Network distribution method of Mesh network, server, Mesh device and storage medium

文档序号:1893939 发布日期:2021-11-26 浏览:23次 中文

阅读说明:本技术 Mesh网络的配网方法、服务器、Mesh设备及存储介质 (Network distribution method of Mesh network, server, Mesh device and storage medium ) 是由 陈小平 陈荣锦 于 2020-05-07 设计创作,主要内容包括:本申请公开了一种Mesh网络的配网方法、服务器、Mesh设备及存储介质,所述Mesh网络的配网方法用于第一服务器,所述第一服务器能够与所述Mesh网络中的第一终端通信;所述配网方法包括:从所述第一终端获取第二终端的终端信息,所述第二终端未接入所述Mesh网络;根据所述终端信息确定所述第二终端对应的第二服务器;根据所述终端信息向所述第二服务器发送用于验证所述第二终端的验证请求,并从所述第二服务器获取所述第二终端的验证结果;根据所述验证结果通知所述第一终端将所述Mesh网络的联网信息发送给所述第二终端,以使所述第二终端根据所述联网信息接入所述Mesh网络并与所述第二服务器建立通信连接。该方法能够实现在不同的IOT平台下设备之间的配网。(The application discloses a network distribution method of a Mesh network, a server, a Mesh device and a storage medium, wherein the network distribution method of the Mesh network is used for a first server, and the first server can be communicated with a first terminal in the Mesh network; the network distribution method comprises the following steps: acquiring terminal information of a second terminal from the first terminal, wherein the second terminal does not access the Mesh network; determining a second server corresponding to the second terminal according to the terminal information; sending a verification request for verifying the second terminal to the second server according to the terminal information, and acquiring a verification result of the second terminal from the second server; and informing the first terminal to send the networking information of the Mesh network to the second terminal according to the verification result so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server. The method can realize the distribution of the network among the devices under different IOT platforms.)

1. The network distribution method of the Mesh network is characterized by being used for a first server, wherein the first server can be communicated with a first terminal in the Mesh network; the network distribution method comprises the following steps:

acquiring terminal information of a second terminal from the first terminal, wherein the second terminal does not access the Mesh network;

determining a second server corresponding to the second terminal according to the terminal information;

sending a verification request for verifying the second terminal to the second server according to the terminal information, and acquiring a verification result of the second terminal from the second server;

and informing the first terminal to send the networking information of the Mesh network to the second terminal according to the verification result so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server.

2. The Mesh network distribution method according to claim 1, wherein the terminal information of the second terminal includes preset server information;

the determining the second server corresponding to the second terminal according to the terminal information includes:

and determining a second server corresponding to the second terminal according to the server information.

3. The Mesh network distribution method according to claim 2, wherein the terminal information of the second terminal includes encrypted information of the second terminal, and the encrypted information is obtained by the second terminal encrypting the terminal characteristic information of the second terminal according to the public key of the second server;

the sending, to the second server according to the terminal information, an authentication request for authenticating the second terminal, and obtaining an authentication result of the second terminal from the second server includes:

and sending the encrypted information of the second terminal to the second server so that the second server decrypts the encrypted information according to a private key, and verifies the second terminal according to the terminal characteristic information obtained by decryption to obtain a verification result of the second terminal.

4. The Mesh network distribution method according to claim 1, wherein the notifying the first terminal to send the networking information of the Mesh network to the second terminal according to the verification result comprises:

and sending the verification result to the first terminal so that the first terminal judges whether the second terminal is a legal terminal according to the verification result, and if the second terminal is the legal terminal, the first terminal sends the networking information of the Mesh network to the second terminal.

5. The Mesh network distribution method according to claim 1, wherein the notifying the first terminal to send the networking information of the Mesh network to the second terminal according to the verification result comprises:

judging whether the second terminal is a legal terminal or not according to the verification result;

and if the second terminal is a legal terminal, informing the first terminal to send the networking information of the Mesh network to the second terminal.

6. The Mesh network distribution method according to any one of claims 1 to 5, further comprising:

acquiring a user information request from the second server, wherein the user information request comprises user characteristic information which is sent to the second terminal by the first terminal and is sent to the second server by the second terminal;

and determining the user information bound by the first terminal in the first server according to the user characteristic information, and sending the user information to the second server so that the second server binds the user information with the second terminal.

