的被动解除。本申请上述实施例涉及的绑定关系解除可以包括以下步骤:
一、用户从客户端设备侧解除长期绑定:
S10,用户在IOT Client发起解除IOT Client和IOT Agent之间的长期绑定关系。
S11,IOT Client删除IOT Client中对应上述长期绑定关系的绑定信息以及设备信息列表等。
S12,IOT Client通知IOT Agent删除IOT Agent Binding cluster中对应上述长期绑定关系的绑定信息。
S13,IOT Agent删除上述长期绑定关系对应的绑定信息。
S14,IOT Agent通知IOT Client,上述长期绑定关系已删除。
二、用户从代理设备侧解除长期绑定:
S20,用户在IOT Agent发起解除IOT Client和IOT Agent之间的长期绑定关系。
S21,IOT Agent删除IOT Agent Binding cluster中对应上述长期绑定关系的绑定信息。
S22,IOT Agent通知IOT Client删除上述长期绑定关系。
S23,IOT Agent删除IOT Client中对应上述长期绑定关系的绑定信息以及设备信息列表等。
三、用户从客户端设备侧解除临时绑定:
S30,当用户主动发起结束绑定关系时,IOT Client删除IOT Client中对应上述临时绑定的绑定信息以及设备信息列表等。
S31,IOT Client发起结束连接。
四、客户端设备自行解除临时绑定:
S40,IOT Client检测到安全连接丢失。
S41,IOT Client自动删除IOT Client中对应上述临时绑定的绑定信息以及设备信息列表等。
请参考图6,其示出了本申请一个实施例提供的设备解绑装置的框图。该设备解绑装置600具有实现上述图2至图5任一所示的方法中,由代理设备或者客户端设备执行的功能。如图7所示,该装置可以包括:
删除模块601,用于在代理设备和客户端设备之间的绑定关系满足解绑条件的情况下, 删除第一设备中与所述绑定关系对应的绑定信息;所述绑定关系用于所述客户端设备通过所述代理设备,对所述代理设备连接的物联网设备进行控制;所述第一设备是所述代理设备和所述客户端设备中的一个。
在一种可能的实现方式中,所述删除模块601,用于在所述第一设备是所述代理设备的情况下,删除所述代理设备的第一群集中,与所述客户端设备对应的第一绑定设备信息。
在一种可能的实现方式中,所述第一绑定设备信息中包含以下信息中的至少一项:
所述客户端设备的标识信息;
所述客户端设备的协议版本信息;
所述客户端设备的可控设备列表;所述可控设备列表中包含所述代理设备连接的物联网设备中,所述客户端设备支持控制的物联网设备的设备信息;
可控设备列表的版本信息。
在一种可能的实现方式中,所述物联网设备的设备信息包括以下信息中的至少一项:
所述物联网设备的标识信息;
所述物联网设备的在线状态;所述在线状态包括在线或离线。
在一种可能的实现方式中,所述删除模块601,用于在所述第一设备是所述客户端设备的情况下,删除所述客户端设备的第二群集中,与所述代理设备对应的第一客户端绑定信息。
在一种可能的实现方式中,所述第一客户端绑定信息包括以下信息中的至少一种:
所述代理设备的标识信息;
绑定类型信息;所述绑定类型用于指示所述代理设备与所述客户端设备之间的绑定关系的绑定类型;所述绑定类型包括临时绑定或者长期绑定;
以及,访问类型信息;所述访问类型信息用于指示所述客户端设备对所述代理设备连接的物联网设备的访问类型;所述访问类型包括桥接访问或者代理访问。
在一种可能的实现方式中,所述删除模块601,还用于删除所述客户端设备中存储的可控设备列表;所述可控设备列表中包含所述代理设备连接的物联网设备中,所述客户端设备支持控制的物联网设备的设备信息。
在一种可能的实现方式中,所述解绑条件包括:在所述代理设备和所述客户端设备之间的绑定关系的绑定类型为长期绑定的情况下,接收到解除所述绑定关系的用户指令。
在一种可能的实现方式中,所述解绑条件包括:在所述代理设备和所述客户端设备之间的绑定关系的绑定类型为长期绑定的情况下,接收到第二设备发送的解除绑定消息。
在一种可能的实现方式中,所述解绑条件包括:在所述代理设备和所述客户端设备之间的绑定关系的绑定类型为临时绑定,且所述第一设备是所述客户端设备的情况下,接收到解除所述绑定关系的用户指令。
