[go: up one dir, main page]

CN114338150A - Network distribution method of Internet of things equipment, storage medium, electronic equipment and intelligent door lock - Google Patents

Network distribution method of Internet of things equipment, storage medium, electronic equipment and intelligent door lock Download PDF

Info

Publication number
CN114338150A
CN114338150A CN202111624202.XA CN202111624202A CN114338150A CN 114338150 A CN114338150 A CN 114338150A CN 202111624202 A CN202111624202 A CN 202111624202A CN 114338150 A CN114338150 A CN 114338150A
Authority
CN
China
Prior art keywords
network
internet
information
network configuration
management password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111624202.XA
Other languages
Chinese (zh)
Inventor
孙吉平
孔彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wikipedia Technology Co ltd
Original Assignee
Beijing Wikipedia Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wikipedia Technology Co ltd filed Critical Beijing Wikipedia Technology Co ltd
Priority to CN202111624202.XA priority Critical patent/CN114338150A/en
Publication of CN114338150A publication Critical patent/CN114338150A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Selective Calling Equipment (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The utility model provides a network distribution method, a storage medium, an electronic device and an intelligent door lock of Internet of things equipment, wherein the method comprises the following steps: encrypting the first device management password based on the encryption key to form verification information; generating and displaying a graph identification code based on the verification information and the network configuration information so that the internet of things equipment decrypts the verification information carried in the graph identification code based on a decryption key, and performing network distribution operation based on the network configuration information under the condition that a decryption result obtained after decryption is the same as a second equipment management password stored in the internet of things equipment; wherein the encryption key corresponds to the decryption key. The client encrypts and transmits the equipment management password of the Internet of things equipment, so that the decrypted content of the Internet of things equipment is compared with the locally stored equipment management password, the verification operation of the client is realized, and the distribution network can be realized only under the condition that the verification is passed, so that the network security of the Internet of things equipment is guaranteed.

Description

物联网设备的配网方法、存储介质、电子设备及智能门锁Network distribution method, storage medium, electronic device and smart door lock for IoT devices

技术领域technical field

本公开涉及物联网技术领域,特别涉及一种物联网设备的配网方法、存储介质、电子设备及智能门锁。The present disclosure relates to the technical field of the Internet of Things, and in particular, to a network distribution method, a storage medium, an electronic device and an intelligent door lock for an Internet of Things device.

背景技术Background technique

随着网络技术的发展,物联网设备逐渐走进千家万户,其通常需要连接网络才能正常使用全部功能,甚至是多个物联网设备之间的联动使用。通常情况下为了成本、设计等多方便因素,大部分物联网设备时没有可以供用户直接操作的显示屏幕的,所以就需要通过其他方式进行物联网设备的配网。With the development of network technology, IoT devices have gradually entered thousands of households. They usually need to be connected to the network to use all functions normally, and even the linkage between multiple IoT devices. Usually, due to cost, design and other convenience factors, most IoT devices do not have a display screen that can be directly operated by users, so it is necessary to distribute the IoT devices through other methods.

现有市面上在对具有摄像头的物联网设备进行配网的过程中,通过摄像头进行扫码来实现网络配置信息的获取,但是上述方式安全性较低,非法用户可以修改物联网设备的网络配置,影响物联网设备的正常使用甚至全屋物联设备的网络安全。In the existing market, in the process of distributing the Internet of Things devices with cameras, the camera scans the code to realize the acquisition of network configuration information. However, the security of the above method is low, and illegal users can modify the network configuration of the Internet of Things devices. , affecting the normal use of IoT devices and even the network security of IoT devices in the whole house.

发明内容SUMMARY OF THE INVENTION

本公开实施例的目的在于提供一种物联网设备的配网方法、存储介质、电子设备及智能门锁,用以解决现有技术中物联网设备配网过程安全性低的问题。The purpose of the embodiments of the present disclosure is to provide a network distribution method, a storage medium, an electronic device and a smart door lock for IoT devices, so as to solve the problem of low security in the network distribution process of IoT devices in the prior art.

本公开的实施例采用如下技术方案:一种物联网设备的配网方法,应用于客户端,包括:基于加密密钥对第一设备管理密码进行加密,形成验证信息;基于所述验证信息和网络配置信息生成并显示图形识别码,以使物联网设备基于解密密钥对所述图形识别码中携带的所述验证信息进行解密,并在解密后得到的解密结果与所述物联网设备存储的第二设备管理密码相同的情况下,基于所述网络配置信息进行配网操作;其中,所述加密密钥和所述解密密钥对应。The embodiments of the present disclosure adopt the following technical solutions: a network distribution method for IoT devices, applied to a client, includes: encrypting a first device management password based on an encryption key to form verification information; based on the verification information and The network configuration information generates and displays a graphic identification code, so that the IoT device decrypts the verification information carried in the graphic identification code based on the decryption key, and the decryption result obtained after decryption is stored with the IoT device. In the case of the same second device management password, the network configuration operation is performed based on the network configuration information; wherein the encryption key corresponds to the decryption key.

在一些实施例中,所述图形识别码中还携带有用户信息,用以实现所述物联网设备在配网成功后进行存储。In some embodiments, the graphic identification code also carries user information, so as to realize the storage of the Internet of Things device after the network configuration is successful.

在一些实施例中,还包括:在所述物联网设备配网成功后,基于网络向所述物联网设备发送携带有所述用户信息的控制指令,以使所述物联网设备在基于所述用户信息进行的验证通过后执行所述控制指令。In some embodiments, the method further includes: after the Internet of Things device is successfully configured to a network, sending a control instruction carrying the user information to the Internet of Things device based on the network, so that the Internet of Things device can perform a network based on the Internet of Things device. The control instruction is executed after the verification of the user information is passed.

本公开实施例还提供了一种物联网设备的配网方法,应用于物联网设备,包括:扫描客户端展示的图形识别码,其中,所述图形识别码至少携带有验证信息和网络配置信息,所述验证信息为所述客户端基于加密密钥对第一设备管理密码进行加密生成;基于解密密钥对所述验证信息进行解密,得到解密结果;检测所述解密结果与本地存储的第二设备管理密码是否相同;在所述解密结果与所述第二设备管理密码相同的情况下,基于所述网络配置信息进行配网操作;其中,所述加密密钥和所述解密密钥对应。An embodiment of the present disclosure also provides a method for network distribution of an Internet of Things device, which is applied to the Internet of Things device, including: scanning a graphic identification code displayed by a client, wherein the graphic identification code carries at least verification information and network configuration information , the verification information is generated by the client encrypting the first device management password based on the encryption key; decrypting the verification information based on the decryption key to obtain a decryption result; detecting the decryption result and the locally stored first device Whether the two device management passwords are the same; if the decryption result is the same as the second device management password, perform a network configuration operation based on the network configuration information; wherein the encryption key corresponds to the decryption key .

在一些实施例中,所述图形识别码中还携带有用户信息,所述配网方法还包括:在配网成功的情况下,保存所述用户信息。In some embodiments, the graphic identification code also carries user information, and the network distribution method further includes: saving the user information when the network distribution is successful.

在一些实施例中,还包括:在接收到所述客户端发送的携带有所述用户信息的控制指令的情况下,检测本地是否保存有所述用户信息;在本地保存有所述用户信息的情况下,执行所述控制指令。In some embodiments, the method further includes: in the case of receiving a control instruction that carries the user information sent by the client, detecting whether the user information is stored locally; In this case, the control instruction is executed.