7. The network distribution method of the Mesh network is characterized by being used for a first terminal, wherein the first terminal is accessed into the Mesh network and can communicate with a first server corresponding to the first terminal; the network distribution method comprises the following steps:

acquiring terminal information of a second terminal, wherein the second terminal does not access the Mesh network;

sending the terminal information to the first server, so that the first server determines a second server corresponding to the second terminal according to the terminal information and sends a verification request for verifying the second terminal to the second server;

and receiving a verification result sent by the first server, and sending networking information of the Mesh network to the second terminal according to the verification result so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server.

8. The Mesh network distribution method according to claim 7, further comprising:

acquiring a secret key sent by the second terminal;

the sending the networking information of the Mesh network to the second terminal includes:

and encrypting the networking information of the Mesh network according to the secret key, and sending the encrypted networking information to the second terminal.

9. The Mesh network distribution method according to claim 7, further comprising:

and if the second terminal is judged to be legal according to the verification result, sending the user characteristic information of the first equipment to the second terminal, and sending the user characteristic information to the second server by the second terminal, so that the second server obtains the user information bound by the first terminal in the first server from the first server according to the user characteristic information.

10. A server, comprising a memory and a processor;

the memory is used for storing a computer program;

the processor is configured to execute the computer program and to implement the network distribution method of the Mesh network according to any one of claims 1 to 6 when executing the computer program.

11. A Mesh device, characterized in that the Mesh device comprises a memory and a processor;

the memory is used for storing a computer program;

the processor, configured to execute the computer program and when executing the computer program, implement the network distribution method of the Mesh network according to any one of claims 7 to 9.

12. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, causes the processor to implement:

the network distribution method of the Mesh network according to any one of claims 1 to 6; and/or

Network distribution method implementing a Mesh network according to any of claims 7 to 9.

Technical Field

The present application relates to the field of wireless communication technologies, and in particular, to a network distribution method for a Mesh network, a server, a Mesh device, and a storage medium.

Background

Wireless Mesh Networks (also called Wireless Mesh Networks, etc.) are a new network structure based on multi-hop routing and peer-to-peer network technologies, and are increasingly widely used as a Wireless interconnected communication technology. In a wireless Mesh network, if the devices are devices under the same IOT platform, a user can perform networking on devices to be connected to a network through the networked devices, but the devices under different IOT platforms cannot support direct network distribution, for example, a networked device and a device to be connected to the network are under different IOT platforms, the device to be connected to the network cannot perform networking through the networked devices.

Therefore, how to complete the distribution network among the devices under different IOT platforms is an urgent problem to be solved at present.

Disclosure of Invention

The application provides a Mesh network distribution method, a server, a Mesh device and a storage medium, so as to realize distribution of networks among devices under different IOT platforms.

In a first aspect, the present application provides a network distribution method for a Mesh network, which is used for a first server, where the first server can communicate with a first terminal in the Mesh network; the network distribution method comprises the following steps:

acquiring terminal information of a second terminal from the first terminal, wherein the second terminal does not access the Mesh network;

determining a second server corresponding to the second terminal according to the terminal information;

sending a verification request for verifying the second terminal to the second server according to the terminal information, and acquiring a verification result of the second terminal from the second server;

and informing the first terminal to send the networking information of the Mesh network to the second terminal according to the verification result so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server.

In a second aspect, the present application further provides a network distribution method for a Mesh network, where the method is used for a first terminal, and the first terminal is accessed into the Mesh network and can communicate with a first server corresponding to the first terminal; the network distribution method comprises the following steps:

acquiring terminal information of a second terminal, wherein the second terminal does not access the Mesh network;

sending the terminal information to the first server, so that the first server determines a second server corresponding to the second terminal according to the terminal information and sends a verification request for verifying the second terminal to the second server;

and receiving a verification result sent by the first server, and sending networking information of the Mesh network to the second terminal according to the verification result so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server.

In a third aspect, the present application further provides a server comprising a memory and a processor; the memory is used for storing a computer program; the processor is configured to execute the computer program and, when executing the computer program, implement the distribution network method applied to the Mesh network of the first server as described above.

In a fourth aspect, the present application further provides a Mesh device, where the Mesh device includes a memory and a processor; the memory is used for storing a computer program; the processor is configured to execute the computer program and implement the network configuration method applied to the Mesh network of the first terminal when the computer program is executed.

In a fifth aspect, the present application further provides a computer readable storage medium storing a computer program, which when executed by a processor, causes the processor to implement the network distribution method applied to the Mesh network of the first server and/or the network distribution method applied to the Mesh network of the first terminal as described above.