在一种可能的实现方式中,所述解绑条件包括:在所述代理设备和所述客户端设备之间的绑定关系的绑定类型为临时绑定,且所述第一设备是所述客户端设备的情况下,检测到所述代理设备和所述客户端设备之间的安全连接丢失。
在一种可能的实现方式中,所述装置还包括:
发送模块,用于在所述解绑条件为所述代理设备和所述客户端设备之间的绑定关系的绑定类型为长期绑定,且接收到解除所述绑定关系的用户指令的情况下,向第二设备发送解除绑定消息;所述第二设备是所述代理设备和所述客户端设备中除了所述第一设备之外的另一设备;所述解除绑定消息用于指示删除与所述绑定关系对应的绑定信息。
请参考图7,其示出了本申请一个实施例提供的计算机设备700的结构示意图。该计算机设备700可以包括:处理器701、接收器702、发射器703、存储器704和总线705。
处理器701包括一个或者一个以上处理核心,处理器701通过运行软件程序以及模块,从而执行各种功能应用以及信息处理。
接收器702和发射器703可以实现为一个通信组件,该通信组件可以是一块通信芯片。该通信芯片也可以称为收发器。
存储器704通过总线705与处理器701相连。
存储器704可用于存储计算机程序,处理器701用于执行该计算机程序,以实现上述方法实施例中的各个步骤。
此外,存储器704可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,易失性或非易失性存储设备包括但不限于:磁盘或光盘,电可擦除可编程只读存储器,可擦除可编程只读存储器,静态随时存取存储器,只读存储器,磁存储器,快闪存储器,可编程只读存储器。
在一个示例性的方案中,当计算机设备700实现为上述第一设备时,所述收处理器,用于在代理设备和客户端设备之间的绑定关系满足解绑条件的情况下,删除第一设备中与所述绑定关系对应的绑定信息;所述绑定关系用于所述客户端设备通过所述代理设备,对所述代理设备连接的物联网设备进行控制;所述第一设备是代理设备和客户端设备中的一个。
其中,上述计算机设备700中的处理器701和/或收发器执行的过程可以参考上述图2至图5任一所示的方法中,由代理设备或者客户端设备执行的各个步骤。
本申请实施例还提供了一种计算机可读存储介质,所述存储介质中存储有计算机程序,所述计算机程序由处理器加载并执行以实现上述图2至图5任一所示的方法中,由代理设备或者客户端设备执行的全部或者部分步骤。
本申请还提供了一种芯片,该芯片用于在计算机设备中运行,以使得计算机设备执行上述图2至图5任一所示的方法中,由代理设备或者客户端设备执行的全部或者部分步骤。
本申请还提供了一种计算机程序产品,该计算机程序产品或计算机程序包括计算机指令,该计算机指令存储在计算机可读存储介质中。计算机设备的处理器从计算机可读存储介质读取该计算机指令,处理器执行该计算机指令,使得计算机设备执行上述图2至图5任一所示的方法中,由代理设备或者客户端设备执行的全部或者部分步骤。
本申请还提供了一种计算机程序,该计算机程序由计算机设备的处理器执行,以实现上述图2至图5任一所示的方法中,由代理设备或者客户端设备执行的全部或者部分步骤。
本领域技术人员应该可以意识到,在上述一个或多个示例中,本申请实施例所描述的功能可以用硬件、软件、固件或它们的任意组合来实现。当使用软件实现时,可以将这些功能存储在计算机可读介质中或者作为计算机可读介质上的一个或多个指令或代码进行传输。计算机可读介质包括计算机存储介质和通信介质,其中通信介质包括便于从一个地方向另一个地方传送计算机程序的任何介质。存储介质可以是通用或专用计算机能够存取的任何可用介质。
以上所述仅为本申请的示例性实施例,并不用以限制本申请,凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包括在本申请的保护范围之内。
Claims (29)
- 一种设备解绑方法,其特征在于,所述方法由第一设备执行,所述第一设备是代理设备和客户端设备中的一个;所述方法包括:在所述代理设备和所述客户端设备之间的绑定关系满足解绑条件的情况下,删除所述第一设备中与所述绑定关系对应的绑定信息;所述绑定关系用于所述客户端设备通过所述代理设备,对所述代理设备连接的物联网设备进行控制。