在一些实施例中,还包括:在所述解密结果与本地存储的第二设备管理密码不相同,和/或,配网失败的情况下,向所述客户端反馈配网失败信息。In some embodiments, the method further includes: in the case that the decryption result is not the same as the locally stored second device management password, and/or in the case that the network configuration fails, feeding back the network configuration failure information to the client.

本公开实施例还提供了一种存储介质,存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现上述的物联网设备的配网方法的步骤。An embodiment of the present disclosure further provides a storage medium storing a computer program, wherein when the computer program is executed by a processor, the steps of the above-mentioned method for network distribution of an Internet of Things device are implemented.

本公开实施例还提供了一种电子设备,至少包括存储器、处理器,所述存储器上存储有计算机程序,其特征在于,所述处理器在执行所述存储器上的计算机程序时实现上述的物联网设备的配网方法的步骤。An embodiment of the present disclosure further provides an electronic device, comprising at least a memory and a processor, and a computer program is stored in the memory, and characterized in that, the processor implements the above-mentioned things when executing the computer program in the memory Steps of a network distribution method for networked devices.

本公开实施例还提供了一种智能门锁,至少包括摄像头、存储器、处理器,所述存储器上存储有计算机程序,其特征在于,所述处理器在执行所述存储器上的计算机程序时实现上述的物联网设备的配网方法的步骤。An embodiment of the present disclosure further provides a smart door lock, which at least includes a camera, a memory, and a processor, wherein a computer program is stored in the memory, and characterized in that, the processor is implemented when executing the computer program on the memory The steps of the above-mentioned method for network distribution of IoT devices.

本公开实施例的有益效果在于:客户端通过对物联网设备的设备管理密码进行加密后传输,使物联网设备端基于解密后的内容与本地存储的设备管理密码进行对比,实现对客户端的验证操作,并只有在验证通过的情况下才能实现配网,保证物联网设备的网络安全。The beneficial effect of the embodiments of the present disclosure is that: the client side encrypts and transmits the device management password of the IoT device, so that the IoT device side compares the decrypted content with the locally stored device management password, thereby realizing the verification of the client operation, and only when the verification is passed can the distribution network be realized to ensure the network security of the IoT devices.

附图说明Description of drawings

为了更清楚地说明本公开实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本公开中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the following briefly introduces the accompanying drawings that need to be used in the description of the embodiments or the prior art. Obviously, the drawings in the following description are only These are some embodiments described in the present disclosure. For those of ordinary skill in the art, other drawings can also be obtained according to these drawings without any creative effort.

图1为本公开第一实施例中物联网设备的配网方法的流程图;FIG. 1 is a flowchart of a method for network distribution of IoT devices in the first embodiment of the disclosure;

图2为本公开第二实施例中物联网设备的配网方法的流程图;2 is a flowchart of a method for network distribution of an Internet of Things device in a second embodiment of the present disclosure;

图3为本公开第五实施例中电子设备的结构示意图;3 is a schematic structural diagram of an electronic device in a fifth embodiment of the present disclosure;

图4为本公开第六实施例中智能门锁的结构示意图。FIG. 4 is a schematic structural diagram of a smart door lock according to a sixth embodiment of the present disclosure.

具体实施方式Detailed ways

此处参考附图描述本公开的各种方案以及特征。Various aspects and features of the present disclosure are described herein with reference to the accompanying drawings.

应理解的是,可以对此处申请的实施例做出各种修改。因此,上述说明书不应该视为限制,而仅是作为实施例的范例。本领域的技术人员将想到在本公开的范围和精神内的其他修改。It should be understood that various modifications may be made to the embodiments claimed herein. Therefore, the above description should not be regarded as limiting, but merely as exemplifications of embodiments. Those skilled in the art will envision other modifications within the scope and spirit of this disclosure.

包含在说明书中并构成说明书的一部分的附图示出了本公开的实施例,并且与上面给出的对本公开的大致描述以及下面给出的对实施例的详细描述一起用于解释本公开的原理。The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the present disclosure and, together with the general description of the disclosure given above and the detailed description of the embodiments given below, serve to explain the principles of the disclosure. principle.

通过下面参照附图对给定为非限制性实例的实施例的优选形式的描述,本公开的这些和其它特性将会变得显而易见。These and other features of the present disclosure will become apparent from the following description of preferred forms of embodiment, given as non-limiting examples, with reference to the accompanying drawings.

还应当理解,尽管已经参照一些具体实例对本公开进行了描述,但本领域技术人员能够确定地实现本公开的很多其它等效形式,它们具有如权利要求的特征并因此都位于借此所限定的保护范围内。It should also be understood that although the present disclosure has been described with reference to some specific examples, those skilled in the art will be able to realize many other equivalents of the present disclosure with certainty, which have the characteristics of the claims and are therefore located within the limits defined herein. within the scope of protection.

当结合附图时,鉴于以下详细说明,本公开的上述和其他方面、特征和优势将变得更为显而易见。The above and other aspects, features and advantages of the present disclosure will become more apparent in view of the following detailed description when taken in conjunction with the accompanying drawings.

此后参照附图描述本公开的具体实施例;然而,应当理解,所申请的实施例仅仅是本公开的实例,其可采用多种方式实施。熟知和/或重复的功能和结构并未详细描述以避免不必要或多余的细节使得本公开模糊不清。因此,本文所申请的具体的结构性和功能性细节并非意在限定,而是仅仅作为权利要求的基础和代表性基础用于教导本领域技术人员以实质上任意合适的详细结构多样地使用本公开。Specific embodiments of the present disclosure are hereinafter described with reference to the accompanying drawings; however, it is to be understood that the claimed embodiments are merely examples of the present disclosure, which may be embodied in various ways. Well-known and/or repeated functions and constructions have not been described in detail to avoid obscuring the present disclosure with unnecessary or redundant detail. Therefore, specific structural and functional details claimed herein are not intended to be limiting, but merely serve as a basis for the claims and a representative basis for teaching one skilled in the art to variously employ the present invention in substantially any suitable detailed structure. public.

本说明书可使用词组“在一种实施例中”、“在另一个实施例中”、“在又一实施例中”或“在其他实施例中”,其均可指代根据本公开的相同或不同实施例中的一个或多个。This specification may use the phrases "in one embodiment," "in another embodiment," "in yet another embodiment," or "in other embodiments," which may all refer to the same in accordance with the present disclosure or one or more of different embodiments.

随着网络技术的发展,物联网设备逐渐走进千家万户,其通常需要连接网络才能正常使用全部功能,甚至是多个物联网设备之间的联动使用。通常情况下为了成本、设计等多方便因素,大部分物联网设备是没有可以供用户直接操作的显示屏幕的,所以就需要通过其他方式进行物联网设备的配网。With the development of network technology, IoT devices have gradually entered thousands of households. They usually need to be connected to the network to use all functions normally, and even the linkage between multiple IoT devices. Usually, due to cost, design and other convenience factors, most IoT devices do not have a display screen that can be directly operated by users, so it is necessary to configure the network of IoT devices by other means.

现有市面上在对具有摄像头的物联网设备进行配网的过程中,通过摄像头进行扫码来实现网络配置信息的获取,例如智能门锁、智能门铃、智能摄像头等设备。但是上述方式安全性较低,非法用户通过非法手段获取到用户的网络配置后,可以对物联网设备的网络配置进行修改,影响物联网设备的正常使用甚至全屋物联设备的网络安全。In the existing market, in the process of distributing the Internet of Things devices with cameras, the acquisition of network configuration information is achieved by scanning codes with cameras, such as smart door locks, smart doorbells, smart cameras and other devices. However, the above methods are less secure. After illegal users obtain the user's network configuration through illegal means, they can modify the network configuration of the IoT device, which affects the normal use of the IoT device and even the network security of the IoT device in the whole house.