The application discloses a Mesh network distribution method, a server, a Mesh device and a storage medium, wherein the Mesh network distribution method is applied to a first server, the first server can communicate with a first terminal in the Mesh network, terminal information of a second terminal is obtained from the first terminal, the second terminal is not accessed into the Mesh network, the second server corresponding to the second terminal is determined according to the terminal information, a verification request for verifying the second terminal is sent to the second server according to the terminal information, finally, the first terminal is informed to send networking information of the Mesh network to the second terminal according to a verification result of the second terminal obtained from the second server, so that the second terminal is accessed into the Mesh network according to the networking information and establishes communication connection with the second server, so as to realize the distribution network among the devices under different IOT platforms.

Drawings

In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.

Fig. 1 is a schematic view of a use scenario of a network distribution method of a Mesh network according to an embodiment of the present application;

fig. 2 is a schematic flowchart of a network distribution method of a Mesh network according to an embodiment of the present disclosure;

fig. 3 is a schematic flowchart of another network distribution method for a Mesh network according to an embodiment of the present application;

figure 4 is a schematic flow diagram of sub-steps of a method of distribution of a Mesh network provided in figure 3;

FIG. 5 is a block diagram schematically illustrating a structure of a server according to an embodiment of the present disclosure;

fig. 6 is a schematic block diagram of a structure of a Mesh device according to an embodiment of the present application.

Detailed Description

The technical solutions in the embodiments of the present application will be described clearly and completely with reference to the drawings in the embodiments of the present application, and it should be understood that the described embodiments are some, but not all embodiments of the present application. All other embodiments that can be derived by a person skilled in the art from the embodiments given herein without making any inventive effort fall within the scope of protection of the present application.

The flow diagrams depicted in the figures are merely illustrative and do not necessarily include all of the elements and operations/steps, nor do they necessarily have to be performed in the order depicted. For example, some operations/steps may be decomposed, combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.

The embodiment of the application provides a network distribution method of a Mesh network, a server, a Mesh device and a storage medium. The network distribution method of the Mesh network can be applied to a server, and the server can be a single server or a server cluster consisting of a plurality of servers; the network distribution method of the Mesh network can also be applied to terminal equipment, and the terminal equipment can be Mesh equipment such as intelligent air conditioners, intelligent refrigerators, intelligent range hoods, intelligent fans, floor sweeping robots, intelligent lamps, intelligent door locks, water purifiers, intelligent water dispensers, intelligent mobile phones, computers, intelligent televisions or intelligent washing machines and the like.

For example, the server is a server deployed by a manufacturer, a seller or a third-party software service provider of the Mesh device, and a cloud service system, such as an IOT cloud, may be deployed on the server and used to provide services such as data storage, operation, logic judgment, security verification and the like for the terminal device.

In some embodiments, as shown in fig. 1, the distribution network method of the Mesh network is used for a first server, and the first server can communicate with a first terminal, such as a smart fan, in the Mesh network; the network distribution method comprises the steps that terminal information of a second terminal, such as an intelligent water dispenser, is obtained from a first terminal, wherein the intelligent water dispenser is not accessed into a Mesh network; and determining a second server corresponding to the intelligent water dispenser according to the terminal information, then sending a verification request for verifying the intelligent water dispenser to the second server according to the terminal information, obtaining a verification result of the intelligent water dispenser from the second server, and finally informing the intelligent fan to send networking information of the Mesh network to the intelligent water dispenser according to the verification result so that the intelligent water dispenser is accessed to the Mesh network according to the networking information and establishes communication connection with the second server.

Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.

The following description will be made in detail by taking an example that a distribution network method of a Mesh network is applied to a first server, wherein the first server can communicate with a first terminal in the Mesh network.

Referring to fig. 2, fig. 2 is a schematic flowchart of a network distribution method applied to a Mesh network of a first server according to an embodiment of the present disclosure. As shown in fig. 2, the network distribution method of the Mesh network may include steps S101 to S104.

Step S101, obtaining terminal information of a second terminal from the first terminal, wherein the second terminal does not access the Mesh network.

Specifically, the first terminal has access to the Mesh network, and the second terminal does not have access to the Mesh network and is a terminal to be configured. The second terminal may send a distribution network request to the first terminal by establishing communication with the first terminal through a network protocol supported by the first terminal, where the distribution network request includes terminal information of the second terminal, and the network protocol is not limited in this application, for example, the network protocol may be an ESP-NOW protocol.

In some embodiments, after acquiring the terminal information of the second terminal, the first terminal sends a distribution network verification request to a first server bound to the first terminal, where the distribution network verification request includes the terminal information, and the first server receives the distribution network verification request sent by the first terminal and verifies the validity of the second terminal according to the terminal information of the second terminal in the distribution network verification request.