- 根据权利要求1所述的方法,其特征在于,在所述第一设备是所述代理设备的情况下,所述删除所述第一设备中与所述绑定关系对应的绑定信息,包括:删除所述代理设备的第一群集中,与所述客户端设备对应的第一绑定设备信息。
- 根据权利要求2所述的方法,其特征在于,所述第一绑定设备信息中包含以下信息中的至少一项:所述客户端设备的标识信息;所述客户端设备的协议版本信息;所述客户端设备的可控设备列表;所述可控设备列表中包含所述代理设备连接的物联网设备中,所述客户端设备支持控制的物联网设备的设备信息;可控设备列表的版本信息。
- 根据权利要求3所述的方法,其特征在于,所述物联网设备的设备信息包括以下信息中的至少一项:所述物联网设备的标识信息;所述物联网设备的在线状态;所述在线状态包括在线或离线。
- 根据权利要求1所述的方法,其特征在于,在所述第一设备是所述客户端设备的情况下,所述删除所述第一设备中与所述绑定关系对应的绑定信息,包括:删除所述客户端设备的第二群集中,与所述代理设备对应的第一客户端绑定信息。
- 根据权利要求5所述的方法,其特征在于,所述第一客户端绑定信息包括以下信息中的至少一种:所述代理设备的标识信息;绑定类型信息;所述绑定类型用于指示所述代理设备与所述客户端设备之间的绑定关系的绑定类型;所述绑定类型包括临时绑定或者长期绑定;以及,访问类型信息;所述访问类型信息用于指示所述客户端设备对所述代理设备连接的物联网设备的访问类型;所述访问类型包括桥接访问或者代理访问。
- 根据权利要求5或6所述的方法,其特征在于,所述方法还包括:删除所述客户端设备中存储的可控设备列表;所述可控设备列表中包含所述代理设备连接的物联网设备中,所述客户端设备支持控制的物联网设备的设备信息。
- 根据权利要求1至7任一所述的方法,其特征在于,所述解绑条件包括:在所述代理设备和所述客户端设备之间的绑定关系的绑定类型为长期绑定的情况下,接收到解除所述绑定关系的用户指令。
- 根据权利要求1至7任一所述的方法,其特征在于,所述解绑条件包括:在所述代理设备和所述客户端设备之间的绑定关系的绑定类型为长期绑定的情况下,接收到第二设备发送的解除绑定消息。
- 根据权利要求1至7任一所述的方法,其特征在于,所述解绑条件包括:在所述代理设备和所述客户端设备之间的绑定关系的绑定类型为临时绑定,且所述第一设备是所述客户端设备的情况下,接收到解除所述绑定关系的用户指令。
- 根据权利要求1至7任一所述的方法,其特征在于,所述解绑条件包括:在所述代理设备和所述客户端设备之间的绑定关系的绑定类型为临时绑定,且所述第一设备是所述客户端设备的情况下,检测到所述代理设备和所述客户端设备之间的安全连接丢失。
- 根据权利要求11所述的方法,其特征在于,在所述解绑条件为所述代理设备和所述客户端设备之间的绑定关系的绑定类型为长期绑定,且接收到解除所述绑定关系的用户指令的情况下,所述方法还包括:向第二设备发送解除绑定消息;所述第二设备是所述代理设备和所述客户端设备中除了所述第一设备之外的另一设备;所述解除绑定消息用于指示删除与所述绑定关系对应的绑定信息。
- 一种设备解绑装置,其特征在于,所述装置包括:删除模块,用于在代理设备和客户端设备之间的绑定关系满足解绑条件的情况下,删除第一设备中与所述绑定关系对应的绑定信息;所述绑定关系用于所述客户端设备通过所述代理设备,对所述代理设备连接的物联网设备进行控制;所述第一设备是所述代理设备和所述客户端设备中的一个。
- 根据权利要求13所述的装置,其特征在于,所述删除模块,用于在所述第一设备是所述代理设备的情况下,删除所述代理设备的第一群集中,与所述客户端设备对应的第一绑定设备信息。
- 根据权利要求14所述的装置,其特征在于,所述第一绑定设备信息中包含以下信息中的至少一项:所述客户端设备的标识信息;所述客户端设备的协议版本信息;所述客户端设备的可控设备列表;所述可控设备列表中包含所述代理设备连接的物联网设备中,所述客户端设备支持控制的物联网设备的设备信息;可控设备列表的版本信息。
- 根据权利要求15所述的装置,其特征在于,所述物联网设备的设备信息包括以下信息中的至少一项:所述物联网设备的标识信息;所述物联网设备的在线状态;所述在线状态包括在线或离线。