为了解决上述问题,本公开第一实施例提供了应用于客户端的一种物联网设备的配网方法,其中,客户端可以为已经完成网络配置的智能手机、平板电脑或者智能手表等具有显示屏幕的电子设备,实施例中所配置的物联网设备则主要为具有摄像头的智能门锁、智能门铃、智能摄像头等设备。图1示出了本实施例中物联网设备的配网方法的流程示意图,其主要包括步骤S11和S12:In order to solve the above problem, the first embodiment of the present disclosure provides a network distribution method for an Internet of Things device applied to a client, wherein the client may have a display screen for a smartphone, tablet computer, or smart watch that has completed network configuration. The Internet of Things devices configured in the embodiment are mainly smart door locks, smart doorbells, smart cameras and other devices with cameras. FIG. 1 shows a schematic flowchart of a method for network distribution of an IoT device in this embodiment, which mainly includes steps S11 and S12:

S11,基于加密密钥对第一设备管理密码进行加密,形成验证信息。S11: Encrypt the first device management password based on the encryption key to form verification information.

本实施例中用户操作客户端的目的是通过客户端为物联网设备进行配网,并且在配网过程中通过验证信息对用户身份进行验证,防止非法用户冒充合法用户对物联网设备的网络配置进行篡改。具体地,验证信息为客户端根据加密密钥对第一设备管理密码进行加密后生成的,其中,客户端内安装有用于控制物联网设备的应用程序,该应用程序内配置有加密密钥,该加密密钥与物联网设备中配置的解密密钥对应;第一设备管理密码则为用户主动输入的用以验证用户身份的内容,其可以是物联网设备出厂时被配置的默认密码,用户通过物联网设备的说明书或其他说明文件中获取初始的默认密码,其应当与物联网设备内预先存储的第二设备管理密码一致,用以验证用户为通过合法渠道购买物联网设备并使用的用户。In this embodiment, the purpose of the user operating the client terminal is to configure the network for the IoT device through the client terminal, and to verify the user identity through the verification information during the network configuration process, so as to prevent illegal users from pretending to be legitimate users to configure the network of the IoT device. tamper. Specifically, the verification information is generated after the client encrypts the first device management password according to the encryption key, wherein the client is installed with an application for controlling the IoT device, and the application is configured with an encryption key, The encryption key corresponds to the decryption key configured in the IoT device; the first device management password is the content actively input by the user to verify the user's identity, which can be the default password configured when the IoT device leaves the factory. Obtain the initial default password from the IoT device's manual or other documentation, which should be consistent with the second device management password pre-stored in the IoT device to verify that the user is the one who purchased the IoT device through legal channels and uses it .

本实施例对第一设备管理密码进行加密处理后形成验证信息进行发送,可以提升配网过程中的安全性,即便非法用户通过其他途径知悉第一设备管理密码,由于其无法知悉对应的加密密钥,也就无法进行加密处理或加密处理后的信息物联网设备完全无法识别,因此可避免物联网设备执行非法的网络配置,达到提升安全性的目的。In this embodiment, the first device management password is encrypted to form verification information for transmission, which can improve the security in the network distribution process. Even if an illegal user learns the first device management password through other channels, because he cannot know the corresponding encrypted password Therefore, the IoT device can be prevented from executing illegal network configuration and the purpose of improving security can be achieved.

应当了解的是,应用程序内配置的加密密钥与物联网设备中配置的解密密钥相对应,二者可以是对称密钥或者非对称密钥,物联网设备的生产厂商可以对于同一型号的所有物联网设备配置同样的加密密钥和解密密钥,应用程序一般情况下可以同时控制多种不同型号的物联网设备,因此其内部可以配置有多个不同的加密密钥,在实际使用过程中,应用程序则可根据用户在程序内选择的待控制的设备的型号即可判定具体使用哪个加密密钥进行加密处理。另外,在物联网设备初次进行配网使用时,用户输入的第一设备管理密码为出厂时设定的默认密码,在配网成功并且可以通过应用程序对物联网设备进行控制之后,用户可以主动对第一设备管理密码进行修改,并同时对物联网设备内保存的第二设备管理密码的内容进行相应替换,以进一步提升安全性,防止非法用户进行篡改。It should be understood that the encryption key configured in the application corresponds to the decryption key configured in the IoT device, and the two can be symmetric keys or asymmetric keys. All IoT devices are configured with the same encryption key and decryption key. Generally, applications can control multiple different types of IoT devices at the same time, so they can be configured with multiple different encryption keys. , the application program can determine which encryption key to use for encryption processing according to the model of the device to be controlled selected by the user in the program. In addition, when the IoT device is deployed for the first time, the first device management password entered by the user is the default password set at the factory. After the network configuration is successful and the IoT device can be controlled through the application, the user can actively The first device management password is modified, and at the same time, the content of the second device management password stored in the IoT device is correspondingly replaced, so as to further improve security and prevent illegal users from tampering.

S12,基于验证信息和网络配置信息生成并显示图形识别码,以使物联网设备基于解密密钥对图形识别码中携带的验证信息进行解密,并在解密后得到的解密结果与物联网设备存储的第二设备管理密码相同的情况下,基于网络配置信息进行配网操作。S12, generate and display a graphic identification code based on the verification information and the network configuration information, so that the IoT device decrypts the verification information carried in the graphic identification code based on the decryption key, and stores the decryption result obtained after decryption with the IoT device In the case that the management password of the second device is the same, the network configuration operation is performed based on the network configuration information.

验证信息生成后,客户端可将其与网络配置信息合并生成图形识别码,并将生成的图形识别码在客户端的显示屏幕上进行显示。具体地,网络配置信息即为用户希望物联网设备所接入的网络对应的配置信息,其可以包括网络名称、网络密码等;图形识别码可以为条形码或者二维码等可以携带信息的识别码,其具体的生成方法可以直接使用现有技术中条形码或二维码的生成方法,本实施例不进行限制。After the verification information is generated, the client can combine it with the network configuration information to generate a graphic identification code, and display the generated graphic identification code on the display screen of the client. Specifically, the network configuration information is the configuration information corresponding to the network that the user wants the IoT device to access, which may include a network name, network password, etc.; the graphic identification code may be an identification code such as a barcode or a two-dimensional code that can carry information , the specific generation method can directly use the generation method of barcode or two-dimensional code in the prior art, which is not limited in this embodiment.