And step S102, determining a second server corresponding to the second terminal according to the terminal information.

In some embodiments, the terminal information includes server information preset by the second terminal, that is, second server information corresponding to the second terminal, and the server corresponding to the server information, that is, the second server corresponding to the second terminal, may be determined according to the server information. The server information has an identification function and can be used for determining a server corresponding to the server information, for example, the server information may be a cordid of the server. Each server has one and only one Corpid and has an identification function, so that the server corresponding to the Corpid can be determined according to the Corpid of the server.

Step S103, sending a verification request for verifying the second terminal to the second server according to the terminal information, and obtaining a verification result of the second terminal from the second server.

In some embodiments, the terminal information of the second terminal further includes encrypted information of the second terminal, the terminal characteristic information of the second terminal can be obtained after the encrypted information of the second terminal is decrypted, and the terminal characteristic information of the second terminal can be used to verify the identity of the second terminal, so as to determine whether the second terminal is a valid terminal. Illustratively, the first server sends the encrypted information of the second terminal to the second server, so that the second server decrypts the encrypted information, and the second server authenticates the second terminal according to the decrypted terminal characteristic information, so as to obtain the authentication result of the second terminal.

In some embodiments, the second terminal may encrypt the terminal characteristic information of the second terminal according to a public key of a second server corresponding to the second terminal to obtain the encrypted information, where the encrypted information may be decrypted by a private key of the second server to obtain the terminal characteristic information in the encrypted information. The terminal characteristic information of the second terminal is encrypted to obtain the encrypted information, so that the second server can accurately judge whether the second terminal is a legal terminal, for example, whether the second terminal is a terminal supported by a manufacturer, a seller or a third party software service provider.

And when other terminals or other servers illegally obtain the encrypted information, the terminal characteristic information of the second terminal in the encrypted information cannot be easily obtained, so that the safety of the terminal characteristic information of the second terminal is ensured, and the safety of a distribution network of the Mesh network is improved.

Illustratively, the terminal characteristic information of the second terminal may be a DID of the second terminal and/or a device _ access _ key of the second terminal, where the DID is a unique ID corresponding to the terminal and may be used to verify the identity of the terminal; the device _ access _ key is a terminal key corresponding to the terminal, is issued by a server corresponding to the terminal, corresponds to the DID, has uniqueness, and can be used for verifying the identity of the terminal; the public key of the second server may be a cloud _ public _ key and an IOT cloud public key, and the private key of the second server may be a cloud _ private _ key and an IOT cloud private key.

And step S104, informing the first terminal to send the networking information of the Mesh network to the second terminal according to the verification result so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server.

Judging whether the second terminal is a legal terminal or not according to a verification result, if the second terminal is the legal terminal, the first terminal sends networking information of the Mesh network to the second terminal so that the second terminal can access the Mesh network according to the networking information; and if the second terminal is not a legal terminal, the first terminal does not send the networking information of the Mesh network to the second terminal. The safety of the Mesh network can be effectively ensured by verifying the validity of the second terminal, and potential safety hazards caused by the fact that a non-legal terminal accesses the Mesh network are avoided.

In some embodiments, the first server determines whether the second terminal is a valid terminal according to the verification result, and if the second terminal is a valid terminal, notifies the first terminal to send the networking information of the Mesh network to the second terminal.

In some embodiments, the first server sends the verification result to the first terminal, so that the first terminal determines whether the second terminal is a valid terminal according to the verification result, and if the second terminal is a valid terminal, the first terminal sends the networking information of the Mesh network to the second terminal.

In order to improve the security of the communication between the terminals and avoid a security accident caused by the leakage of the networking information of the Mesh network, in some embodiments, the first terminal may encrypt the networking information of the Mesh network before sending the networking information of the Mesh network to the second terminal. For example, the first terminal may obtain a secret key sent by the second terminal, encrypt networking information of the Mesh network according to the secret key, and send the encrypted networking information to the second terminal, so as to improve the security of the network distribution method of the Mesh network.

In some embodiments, if it is determined that the second terminal is not a valid terminal, the second terminal is added to a blacklist. And if a verification request for verifying the second terminal is received again, the second terminal can be directly verified according to the blacklist so as to accelerate the speed of obtaining a verification result.

In some embodiments, the network distribution method of the Mesh network further includes the following steps:

acquiring a user information request from the second server, wherein the user information request comprises user characteristic information which is sent to the second terminal by the first terminal and is sent to the second server by the second terminal;

and determining user information bound by the first terminal in the first server according to the user characteristic information, and sending the user information to the second server so that the second server binds the user information with the second terminal.