- 根据权利要求13所述的装置,其特征在于,所述删除模块,用于在所述第一设备是所述客户端设备的情况下,删除所述客户端设备的第二群集中,与所述代理设备对应的第一客户端绑定信息。
- 根据权利要求17所述的装置,其特征在于,所述第一客户端绑定信息包括以下信息中的至少一种:所述代理设备的标识信息;绑定类型信息;所述绑定类型用于指示所述代理设备与所述客户端设备之间的绑定关系的绑定类型;所述绑定类型包括临时绑定或者长期绑定;以及,访问类型信息;所述访问类型信息用于指示所述客户端设备对所述代理设备连接的物联网设备的访问类型;所述访问类型包括桥接访问或者代理访问。
- 根据权利要求17或18所述的装置,其特征在于,所述删除模块,还用于删除所述客户端设备中存储的可控设备列表;所述可控设备列表中包含所述代理设备连接的物联网设备中,所述客户端设备支持控制的物联网设备的设备信息。
- 根据权利要求13至19任一所述的装置,其特征在于,所述解绑条件包括:在所述代理设备和所述客户端设备之间的绑定关系的绑定类型为长期绑定的情况下,接收到解除所述绑定关系的用户指令。
- 根据权利要求13至19任一所述的装置,其特征在于,所述解绑条件包括:在所述代理设备和所述客户端设备之间的绑定关系的绑定类型为长期绑定的情况下,接收到第二设备发送的解除绑定消息。
- 根据权利要求13至19任一所述的装置,其特征在于,所述解绑条件包括:在所述代理设备和所述客户端设备之间的绑定关系的绑定类型为临时绑定,且所述第一设备是所述客户端设备的情况下,接收到解除所述绑定关系的用户指令。
- 根据权利要求13至19任一所述的装置,其特征在于,所述解绑条件包括:在所述代理设备和所述客户端设备之间的绑定关系的绑定类型为临时绑定,且所述第一设备是所述客户端设备的情况下,检测到所述代理设备和所述客户端设备之间的安全连接丢失。
- 根据权利要求23所述的装置,其特征在于,所述装置还包括:发送模块,用于在所述解绑条件为所述代理设备和所述客户端设备之间的绑定关系的绑定类型为长期绑定,且接收到解除所述绑定关系的用户指令的情况下,向第二设备发送解除绑定消息;所述第二设备是所述代理设备和所述客户端设备中除了所述第一设备之外的另一设备;所述解除绑定消息用于指示删除与所述绑定关系对应的绑定信息。
- 一种计算机设备,其特征在于,所述计算机设备包括处理器、存储器和收发器;所述存储器中存储有计算机程序,所述处理器执行所述计算机程序,以使得所述计算机设备实现如上述权利要求1至12任一所述的设备解绑方法。
- 一种计算机可读存储介质,其特征在于,所述存储介质中存储有计算机程序,所述计算机程序用于被处理器执行,以实现如权利要求1至12任一所述的设备解绑方法。
- 一种芯片,其特征在于,所述芯片用于在计算机设备中运行,以使得所述计算机设备执行如权利要求1至12任一所述的设备解绑方法。
- 一种计算机程序产品,其特征在于,所述计算机程序产品包括计算机指令,所述计算 机指令存储在计算机可读存储介质中;计算机设备的处理器从所述计算机可读存储介质读取所述计算机指令,并执行所述计算机指令,使得所述计算机设备执行如权利要求1至12任一所述的设备解绑方法。
- 一种计算机程序,其特征在于,所述计算机程序由计算机设备的处理器执行,以实现如权利要求1至12任一所述的设备解绑方法。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2022/112256 WO2024031680A1 (zh) | 2022-08-12 | 2022-08-12 | 设备解绑方法、装置、设备、存储介质及程序产品 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2022/112256 WO2024031680A1 (zh) | 2022-08-12 | 2022-08-12 | 设备解绑方法、装置、设备、存储介质及程序产品 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024031680A1 true WO2024031680A1 (zh) | 2024-02-15 |
Family
ID=89850459