在显示屏幕上所显示的图形识别码可以供具有摄像头的物联网设备进行扫描,来获取其所携带的信息。基于上述内容,物联网设备扫码后即可以得到网络配置信息和验证信息,在其根据网络配置信息进行联网之前,首先基于验证信息来验证用户的合法身份。具体地,物联网设备首先通过自身配置的解密密钥对验证信息进行解密,得到解密结果,若该用户为合法用户,其所使用的加密密钥与解密密钥对应,得到的解密结果应当与物联网设备中存储的第二设备管理密码相同,在此情况下,物联网设备可以基于网络配置信息进行网络配置;若解密结果与第二设备管理密码不同,则认定当前用户不合法,物联网设备会取消配网流程以保证自身安全。The graphic identification code displayed on the display screen can be scanned by the IoT device with a camera to obtain the information it carries. Based on the above content, the Internet of Things device can obtain network configuration information and verification information after scanning the code. Before it connects to the Internet according to the network configuration information, it first verifies the legal identity of the user based on the verification information. Specifically, the IoT device first decrypts the verification information through the decryption key configured by itself, and obtains the decryption result. If the user is a legitimate user, the encryption key used corresponds to the decryption key, and the decryption result obtained should be the same as the decryption key. The second device management password stored in the IoT device is the same. In this case, the IoT device can perform network configuration based on the network configuration information; if the decryption result is different from the second device management password, it is determined that the current user is illegal and the IoT device is not valid. The device will cancel the network configuration process to ensure its own safety.

在实际使用时,客户端也可以利用加密密钥对第一设备管理密码和网路配置信息同时进行加密,并根据加密后的结果生成图形识别码,此时物联网设备扫码之后即对获取到的信息进行解密,若可以解密出与第二设备管理密码相同的内容,则可根据网络配置信息进行配网,否则取消配网流程即可。In actual use, the client can also use the encryption key to encrypt the first device management password and network configuration information at the same time, and generate a graphic identification code according to the encrypted result. The obtained information is decrypted. If the same content as the second device management password can be decrypted, the network configuration can be performed according to the network configuration information, otherwise the network configuration process can be cancelled.

在一些实施例中,客户端在生成图形识别码时,还可以将用户信息一同进行生成,使图形识别码携带用户信息,物联网设备则在配网成功后将用户信息进行存储,以表征该用户信息为合法用户;在后续使用过程中,客户端在希望物联网设备执行一定操作时,通过网络向物联网设备发送携带有用户信息的控制指令,以供物联网设备通过用户信息进行用户身份验证,在认定当前控制指令中携带的用户信息为自身内部存储的用户信息的情况下,认定该用户合法,可以对应执行控制指令;若当前接收到的控制指令中携带的用户信息并未在本地中存储,则可认定用户不合法,此时物联网设备将不会执行相应的控制指令,同时还可以向合法用户的客户端发送告警信息。应当了解的是,用户信息至少应当包括该用户的用户UID信息,该UID是用户在物联网设备平台注册后,由平台分配的唯一的用户编号,每个UID只能与一个用户账号绑定,用户在使用应用程序时登录自身账号和密码,在进行网络配置和设备控制的过程中可以在配置信息或控制指令中进行UID的携带。In some embodiments, when the client generates the graphic identification code, it can also generate user information together, so that the graphic identification code carries the user information, and the IoT device stores the user information after the network is successfully configured to represent the user information. The user information is a legitimate user; in the subsequent use process, when the client wants the IoT device to perform a certain operation, it sends a control command carrying the user information to the IoT device through the network, so that the IoT device can perform user authentication through the user information. , in the case that the user information carried in the current control instruction is determined to be the user information stored within itself, the user is determined to be legal, and the control instruction can be executed accordingly; if the user information carried in the currently received control instruction is not in the local If it is stored, it can be determined that the user is illegal. At this time, the IoT device will not execute the corresponding control instructions, and can also send alarm information to the client of the legal user. It should be understood that the user information should at least include the user UID information of the user. The UID is the unique user number assigned by the platform after the user registers with the IoT device platform. Each UID can only be bound to one user account. The user logs in his account and password when using the application, and can carry the UID in the configuration information or control instructions during the process of network configuration and device control.

在配网的过程之后添加了基于用户信息的授权流程,将授权流程整合到整个操作流程当中。采用这样的实现方式,当用户在后续对物联网设备操作时,就可以由物联网设备对用户信息(例如用户的移动终端的UID)进行校验,从而进一步加强了后续用户操作物联网设备的安全性。After the network distribution process, an authorization process based on user information is added, and the authorization process is integrated into the entire operation process. With this implementation, when the user subsequently operates the IoT device, the user information (such as the UID of the user's mobile terminal) can be verified by the IoT device, thereby further enhancing the ability of subsequent users to operate the IoT device. safety.

本实施例客户端通过对物联网设备的设备管理密码进行加密后传输,使物联网设备端基于解密后的内容与本地存储的设备管理密码进行对比,实现对客户端的验证操作,并只有在验证通过的情况下才能实现配网,保证物联网设备的网络安全。In this embodiment, the client side encrypts and transmits the device management password of the IoT device, so that the IoT device side compares the decrypted content with the locally stored device management password, so as to realize the verification operation on the client, and only after verification The distribution network can only be realized if the network is passed to ensure the network security of the IoT devices.

本公开的第二实施例提供了一种应用于物联网设备一侧的配网方法,其中,物联网设备主要为具有摄像头的智能门锁、智能门铃、智能摄像头等设备,其在接入网络之后,可以根据客户端发出的控制指令执行相应功能。图2示出了本实施例中物联网设备的配网方法的流程示意图,其主要包括步骤S21至S24:The second embodiment of the present disclosure provides a network distribution method applied to one side of an IoT device, wherein the IoT device is mainly a smart door lock with a camera, a smart doorbell, a smart camera, etc., which are connected to the network After that, the corresponding function can be executed according to the control instruction issued by the client. FIG. 2 shows a schematic flowchart of the method for network distribution of IoT devices in this embodiment, which mainly includes steps S21 to S24:

S21,扫描客户端展示的图形识别码。S21, scan the graphic identification code displayed by the client.

客户端展示的图形识别码是客户端基于验证信息和网络配置信息生成的,物联网设备扫描该图形识别码之后即可以得到图形识别码所表征的验证信息和网络配置信息的具体内容。其中,网络配置信息即为用户希望物联网设备所接入的网络对应的配置信息,其可以包括网络名称、网络密码等;验证信息则为客户端基于加密密钥对第一设备管理密码进行加密后生成的,其中,加密密钥内置在用于控制物联网设备的应用程序内,与物联网设备内自身存储的解密密钥对应;第一设备管理密码则为用户主动输入的用以验证用户身份的内容,其可以是物联网设备出厂时被配置的默认密码,用户通过物联网设备的说明书或其他说明文件中获取初始的默认密码,其应当与物联网设备内预先存储的第二设备管理密码一致,用以验证用户为通过合法渠道购买物联网设备并使用的用户。The graphic identification code displayed by the client is generated by the client based on the verification information and network configuration information. After scanning the graphic identification code, the IoT device can obtain the specific content of the verification information and network configuration information represented by the graphic identification code. Wherein, the network configuration information is the configuration information corresponding to the network that the user wants the IoT device to access, which may include network name, network password, etc.; the verification information is that the client encrypts the first device management password based on the encryption key The encryption key is built into the application program used to control the IoT device, and corresponds to the decryption key stored in the IoT device itself; the first device management password is actively input by the user to verify the user The content of the identity, which can be the default password configured when the IoT device leaves the factory. The user obtains the initial default password from the IoT device's manual or other documentation, which should be managed with the second device pre-stored in the IoT device. The same password is used to verify that the user is the one who purchased and used the IoT device through legal channels.

S22,基于解密密钥对验证信息进行解密,得到解密结果。S22, decrypt the verification information based on the decryption key to obtain a decryption result.

S23,检测解密结果与本地存储的第二设备管理密码是否相同。S23: Detect whether the decryption result is the same as the locally stored second device management password.