Specifically, if the second terminal is a valid terminal, the first terminal sends user characteristic information to the second terminal, where the user characteristic information includes user information, such as user identity information and user contact information, bound by the first terminal in the first server. In order to enhance the security of the inter-device communication, the user characteristic information is encrypted by the first terminal and/or the first server, so that the encrypted user characteristic information can be decrypted by the first server to obtain the user information bound by the first terminal at the first server. Other servers or other terminals cannot directly acquire the user information bound by the first terminal on the first server according to the user characteristic information, so that the safety of communication between devices is improved, and potential safety hazards caused by user information leakage are avoided.

Illustratively, after the first server obtains the user information request sent by the second server, the user feature information in the user information request is decrypted to obtain the user information bound by the first terminal at the first server, and the user information is sent to the second server, so that the second server binds the user information with the second terminal.

Illustratively, the user characteristic information includes encrypted user information, such as a user mobile phone number, a user head portrait, an a-platform user account ID, and the like; the first server may obtain the user information by decrypting the user characteristic information.

Illustratively, the user characteristic information includes index information of the encrypted user information, including, for example, an account ID, a mobile phone number, and the like of the user; the first server can obtain index information by decrypting the user characteristic information, and can inquire the pre-stored user information according to the index information.

The network distribution method of the Mesh network provided by the above embodiment is applied to a first server, where the first server can communicate with a first terminal in the Mesh network, and the network distribution method of the Mesh network obtains terminal information of a second terminal from the first terminal, where the second terminal does not access the Mesh network, and determines a second server corresponding to the second terminal according to the terminal information, so as to send an authentication request for authenticating the second terminal to the second server according to the terminal information, and finally informs the first terminal to send networking information of the Mesh network to the second terminal according to an authentication result of the second terminal obtained from the second server, so that the second terminal accesses the Mesh network according to the networking information and establishes a communication connection with the second server, the network distribution among the devices under different IOT platforms is realized.

The following description will be made in detail by taking an example that a network distribution method of a Mesh network is applied to a first terminal, where the first terminal accessing the Mesh network can communicate with a first server corresponding to the first terminal.

Referring to fig. 3, fig. 3 is a schematic flowchart of a network distribution method applied to a Mesh network of a first terminal according to an embodiment of the present disclosure. As shown in fig. 3, the network distribution method of the Mesh network may include steps S201 to S203.

Step S201, terminal information of a second terminal is obtained, and the second terminal does not access the Mesh network.

Specifically, the first terminal has access to the Mesh network, and the second terminal does not have access to the Mesh network and is a terminal to be configured. The second terminal may send a distribution network request to the first terminal by establishing communication with the first terminal through a network protocol supported by the first terminal, where the distribution network request includes terminal information of the second terminal, and the network protocol is not limited in this application, for example, the network protocol may be an ESP-NOW protocol.

Step S202, sending the terminal information to the first server, so that the first server determines a second server corresponding to the second terminal according to the terminal information, and sends a verification request for verifying the second terminal to the second server.

Illustratively, after obtaining the terminal information of the second terminal, the first terminal sends a distribution network verification request to a first server bound to the first terminal, where the distribution network verification request includes the terminal information, so that the first server determines, according to the terminal information, a second server corresponding to the second terminal and sends a verification request for verifying the second terminal to the second server.

In some embodiments, the terminal information includes server information preset by the second terminal, that is, second server information corresponding to the second terminal, and the server corresponding to the server information, that is, the second server corresponding to the second terminal, may be determined according to the server information. The server information has an identification function and can be used for determining a server corresponding to the server information, for example, the server information may be a cordid of the server. Each server has one and only one Corpid and has an identification function, so that the server corresponding to the Corpid can be determined according to the Corpid of the server.

In some embodiments, the terminal information further includes terminal characteristic information of the second terminal, where the terminal characteristic information of the second terminal is used to verify an identity of the second terminal, so as to determine whether the second terminal is a valid terminal. For example, the terminal feature information of the second terminal may be a DID of the second terminal and/or a device _ access _ key of the second terminal, where the DID is a unique ID corresponding to the terminal and may be used to verify the identity of the terminal; the device _ access _ key is a terminal key corresponding to the terminal, is issued by a server corresponding to the terminal, corresponds to the DID, has uniqueness, and can be used for verifying the identity of the terminal.