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/112256 WO2024031680A1 (zh) | 2022-08-12 | 2022-08-12 | 设备解绑方法、装置、设备、存储介质及程序产品 |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2024031680A1 (zh) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104468837A (zh) * | 2014-12-29 | 2015-03-25 | 小米科技有限责任公司 | 智能设备的绑定方法和装置 |
CN107645548A (zh) * | 2017-09-13 | 2018-01-30 | 广东乐心医疗电子股份有限公司 | 一种数据的处理方法、设备服务器以及公用设备 |
CN107801177A (zh) * | 2017-09-29 | 2018-03-13 | 成都心吉康科技有限公司 | 解除绑定、绑定可穿戴健康设备的系统和方法 |
WO2021082129A1 (zh) * | 2019-10-31 | 2021-05-06 | 广东美的制冷设备有限公司 | 终端的控制方法、装置、终端、空调器的控制方法及装置 |
CN113852522A (zh) * | 2021-06-01 | 2021-12-28 | 天翼智慧家庭科技有限公司 | 一种基于多平台的摄像头绑定和解绑方法 |
WO2022002173A1 (zh) * | 2020-07-01 | 2022-01-06 | 青岛易来智能科技股份有限公司 | 一种智能设备入网方法、装置及智能设备控制系统、方法 |
CN114143161A (zh) * | 2021-11-25 | 2022-03-04 | 杭州萤石软件有限公司 | 设备管理方法、装置、系统及电子设备 |
CN114357428A (zh) * | 2021-12-23 | 2022-04-15 | 杭州华橙软件技术有限公司 | 一种物联网设备的解绑方法及相关装置 |
-
2022
- 2022-08-12 WO PCT/CN2022/112256 patent/WO2024031680A1/zh unknown
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104468837A (zh) * | 2014-12-29 | 2015-03-25 | 小米科技有限责任公司 | 智能设备的绑定方法和装置 |
CN107645548A (zh) * | 2017-09-13 | 2018-01-30 | 广东乐心医疗电子股份有限公司 | 一种数据的处理方法、设备服务器以及公用设备 |
CN107801177A (zh) * | 2017-09-29 | 2018-03-13 | 成都心吉康科技有限公司 | 解除绑定、绑定可穿戴健康设备的系统和方法 |
WO2021082129A1 (zh) * | 2019-10-31 | 2021-05-06 | 广东美的制冷设备有限公司 | 终端的控制方法、装置、终端、空调器的控制方法及装置 |
WO2022002173A1 (zh) * | 2020-07-01 | 2022-01-06 | 青岛易来智能科技股份有限公司 | 一种智能设备入网方法、装置及智能设备控制系统、方法 |
CN113852522A (zh) * | 2021-06-01 | 2021-12-28 | 天翼智慧家庭科技有限公司 | 一种基于多平台的摄像头绑定和解绑方法 |
CN114143161A (zh) * | 2021-11-25 | 2022-03-04 | 杭州萤石软件有限公司 | 设备管理方法、装置、系统及电子设备 |
CN114357428A (zh) * | 2021-12-23 | 2022-04-15 | 杭州华橙软件技术有限公司 | 一种物联网设备的解绑方法及相关装置 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10320932B2 (en) | Conveying state changes using connectionless messaging and a store-and-forward cache | |