S24,在解密结果与第二设备管理密码相同的情况下,基于网络配置信息进行配网操作。S24, in the case that the decryption result is the same as the second device management password, perform a network configuration operation based on the network configuration information.

物联网设备获取验证信息后,基于自身存储的解密密钥对验证信息进行解密,得到一解密结果。其中,解密密钥与加密密钥可以是对称密钥或非对称密钥,若当前用户为合法用户,其所使用的加密密钥与解密密钥对应,物联网设备得到的解密结果应当与自身存储的第二设备管理密码相同,在此情况下,物联网设备可以基于网络配置信息进行网络配置;若解密结果与第二设备管理密码不同,则认定当前用户不合法,物联网设备会取消配网流程以保证自身安全。After the IoT device obtains the verification information, it decrypts the verification information based on the decryption key stored by itself, and obtains a decryption result. Among them, the decryption key and the encryption key can be a symmetric key or an asymmetric key. If the current user is a legitimate user, the encryption key used by the user corresponds to the decryption key, and the decryption result obtained by the IoT device should be the same as that obtained by the device itself. The stored second device management password is the same. In this case, the IoT device can perform network configuration based on the network configuration information; if the decryption result is different from the second device management password, it is determined that the current user is illegal, and the IoT device will cancel the configuration. network procedures to ensure their own safety.

在实际使用时,客户端也可以利用加密密钥对第一设备管理密码和网路配置信息同时进行加密,并根据加密后的结果生成图形识别码,此时物联网设备扫码之后即对获取到的信息进行解密,若可以解密出与第二设备管理密码相同的内容,则可根据网络配置信息进行配网,否则取消配网流程。在一些实施例中,在解密结果与本地存储的第二设备管理密码不相同或者根据网络配置信息进行配网的结果为失败的情况下,物联网设备可以向客户端反馈配网失败信息,由客户端验证自身输入的第一设备管理密码或者网络配置信息的准确性,以重新配网或者直接取消配网。In actual use, the client can also use the encryption key to encrypt the first device management password and network configuration information at the same time, and generate a graphic identification code according to the encrypted result. The received information is decrypted. If the same content as the second device management password can be decrypted, the network configuration can be performed according to the network configuration information, otherwise the network configuration process can be cancelled. In some embodiments, when the decryption result is not the same as the locally stored second device management password or the result of network configuration according to the network configuration information is a failure, the IoT device may feed back information on network configuration failure to the client, and the The client verifies the accuracy of the first device management password or network configuration information input by itself, so as to reconfigure the network or directly cancel the network configuration.

在一些实施例中,客户端在生成图形识别码时,还可以将用户信息一同进行生成,使图形识别码携带用户信息,物联网设备则在配网成功后将用户信息进行存储,以表征该用户信息为合法用户。在后续使用过程中,客户端在希望物联网设备执行一定操作时,通过网络向物联网设备发送携带有用户信息的控制指令,以供物联网设备通过用户信息进行用户身份验证,物联网设备则检测本地是否保存有控制指令中携带的用户信息;在认定当前控制指令中携带的用户信息为自身内部存储的用户信息的情况下,认定该用户合法,可以对应执行控制指令;若当前接收到的控制指令中携带的用户信息并未在本地中存储,则可认定用户不合法,此时物联网设备将不会执行相应的控制指令,同时还可以向合法用户的客户端发送告警信息。应当了解的是,用户信息至少应当包括该用户的用户UID信息,该UID是用户在物联网设备平台注册后,由平台分配的唯一的用户编号,每个UID只能与一个用户账号绑定,用户在使用应用程序时登录自身账号和密码,在进行网络配置和设备控制的过程中可以在配置信息或控制指令中进行UID的携带。In some embodiments, when the client generates the graphic identification code, it can also generate user information together, so that the graphic identification code carries the user information, and the IoT device stores the user information after the network is successfully configured to represent the user information. User information is a legitimate user. In the subsequent use process, when the client wants the IoT device to perform a certain operation, it sends a control command carrying the user information to the IoT device through the network, so that the IoT device can perform user authentication through the user information, and the IoT device detects the Whether the user information carried in the control command is stored locally; if the user information carried in the current control command is determined to be the user information stored internally, the user is deemed legitimate, and the control command can be executed accordingly; If the user information carried in the command is not stored locally, it can be determined that the user is illegal. At this time, the IoT device will not execute the corresponding control command, and can also send alarm information to the client of the legal user. It should be understood that the user information should at least include the user UID information of the user. The UID is the unique user number assigned by the platform after the user registers with the IoT device platform. Each UID can only be bound to one user account. The user logs in his account and password when using the application, and can carry the UID in the configuration information or control instructions during the process of network configuration and device control.

在一些实施例中,对于首次配网成功的物联网设备,客户端可通过发送控制指令来修改物联网设备的第二设备管理密码,将其从默认密码调整为用户自定义的密码,进一步提升物联网设备的安全性。在后续使用过程中,若用户需要对物联网设备进行重新配网,则需要将用户自定义的密码内容作为第一设备管理密码进行加密,并与物联网设备中保存的修改后的第二设备管理密码进行对比,并根据对比结果进行后续操作即可。In some embodiments, for an IoT device that is successfully configured for the first time, the client can modify the second device management password of the IoT device by sending a control command, and adjust it from the default password to a user-defined password, further improving Security of IoT devices. In the subsequent use process, if the user needs to reconfigure the Internet of Things device, the user-defined password content needs to be encrypted as the first device management password, and it needs to be encrypted with the modified second device saved in the Internet of Things device. Manage passwords for comparison and follow-up operations based on the comparison results.

本实施例客户端通过对物联网设备的设备管理密码进行加密后传输,使物联网设备端基于解密后的内容与本地存储的设备管理密码进行对比,实现对客户端的验证操作,并只有在验证通过的情况下才能实现配网,保证物联网设备的网络安全。In this embodiment, the client side encrypts and transmits the device management password of the IoT device, so that the IoT device side compares the decrypted content with the locally stored device management password, so as to realize the verification operation on the client, and only after verification The distribution network can only be realized if the network is passed to ensure the network security of the IoT devices.

可选地,客户端可以利用加密密钥,或者设备管理密码对前述的用户信息加密后,将其携带在图形识别码中,传输给可能的物联网设备。相应地,物联网设备在解密结果与第二设备管理密码相同的情况下,可以利用相应的解密密钥,或者利用第二设备管理密码、解密结果来解密,从而得到用户信息。采用这样的实现方式可以进一步增加用户信息的安全性,从而提高配网和授权之后基于用户信息操作物联网设备的行为的安全性。Optionally, the client can use an encryption key or a device management password to encrypt the aforementioned user information, carry it in the graphic identification code, and transmit it to a possible Internet of Things device. Correspondingly, when the decryption result is the same as the second device management password, the IoT device can use the corresponding decryption key, or use the second device management password and the decryption result to decrypt to obtain user information. Adopting such an implementation manner can further increase the security of the user information, thereby improving the security of the behavior of operating the IoT device based on the user information after network distribution and authorization.