In order to ensure the security of the terminal characteristic information of the second terminal, in some embodiments, before the second terminal sends the terminal information to the first terminal, the second terminal may encrypt the terminal characteristic information in the terminal information according to a public key of a second server corresponding to the second terminal to obtain the encrypted information, where the encrypted information may be decrypted by a private key of the second server to obtain the terminal characteristic information in the encrypted information. The terminal characteristic information of the second terminal is encrypted to obtain the encrypted information, so that the second server can accurately judge whether the second terminal is a legal terminal, for example, whether the second terminal is a terminal supported by a manufacturer, a seller or a third-party software service provider.

And when other terminals or other servers illegally obtain the encrypted information, the terminal characteristic information of the second terminal in the encrypted information cannot be easily obtained, so that the safety of the terminal characteristic information of the second terminal is ensured, and the safety of a distribution network of the Mesh network is improved.

Step S203, receiving a verification result sent by the first server, and sending networking information of the Mesh network to the second terminal according to the verification result, so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server.

Illustratively, the first terminal receives a verification result sent by the first server, and judges whether the second terminal is a legal terminal according to the verification result, if the second terminal is a legal terminal, the first terminal sends networking information of the Mesh network to the second terminal, so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server; and if the second terminal is not a legal terminal, the first terminal does not send the networking information of the Mesh network to the second terminal. The safety of the Mesh network can be effectively ensured by verifying the validity of the second terminal, and potential safety hazards caused by the fact that non-legal terminals are accessed into the Mesh network are avoided.

In some embodiments, if it is determined that the second terminal is not a valid terminal, the second terminal is added to a blacklist. And if a verification request for verifying the second terminal is received again, the second terminal can be directly verified according to the blacklist so as to accelerate the speed of obtaining a verification result.

In some embodiments, as shown in fig. 4, the network distribution method of the Mesh network further includes step S203a and step S203 b:

step S203a, acquiring the key sent by the second terminal;

step S203b, encrypting the networking information of the Mesh network according to the key, and sending the encrypted networking information to the second terminal.

In order to improve the security of communication between terminals and avoid a security accident caused by the leakage of the networking information of the Mesh network, the first terminal may encrypt the networking information of the Mesh network before sending the networking information of the Mesh network to the second terminal. For example, the first terminal may obtain a secret key sent by the second terminal, encrypt networking information of the Mesh network according to the secret key, and send the encrypted networking information to the second terminal, so as to improve the security of the network distribution method of the Mesh network.

In some embodiments, the network distribution method of the Mesh network further includes the following steps:

and if the second terminal is judged to be a legal terminal according to the verification result, the user characteristic information of the first equipment is sent to the second terminal, and the second terminal sends the user characteristic information to the second server, so that the second server obtains the user information bound by the first terminal in the first server from the first server according to the user characteristic information.

The user characteristic information comprises user information bound by the first terminal in the first server. In order to enhance the security of the communication between the devices, the user characteristic information is encrypted by the first terminal and/or the first server. Illustratively, the encrypted user characteristic information may be decrypted by the first server to obtain the user information bound by the first terminal at the first server. Other servers or other terminals cannot directly acquire the user information bound by the first terminal in the first server according to the user characteristic information, so that the safety of communication between devices is improved, and potential safety hazards caused by user information leakage are avoided.

Illustratively, after the first server obtains the user information request sent by the second server, the user feature information in the user information request is decrypted to obtain the user information bound by the first terminal at the first server, and the user information is sent to the second server, so that the second server binds the user information with the second terminal.

Illustratively, the user characteristic information includes encrypted user information, such as a user mobile phone number, a user head portrait, an a-platform user account ID, and the like; the first server may obtain the user information by decrypting the user characteristic information.

Illustratively, the user characteristic information includes index information of the encrypted user information, and the index information includes, for example, an account ID, a mobile phone number, and the like of the user; the first server can obtain index information by decrypting the user characteristic information, and can inquire the pre-stored user information according to the index information.

The network distribution method of the Mesh network provided by the above embodiment is applied to a first terminal, the first terminal is accessed to the Mesh network and can communicate with a first server corresponding to the first terminal, the network distribution method of the Mesh network obtains terminal information of a second terminal, wherein the second terminal is not accessed to the Mesh network, and sends the terminal information to the first server, so that the first server determines a second server corresponding to the second terminal according to the terminal information and sends a verification request for verifying the second terminal to the second server, and finally receives a verification result sent by the first server, and sends networking information of the Mesh network to the second terminal according to the verification result, so that the second terminal is accessed to the Mesh network according to the networking information and establishes communication connection with the second server, so as to realize the distribution network among the devices under different IOT platforms.

Referring to fig. 5, fig. 5 is a schematic block diagram of a server according to an embodiment of the present disclosure.