JP6751094B2 (ja) | 無線通信をサポートする方法、機器およびシステム | |
KR101986922B1 (ko) | 사물 인터넷 (iot) 디바이스들에 대한 연결성 모듈 | |
EP3361707B1 (en) | Method and apparatus for controlling and managing a field device using an industry internet operating system | |
US9420044B2 (en) | Leveraging system signaling service advertisements for application-layer discovery and connection management in an internet of things (IoT) environment | |
CN105471686B (zh) | 终端控制方法、装置及系统 | |
CN103312760B (zh) | 实现终端设备即插即用管理的能力开放平台、方法及网关 | |
EP3005822B1 (en) | Mac layer transport for wi-fi direct services application service platform without internet protocol | |
CN103179027B (zh) | 一种实现电器设备兼容的方法和系统、通用外设接入网关 | |
US20180063879A1 (en) | Apparatus and method for interoperation between internet-of-things devices | |
WO2016169231A1 (zh) | 一种基于蓝牙组建稳态微微网的方法及其系统 | |
CN102752215B (zh) | 一种vdp请求报文的处理方法和边缘交换机 | |
US20230045914A1 (en) | Method and apparatus for controlling device in internet of things, and gateway device and storage medium | |
WO2024031680A1 (zh) | 设备解绑方法、装置、设备、存储介质及程序产品 | |
WO2024031682A1 (zh) | 设备控制方法、装置、设备、存储介质及程序产品 | |
EP2160865B1 (en) | Method and apparatus for managing resources of a universal plug and play device based on a connection status of a control point | |
WO2024031681A1 (zh) | 设备绑定方法、装置、设备、存储介质及程序产品 | |
WO2023108653A1 (zh) | 订阅权限信息处理方法、装置、计算机设备及存储介质 | |
CN102904978A (zh) | 泛在网络内泛在设备实现通用即插即用的方法 | |
WO2023092504A1 (zh) | 订阅控制方法、装置、计算机设备及存储介质 | |
WO2024103374A1 (zh) | 用于代理订阅的处理方法、装置、计算机设备及存储介质 | |
WO2023184559A1 (zh) | 设备共享方法、装置、设备、存储介质及程序产品 | |
WO2024011634A1 (zh) | 订阅消息处理方法、装置、设备、存储介质及程序产品 | |
WO2024152326A1 (zh) | 确定设备连接状态的方法、客户端设备和服务端设备 | |
WO2023216035A1 (zh) | 安全域管理方法、装置、设备、存储介质及程序产品 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22954635 Country of ref document: EP Kind code of ref document: A1 |