本公开第三实施例提供了一种存储介质,该存储介质可安装于任意一种安装有用于控制物联网设备的应用程序的电子设备中,例如智能手机、平板电脑或者智能手表等具有显示屏幕的电子设备中,其具体为计算机可读介质,存储有计算机程序,该计算机程序被处理器执行时实现本公开任意实施例提供的方法,包括如下步骤S31和S32:The third embodiment of the present disclosure provides a storage medium, which can be installed in any electronic device installed with an application program for controlling IoT devices, such as a smartphone, tablet computer, or smart watch, etc. with a display screen In the electronic device of the present disclosure, it is specifically a computer-readable medium, and stores a computer program. When the computer program is executed by the processor, the method provided by any embodiment of the present disclosure is implemented, including the following steps S31 and S32:

S31,基于加密密钥对第一设备管理密码进行加密,形成验证信息;S31, encrypting the first device management password based on the encryption key to form verification information;

S32,基于验证信息和网络配置信息生成并显示图形识别码,以使物联网设备基于解密密钥对图形识别码中携带的验证信息进行解密,并在解密后得到的解密结果与物联网设备存储的第二设备管理密码相同的情况下,基于网络配置信息进行配网操作;加密密钥和解密密钥对应。S32, generate and display a graphic identification code based on the verification information and the network configuration information, so that the IoT device decrypts the verification information carried in the graphic identification code based on the decryption key, and stores the decryption result obtained after decryption with the IoT device In the case that the management passwords of the second devices are the same, the network configuration operation is performed based on the network configuration information; the encryption key corresponds to the decryption key.

具体地,图形识别码中还携带有用户信息,用以实现物联网设备在配网成功后进行存储。Specifically, the graphic identification code also carries user information, which is used to realize the storage of the IoT device after the network distribution is successful.

计算机程序还被处理器执行如下步骤:在物联网设备配网成功后,基于网络向物联网设备发送携带有用户信息的控制指令,以使物联网设备在基于用户信息进行的验证通过后执行控制指令。The computer program is further executed by the processor as follows: after the Internet of Things device is successfully distributed to the network, sending a control instruction carrying the user information to the Internet of Things device based on the network, so that the Internet of Things device executes control after the verification based on the user information is passed. instruction.

本实施例客户端通过对物联网设备的设备管理密码进行加密后传输,使物联网设备端基于解密后的内容与本地存储的设备管理密码进行对比,实现对客户端的验证操作,并只有在验证通过的情况下才能实现配网,保证物联网设备的网络安全。In this embodiment, the client side encrypts and transmits the device management password of the IoT device, so that the IoT device side compares the decrypted content with the locally stored device management password, so as to realize the verification operation on the client, and only after verification The distribution network can only be realized if the network is passed to ensure the network security of the IoT devices.

本公开第四实施例提供了一种存储介质,该存储介质可安装于任意一种具有摄像头的物联网设备中,例如智能门锁、智能门铃、智能摄像头等,其具体为计算机可读介质,存储有计算机程序,该计算机程序被处理器执行时实现本公开任意实施例提供的方法,包括如下步骤S41至S44:The fourth embodiment of the present disclosure provides a storage medium, which can be installed in any IoT device with a camera, such as a smart door lock, a smart doorbell, a smart camera, etc., which is specifically a computer-readable medium, A computer program is stored, and when the computer program is executed by the processor, implements the method provided by any embodiment of the present disclosure, including the following steps S41 to S44:

S41,扫描客户端展示的图形识别码,其中,图形识别码至少携带有验证信息和网络配置信息,验证信息为客户端基于加密密钥对第一设备管理密码进行加密生成;S41, scan the graphic identification code displayed by the client, wherein the graphic identification carries at least verification information and network configuration information, and the verification information is generated by the client encrypting the first device management password based on the encryption key;

S42,基于解密密钥对验证信息进行解密,得到解密结果;S42, decrypt the verification information based on the decryption key to obtain a decryption result;

S43,检测解密结果与本地存储的第二设备管理密码是否相同;S43, detecting whether the decryption result is the same as the locally stored second device management password;

S44,在解密结果与第二设备管理密码相同的情况下,基于网络配置信息进行配网操作;其中,加密密钥和解密密钥对应。S44, when the decryption result is the same as the second device management password, perform a network configuration operation based on the network configuration information; wherein the encryption key corresponds to the decryption key.

在图形识别码中还携带有用户信息的情况下,计算机程序还被处理器执行如下步骤:在配网成功的情况下,保存用户信息。In the case that the graphic identification code also carries the user information, the computer program is further executed by the processor as follows: in the case that the network distribution is successful, the user information is saved.

计算机程序还被处理器执行如下步骤:在接收到客户端发送的携带有用户信息的控制指令的情况下,检测本地是否保存有用户信息;在本地保存有用户信息的情况下,执行控制指令。The computer program is further executed by the processor as follows: in the case of receiving the control instruction carrying the user information sent by the client, detecting whether the user information is stored locally; and executing the control instruction under the condition that the user information is locally stored.

计算机程序还被处理器执行如下步骤:在解密结果与本地存储的第二设备管理密码不相同,和/或,配网失败的情况下,向客户端反馈配网失败信息。The computer program is further executed by the processor as follows: when the decryption result is different from the locally stored second device management password, and/or when the network configuration fails, feedback network configuration failure information to the client.

本实施例客户端通过对物联网设备的设备管理密码进行加密后传输,使物联网设备端基于解密后的内容与本地存储的设备管理密码进行对比,实现对客户端的验证操作,并只有在验证通过的情况下才能实现配网,保证物联网设备的网络安全。In this embodiment, the client side encrypts and transmits the device management password of the IoT device, so that the IoT device side compares the decrypted content with the locally stored device management password, so as to realize the verification operation on the client, and only after verification The distribution network can only be realized if the network is passed to ensure the network security of the IoT devices.

本公开的第五实施例提供了一种电子设备,该电子设备中可以为任意一种安装有用于控制物联网设备的应用程序的电子设备,例如智能手机、平板电脑或者智能手表等具有显示屏幕的电子设备,其结构示意图如图3所示,至少包括存储器100和处理器200,存储器100上存储有计算机程序,处理器200在执行存储器100上的计算机程序时实现本公开任意实施例提供的方法。示例性的,电子设备计算机程序步骤如下S51和S52:A fifth embodiment of the present disclosure provides an electronic device, which can be any electronic device installed with an application program for controlling IoT devices, such as a smart phone, a tablet computer, or a smart watch, which has a display screen The electronic device, the schematic diagram of which is shown in FIG. 3 , at least includes a memory 100 and a processor 200, the memory 100 stores a computer program, and the processor 200 implements the computer program provided by any embodiment of the present disclosure when executing the computer program on the memory 100. method. Exemplarily, the steps of the electronic device computer program are as follows S51 and S52:

S51,基于加密密钥对第一设备管理密码进行加密,形成验证信息;S51, encrypting the first device management password based on the encryption key to form verification information;

S52,基于验证信息和网络配置信息生成并显示图形识别码,以使物联网设备基于解密密钥对图形识别码中携带的验证信息进行解密,并在解密后得到的解密结果与物联网设备存储的第二设备管理密码相同的情况下,基于网络配置信息进行配网操作;加密密钥和解密密钥对应。S52, generate and display a graphic identification code based on the verification information and the network configuration information, so that the IoT device decrypts the verification information carried in the graphic identification code based on the decryption key, and stores the decryption result obtained after decryption with the IoT device In the case that the management passwords of the second devices are the same, the network configuration operation is performed based on the network configuration information; the encryption key corresponds to the decryption key.

具体地,图形识别码中还携带有用户信息,用以实现物联网设备在配网成功后进行存储。Specifically, the graphic identification code also carries user information, which is used to realize the storage of the IoT device after the network distribution is successful.