As shown in FIG. 5, the server 300 includes a processor 302, a memory 303, and a communication interface 304 connected by a system bus 301, wherein the memory 303 may include non-volatile storage media and memory.

The non-volatile storage medium may store a computer program. The computer program includes program instructions that, when executed, cause the processor 302 to perform any of the methods for network distribution in a Mesh network.

The processor 302 is used to provide computing and control capabilities, supporting the operation of the entire server.

The memory 303 provides an environment for running a computer program in a non-volatile storage medium, which when executed by the processor 302, causes the processor 302 to perform any of the methods for network distribution in a Mesh network.

The communication interface 304 is used for communication. Those skilled in the art will appreciate that the architecture shown in fig. 6 is a block diagram of only a portion of the architecture associated with the subject application, and does not constitute a limitation on the servers to which the subject application applies, as a particular server may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.

It should be understood that the bus 301 is, for example, an I2C (Inter-Integrated Circuit) bus, the Memory 303 may be a Flash chip, a Read-Only Memory (ROM), a magnetic disk, an optical disk, a usb disk, or a removable hard disk, the Processor 302 may be a Central Processing Unit (CPU), the Processor may also be other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an ASIC, a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, a discrete hardware component, or the like. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.

Wherein, in one embodiment, the server is capable of communicating with a first terminal in the Mesh network, the processor 302 is configured to run a computer program stored in the memory 303 to implement the steps of:

acquiring terminal information of a second terminal from the first terminal, wherein the second terminal does not access the Mesh network;

determining a second server corresponding to the second terminal according to the terminal information;

sending a verification request for verifying the second terminal to the second server according to the terminal information, and acquiring a verification result of the second terminal from the second server;

and informing the first terminal to send the networking information of the Mesh network to the second terminal according to the verification result so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server.

In an embodiment, the terminal information of the second terminal includes preset server information, and the processor 302, when implementing the determining, according to the terminal information, the second server corresponding to the second terminal, is configured to implement:

and determining a second server corresponding to the second terminal according to the server information.

In one embodiment, the terminal information of the second terminal includes encrypted information of the second terminal, and the encrypted information is obtained by the second terminal encrypting the terminal characteristic information of the second terminal according to the public key of the second server; when the sending of the authentication request for authenticating the second terminal to the second server according to the terminal information and the obtaining of the authentication result of the second terminal from the second server are implemented, the processor 302 is configured to implement:

and sending the encrypted information of the second terminal to the second server so that the second server decrypts the encrypted information according to a private key, and verifies the second terminal according to the terminal characteristic information obtained by decryption to obtain a verification result of the second terminal.

In an embodiment, the processor 302, when implementing the notifying the first terminal of sending the networking information of the Mesh network to the second terminal according to the verification result, is configured to implement:

and sending the verification result to the first terminal so that the first terminal judges whether the second terminal is a legal terminal according to the verification result, and if the second terminal is the legal terminal, the first terminal sends the networking information of the Mesh network to the second terminal.

In an embodiment, the processor 302, when implementing the notifying the first terminal of sending the networking information of the Mesh network to the second terminal according to the verification result, is configured to implement:

judging whether the second terminal is a legal terminal or not according to the verification result;

and if the second terminal is a legal terminal, informing the first terminal to send the networking information of the Mesh network to the second terminal.

In an embodiment, when the processor 302 implements the network distribution method of the Mesh network, the processor is further configured to implement:

acquiring a user information request from the second server, wherein the user information request comprises user characteristic information which is sent to the second terminal by the first terminal and is sent to the second server by the second terminal;

and determining user information bound by the first terminal in the first server according to the user characteristic information, and sending the user information to the second server so that the second server binds the user information with the second terminal.

It should be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the server described above may refer to the corresponding process in the distribution network method embodiment of the Mesh network applied to the first server, and is not described herein again.

The above embodiment provides a server capable of communicating with a first terminal in the Mesh network, by acquiring terminal information of a second terminal from the first terminal, wherein the second terminal does not access the Mesh network, and determines a second server corresponding to the second terminal according to the terminal information, so as to send a verification request for verifying the second terminal to the second server according to the terminal information, and finally inform the first terminal to send the networking information of the Mesh network to the second terminal according to the verification result of the second terminal obtained from the second server, and the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server so as to realize the distribution network among the devices under different IOT platforms.

Referring to fig. 6, fig. 6 is a schematic block diagram of a Mesh device according to an embodiment of the present application.