处理器还执行存储器上存储的如下计算机程序:在物联网设备配网成功后,基于网络向物联网设备发送携带有用户信息的控制指令,以使物联网设备在基于用户信息进行的验证通过后执行控制指令。The processor also executes the following computer program stored in the memory: after the Internet of Things device is successfully distributed to the network, sends a control instruction carrying the user information to the Internet of Things device based on the network, so that the Internet of Things device passes the verification based on the user information. Execute control commands.

本实施例客户端通过对物联网设备的设备管理密码进行加密后传输,使物联网设备端基于解密后的内容与本地存储的设备管理密码进行对比,实现对客户端的验证操作,并只有在验证通过的情况下才能实现配网,保证物联网设备的网络安全。In this embodiment, the client side encrypts and transmits the device management password of the IoT device, so that the IoT device side compares the decrypted content with the locally stored device management password, so as to realize the verification operation on the client, and only after verification The distribution network can only be realized if the network is passed to ensure the network security of the IoT devices.

本公开的第六实施例提供了一种智能门锁,其在接入网络之后可以根据用户的控制实现远程开锁、临时密码生成等功能。图4示出了该智能门锁的结构示意图,其至少包括摄像头300、存储器400以及处理器500,其中,存储器400上存储有计算机程序,处理器500在执行存储器400上的计算机程序时实现本公开任意实施例提供的方法。示例性的,电子设备计算机程序步骤如下S61至S64:The sixth embodiment of the present disclosure provides an intelligent door lock, which can realize functions such as remote unlocking, temporary password generation and the like according to the control of the user after being connected to the network. FIG. 4 shows a schematic structural diagram of the smart door lock, which at least includes a camera 300, a memory 400 and a processor 500, wherein the memory 400 stores a computer program, and the processor 500 implements the present invention when executing the computer program on the memory 400. The method provided by any of the embodiments is disclosed. Exemplarily, the steps of the electronic device computer program are as follows S61 to S64:

S61,扫描客户端展示的图形识别码,其中,图形识别码至少携带有验证信息和网络配置信息,验证信息为客户端基于加密密钥对第一设备管理密码进行加密生成;S61, scan the graphic identification code displayed by the client, wherein the graphic identification carries at least verification information and network configuration information, and the verification information is generated by the client encrypting the first device management password based on the encryption key;

S62,基于解密密钥对验证信息进行解密,得到解密结果;S62, decrypt the verification information based on the decryption key to obtain a decryption result;

S63,检测解密结果与本地存储的第二设备管理密码是否相同;S63, detecting whether the decryption result is the same as the locally stored second device management password;

S64,在解密结果与第二设备管理密码相同的情况下,基于网络配置信息进行配网操作;其中,加密密钥和解密密钥对应。S64, if the decryption result is the same as the second device management password, perform a network configuration operation based on the network configuration information; wherein the encryption key corresponds to the decryption key.

在图形识别码中还携带有用户信息的情况下,处理器还执行存储器上存储的如下计算机程序:在配网成功的情况下,保存用户信息。In the case that the graphic identification code also carries the user information, the processor also executes the following computer program stored in the memory: in the case that the network configuration is successful, the user information is saved.

处理器还执行存储器上存储的如下计算机程序:在接收到客户端发送的携带有用户信息的控制指令的情况下,检测本地是否保存有用户信息;在本地保存有用户信息的情况下,执行控制指令。The processor also executes the following computer program stored in the memory: in the case of receiving the control instruction that carries the user information sent by the client, detecting whether the user information is stored locally; in the case where the user information is locally stored, executing the control instruction.

处理器还执行存储器上存储的如下计算机程序:在解密结果与本地存储的第二设备管理密码不相同,和/或,配网失败的情况下,向客户端反馈配网失败信息。The processor also executes the following computer program stored in the memory: when the decryption result is not the same as the locally stored second device management password, and/or in the case that the network configuration fails, feedback network configuration failure information to the client.

本实施例客户端通过对物联网设备的设备管理密码进行加密后传输,使物联网设备端基于解密后的内容与本地存储的设备管理密码进行对比,实现对客户端的验证操作,并只有在验证通过的情况下才能实现配网,保证物联网设备的网络安全。In this embodiment, the client side encrypts and transmits the device management password of the IoT device, so that the IoT device side compares the decrypted content with the locally stored device management password, so as to realize the verification operation on the client, and only after verification The distribution network can only be realized if the network is passed to ensure the network security of the IoT devices.

以上对本公开多个实施例进行了详细说明,但本公开不限于这些具体的实施例,本领域技术人员在本公开构思的基础上,能够做出多种变型和修改实施例,这些变型和修改都应落入本公开所要求保护的范围之内。The various embodiments of the present disclosure have been described in detail above, but the present disclosure is not limited to these specific embodiments. Those skilled in the art can make various variations and modifications on the basis of the concept of the present disclosure. These variations and modifications All should fall within the scope of the claimed protection of the present disclosure.

Claims (10)

1.一种物联网设备的配网方法,应用于客户端,其特征在于,包括:1. a network distribution method for Internet of Things equipment, applied to a client, is characterized in that, comprising: 基于加密密钥对第一设备管理密码进行加密,形成验证信息;Encrypting the first device management password based on the encryption key to form verification information; 基于所述验证信息和网络配置信息生成并显示图形识别码,以使物联网设备基于解密密钥对所述图形识别码中携带的所述验证信息进行解密,并在解密后得到的解密结果与所述物联网设备存储的第二设备管理密码相同的情况下,基于所述网络配置信息进行配网操作;Generate and display a graphic identification code based on the verification information and network configuration information, so that the IoT device decrypts the verification information carried in the graphic identification code based on the decryption key, and the decryption result obtained after decryption is the same as the Under the condition that the second device management password stored by the IoT device is the same, perform a network configuration operation based on the network configuration information; 其中,所述加密密钥和所述解密密钥对应。The encryption key corresponds to the decryption key. 2.根据权利要求1所述的配网方法,其特征在于,所述图形识别码中还携带有用户信息,用以实现所述物联网设备在配网成功后进行存储。2 . The network distribution method according to claim 1 , wherein the graphic identification code also carries user information, so as to realize the storage of the Internet of Things device after the network distribution is successful. 3 . 3.根据权利要求2所述的配网方法,其特征在于,还包括:3. The network distribution method according to claim 2, characterized in that, further comprising: 在所述物联网设备配网成功后,基于网络向所述物联网设备发送携带有所述用户信息的控制指令,以使所述物联网设备在基于所述用户信息进行的验证通过后执行所述控制指令。After the Internet of Things device is successfully allocated to the network, send a control instruction carrying the user information to the Internet of Things device based on the network, so that the Internet of Things device executes all operations after passing the verification based on the user information. the control command. 4.一种物联网设备的配网方法,应用于物联网设备,其特征在于,包括:4. A network distribution method for Internet of Things equipment, applied to the Internet of Things equipment, characterized in that, comprising: 扫描客户端展示的图形识别码,其中,所述图形识别码至少携带有验证信息和网络配置信息,所述验证信息为所述客户端基于加密密钥对第一设备管理密码进行加密生成;Scan the graphic identification code displayed by the client, wherein the graphic identification carries at least verification information and network configuration information, and the verification information is generated by the client encrypting the first device management password based on the encryption key; 基于解密密钥对所述验证信息进行解密,得到解密结果;Decrypt the verification information based on the decryption key to obtain a decryption result; 检测所述解密结果与本地存储的第二设备管理密码是否相同;Detecting whether the decryption result is the same as the locally stored second device management password; 在所述解密结果与所述第二设备管理密码相同的情况下,基于所述网络配置信息进行配网操作;In the case that the decryption result is the same as the second device management password, perform a network configuration operation based on the network configuration information; 其中,所述加密密钥和所述解密密钥对应。The encryption key corresponds to the decryption key. 5.根据权利要求4所述的配网方法,其特征在于,所述图形识别码中还携带有用户信息,所述配网方法还包括:5. The network distribution method according to claim 4, wherein the graphic identification code also carries user information, and the network distribution method further comprises: 在配网成功的情况下,保存所述用户信息。In the case of successful network distribution, the user information is saved. 6.根据权利要求5所述的配网方法,其特征在于,还包括:6. The network distribution method according to claim 5, characterized in that, further comprising: 在接收到所述客户端发送的携带有用户信息的控制指令的情况下,检测本地是否保存有所述用户信息;Detecting whether the user information is stored locally in the case of receiving the control instruction that carries the user information sent by the client; 在本地保存有所述用户信息的情况下,执行所述控制指令。When the user information is stored locally, the control instruction is executed. 7.根据权利要求4至6中任一项所述的配网方法,其特征在于,还包括:7. The network distribution method according to any one of claims 4 to 6, characterized in that, further comprising: 在所述解密结果与本地存储的第二设备管理密码不相同,和/或,配网失败的情况下,向所述客户端反馈配网失败信息。In the case that the decryption result is different from the locally stored second device management password, and/or the network configuration fails, the network configuration failure information is fed back to the client. 8.一种存储介质,存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现权利要求1至7中任一项所述的物联网设备的配网方法的步骤。8 . A storage medium storing a computer program, wherein when the computer program is executed by a processor, the steps of the method for network distribution of an Internet of Things device according to any one of claims 1 to 7 are implemented. 9 . 9.一种电子设备,至少包括存储器、处理器,所述存储器上存储有计算机程序,其特征在于,所述处理器在执行所述存储器上的计算机程序时实现权利要求1至3中任一项所述的物联网设备的配网方法的步骤。9. An electronic device, comprising at least a memory and a processor, wherein a computer program is stored on the memory, wherein the processor implements any one of claims 1 to 3 when executing the computer program on the memory The steps of the method for network distribution of the Internet of Things device described in item. 10.一种智能门锁,至少包括摄像头、存储器、处理器,所述存储器上存储有计算机程序,其特征在于,所述处理器在执行所述存储器上的计算机程序时实现权利要求4至7中任一项所述的物联网设备的配网方法的步骤。10. An intelligent door lock, comprising at least a camera, a memory, and a processor, and a computer program is stored on the memory, wherein the processor implements claims 4 to 7 when executing the computer program on the memory The steps of any one of the network distribution methods for Internet of Things devices.
CN202111624202.XA 2021-12-28 2021-12-28 Network distribution method of Internet of things equipment, storage medium, electronic equipment and intelligent door lock Pending CN114338150A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111624202.XA CN114338150A (en) 2021-12-28 2021-12-28 Network distribution method of Internet of things equipment, storage medium, electronic equipment and intelligent door lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111624202.XA CN114338150A (en) 2021-12-28 2021-12-28 Network distribution method of Internet of things equipment, storage medium, electronic equipment and intelligent door lock

Publications (1)

Publication Number Publication Date
CN114338150A true CN114338150A (en) 2022-04-12

Family

ID=81014242

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111624202.XA Pending CN114338150A (en) 2021-12-28 2021-12-28 Network distribution method of Internet of things equipment, storage medium, electronic equipment and intelligent door lock

Country Status (1)

Country Link
CN (1) CN114338150A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118102293A (en) * 2024-04-29 2024-05-28 浙江华昱欣科技有限公司 Wireless device password setting method, wireless device password setting device, computer device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108366362A (en) * 2018-02-01 2018-08-03 乐鑫信息科技(上海)有限公司 MESH network and its MESH equipment safeties match network method
CN108990053A (en) * 2018-07-04 2018-12-11 杭州涂鸦信息技术有限公司 A method of making the smart machine intelligent networking with camera
CN110462692A (en) * 2017-03-29 2019-11-15 云丁网络技术(北京)有限公司 A kind of safety communicating method and its intelligent door lock system based on intelligent door lock system
EP3748527A1 (en) * 2019-06-06 2020-12-09 Secure Thingz Limited Multiprocessor system being configured for communicating in a mobile communication network
CN112348997A (en) * 2019-08-08 2021-02-09 云丁网络技术(北京)有限公司 Intelligent door lock control method, device and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110462692A (en) * 2017-03-29 2019-11-15 云丁网络技术(北京)有限公司 A kind of safety communicating method and its intelligent door lock system based on intelligent door lock system
CN108366362A (en) * 2018-02-01 2018-08-03 乐鑫信息科技(上海)有限公司 MESH network and its MESH equipment safeties match network method
CN108990053A (en) * 2018-07-04 2018-12-11 杭州涂鸦信息技术有限公司 A method of making the smart machine intelligent networking with camera
EP3748527A1 (en) * 2019-06-06 2020-12-09 Secure Thingz Limited Multiprocessor system being configured for communicating in a mobile communication network
CN112348997A (en) * 2019-08-08 2021-02-09 云丁网络技术(北京)有限公司 Intelligent door lock control method, device and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118102293A (en) * 2024-04-29 2024-05-28 浙江华昱欣科技有限公司 Wireless device password setting method, wireless device password setting device, computer device and storage medium

Similar Documents

Publication Publication Date Title
JP7257561B2 (en) computer-implemented method, host computer, computer-readable medium
CN111277577B (en) Digital identity verification method, device, equipment and storage medium
CN108809659B (en) Dynamic password generation method, dynamic password verification method, dynamic password system and dynamic password verification system
US7392387B2 (en) Apparatus and methods for providing secured communication
US10637650B2 (en) Active authentication session transfer
CN103929306B (en) The approaches to IM of intelligent cipher key equipment and intelligent cipher key equipment
US20130007465A1 (en) Apparatus, Systems and Method for Virtual Desktop Access and Management
US9621344B2 (en) Method and system for recovering a security credential
WO2015149582A1 (en) Password input method, intelligent secret key device and client apparatus
US20140181529A1 (en) Verification of password using a keyboard with a secure password entry mode
US20180091487A1 (en) Electronic device, server and communication system for securely transmitting information
US20120002234A1 (en) Approach For Securely Printing Electronic Documents
US8953805B2 (en) Authentication information generating system, authentication information generating method, client apparatus, and authentication information generating program for implementing the method
CN104299300B (en) The unblanking and close locking method of safety intelligent lock system based on NFC
US10474804B2 (en) Login mechanism for operating system
CN110932951B (en) Intelligent household control method and device
KR20200067987A (en) Method of login control
CN114338150A (en) Network distribution method of Internet of things equipment, storage medium, electronic equipment and intelligent door lock
CN112887261B (en) Method for protecting data flow between communication equipment and remote terminal, and equipment for implementing said method
CN113593088A (en) Intelligent unlocking method, intelligent lock, mobile terminal and server
KR101379854B1 (en) Apparatus and method for protecting authenticated certificate password
TWI871873B (en) Electronic access control system and operation method thereof
WO2023154419A2 (en) Access control systems and methods for cryptowallets
CN108334787B (en) Safety document management system
CN115618419A (en) Information query method and device, readable medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220412

RJ01 Rejection of invention patent application after publication