The Mesh device may include, for example: mesh equipment such as intelligent air conditioner, intelligent refrigerator, intelligent lampblack absorber, intelligent fan, robot of sweeping floor, intelligent lamps and lanterns, intelligent door lock, water purifier, intelligent water dispenser, smart mobile phone, computer, smart TV or intelligent washing machine

As shown in fig. 6, the Mesh device 400 includes a processor 402, a memory 403 and a communication interface 404 connected by a system bus 401, wherein the memory 403 may include a nonvolatile storage medium and an internal memory.

The non-volatile storage medium may store a computer program. The computer program includes program instructions that, when executed, cause the processor 402 to perform any of the methods for network distribution in a Mesh network.

Processor 402 is used to provide computational and control capabilities to support the operation of the entire Mesh device.

The memory 403 provides an environment for running a computer program in a non-volatile storage medium, which when executed by the processor 402, causes the processor 402 to perform any of the methods for network distribution in a Mesh network.

The communication interface 404 is used for communication. Those skilled in the art will appreciate that the architecture shown in fig. 6 is a block diagram of only a portion of the architecture associated with the subject application, and does not constitute a limitation on the servers to which the subject application applies, as a particular server may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.

It should be understood that the bus 401 is, for example, an I2C (Inter-Integrated Circuit) bus, the Memory 403 may be a Flash chip, a Read-Only Memory (ROM), a magnetic disk, an optical disk, a usb disk, or a removable hard disk, the Processor 402 may be a Central Processing Unit (CPU), the Processor may also be other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an ASIC, a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, a discrete hardware component, or the like. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.

In one embodiment, the Mesh device accessing the Mesh network can communicate with a first server corresponding to the Mesh device, and the processor 402 is configured to execute a computer program stored in the memory 403 to implement the following steps:

acquiring terminal information of a second terminal, wherein the second terminal does not access the Mesh network;

sending the terminal information to the first server, so that the first server determines a second server corresponding to the second terminal according to the terminal information and sends a verification request for verifying the second terminal to the second server;

and receiving a verification result sent by the first server, and sending networking information of the Mesh network to the second terminal according to the verification result so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server.

In an embodiment, when the processor 402 implements the network distribution method of the Mesh network, the processor is further configured to implement:

acquiring a secret key sent by the second terminal;

the sending the networking information of the Mesh network to the second terminal includes:

and encrypting the networking information of the Mesh network according to the secret key, and sending the encrypted networking information to the second terminal.

In an embodiment, when the processor 402 implements the network distribution method of the Mesh network, the processor is further configured to implement:

and if the second terminal is judged to be legal according to the verification result, sending the user characteristic information of the Mesh device to the second terminal, and sending the user characteristic information to the second server by the second terminal, so that the second server obtains the user information bound by the Mesh device in the first server from the first server according to the user characteristic information.

It should be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the server described above may refer to the corresponding process in the distribution network method embodiment of the Mesh network applied to the first terminal, and is not described herein again.

In the Mesh device provided by the above embodiment, the Mesh device accessing the Mesh network can communicate with the first server corresponding to the Mesh device, and by acquiring the terminal information of the second terminal, wherein the second terminal does not access the Mesh network, and sends the terminal information to the first server, so that the first server determines a second server corresponding to the second terminal according to the terminal information, sends a verification request for verifying the second terminal to the second server, and finally receives a verification result sent by the first server, and sending the networking information of the Mesh network to the second terminal according to the verification result, and the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server so as to realize the distribution network among the devices under different IOT platforms.

Embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, where the computer program includes program instructions, and when the program instructions are executed, a method implemented by the computer program may refer to various embodiments of the present application for a network distribution method of a Mesh network of a first server and/or various embodiments of a network distribution method of a Mesh network of a first terminal.

The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.

The computer-readable storage medium may be an internal storage unit of the server according to the foregoing embodiment, for example, a hard disk or a memory of the server. The computer readable storage medium may also be an external storage device of the server, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, provided on the server.

Since the computer program stored in the computer-readable storage medium may execute any method for distributing a Mesh network for a first server and/or any method for distributing a Mesh network for a first terminal provided in the embodiments of the present application, beneficial effects that can be achieved by any method for distributing a Mesh network for a first server and/or any method for distributing a Mesh network for a first terminal provided in the embodiments of the present application may be achieved, and detailed descriptions thereof are omitted here for the foregoing embodiments.

It is to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.

It should also be understood that the term "and/or" as used in this specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations. It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.

The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments. While the invention has been described with reference to specific embodiments, the scope of the invention is not limited thereto, and various equivalent modifications or substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present application, and these modifications or substitutions should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

18页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种5G通信基站

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!