CN110263525B - Equipment configuration method and device - Google Patents

Equipment configuration method and device Download PDF

Info

Publication number
CN110263525B
CN110263525B CN201810186415.0A CN201810186415A CN110263525B CN 110263525 B CN110263525 B CN 110263525B CN 201810186415 A CN201810186415 A CN 201810186415A CN 110263525 B CN110263525 B CN 110263525B
Authority
CN
China
Prior art keywords
authentication
page
target
equipment
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810186415.0A
Other languages
Chinese (zh)
Other versions
CN110263525A (en
Inventor
唐朱震
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN201810186415.0A priority Critical patent/CN110263525B/en
Publication of CN110263525A publication Critical patent/CN110263525A/en
Application granted granted Critical
Publication of CN110263525B publication Critical patent/CN110263525B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44521Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a device configuration method and device, and belongs to the technical field of networks. The method comprises the following steps: when a configuration instruction is received, starting an agent service program and a local application shell program, and transmitting stored login information of the target equipment into the local application shell program; loading a target page in the proxy service program through a local application shell program, and loading login information of target equipment into the target page; and displaying the configuration page of the target equipment after the authentication is successful according to the authentication method. Based on the interaction among the main program, the proxy service program and the local application shell program, when the equipment added in the main program needs to be configured, the login-free equipment is realized according to the stored login information, namely, login information such as a user name, a password and the like is avoided, namely, a configuration page of the equipment can be opened, so that the equipment is configured, the condition that the user needs to input the login information when configuring the equipment every time is avoided, and the operation is simplified.

Description

Equipment configuration method and device
Technical Field
The present invention relates to the field of network technologies, and in particular, to a device configuration method and apparatus.
Background
With the development of network technology, more and more devices can access a network, and a user can configure the functional parameters of the devices based on a webpage.
Currently, the specific process of device configuration is as follows: the user inputs a device domain name or an IP (Internet Protocol) address on a browser of the terminal to trigger the terminal to open a login page of the device. Then, the user can manually input login information such as a user name and a password in the login page to trigger the terminal to open a configuration page of the device, and then the user can configure various functional parameters of the device in the configuration page.
In the process of implementing the invention, the inventor finds that the related art has at least the following problems:
according to the technology, the user is required to manually input login information to enter the configuration page during each configuration, the operation is complex, and when the number of managed devices is large, the login information is recorded by the user with large workload and poor experience. How to conveniently configure the equipment becomes a problem to be solved urgently.
Disclosure of Invention
The embodiment of the invention provides a device configuration method and a device, which can solve the problem of complicated operation in the related art. The technical scheme is as follows:
in a first aspect, a device configuration method is provided, where the method includes:
when a configuration instruction is received, starting an agent service program and a local application shell program, and transmitting stored login information of a target device into the local application shell program, wherein the configuration instruction is used for configuring the target device added in the main program;
loading a target page in the proxy service program through the local application shell program, and loading login information of the target equipment into the target page, wherein the target page is used for providing an authentication method for requesting identity authentication to the target equipment according to the login information;
and when the authentication is successful according to the authentication method, displaying a configuration page of the target equipment, wherein the configuration page is used for configuring the target equipment.
In one possible implementation, the successfully authenticating according to the authentication method includes:
sending an authentication probe request to the target device, wherein the authentication probe request is used for acquiring an authentication type supported by the target device;
when receiving the authentication type supported by the target equipment, sending an authentication request to the target equipment according to the login information of the target equipment and the authentication type supported by the target equipment;
and receiving an authentication success message sent by the target equipment.
In one possible implementation manner, the sending an authentication request to the target device according to the login information of the target device and the authentication type supported by the target device includes:
processing the login information of the target equipment according to the authentication type supported by the target equipment to obtain the authentication information of the target equipment;
and sending the authentication request to the target equipment, wherein the authentication request carries the authentication information.
In one possible implementation manner, the displaying the configuration page of the target device includes:
sending a data request to the target device, wherein the data request is used for acquiring page data of the configuration page;
when the page data is received, rendering the configuration page based on the page data.
In one possible implementation, before the receiving the configuration instruction, the method further includes:
starting a main program, and displaying a page of the main program, wherein the page comprises an equipment adding button;
when the clicking operation on the button of the adding equipment is detected, displaying an adding page of the equipment;
adding the target device to the main program when login information of the target device input in the device addition page is received;
and storing the login information of the target equipment.
In a second aspect, an apparatus for configuring a device is provided, the apparatus comprising:
the starting module is used for starting an agent service program and a local application shell program when a configuration instruction is received, and transferring the stored login information of the target equipment into the local application shell program, wherein the configuration instruction is used for configuring the target equipment added in the main program;
a loading module, configured to load a target page in the proxy service program through the local application shell program, and load login information of the target device into the target page, where the target page is used to provide an authentication method for requesting identity authentication from the target device according to the login information;
and the display module is used for displaying a configuration page of the target equipment after the authentication is successful according to the authentication method, wherein the configuration page is used for configuring the target equipment.
In one possible implementation, the apparatus further includes:
the authentication module is used for sending an authentication detection request to the target equipment, wherein the authentication detection request is used for acquiring an authentication type supported by the target equipment; when receiving the authentication type supported by the target equipment, sending an authentication request to the target equipment according to the login information of the target equipment and the authentication type supported by the target equipment; and receiving an authentication success message sent by the target equipment.
In a possible implementation manner, the authentication module is configured to process login information of the target device according to an authentication type supported by the target device, so as to obtain authentication information of the target device; and sending the authentication request to the target equipment, wherein the authentication request carries the authentication information.
In a possible implementation manner, the display module is configured to send a data request to the target device, where the data request is used to obtain page data of the configuration page; when the page data is received, rendering the configuration page based on the page data.
In one possible implementation, the method further includes:
the starting module is also used for starting a main program and displaying a page of the main program, wherein the page comprises an equipment adding button;
the display module is further used for displaying an adding page of the equipment when the clicking operation of the adding equipment button is detected;
an adding module, configured to add the target device to the main program when login information of the target device input in the device adding page is received;
and the storage module is used for storing the login information of the target equipment.
In a third aspect, a terminal is provided that includes a processor and a memory; the memory is used for storing a computer program; the processor is configured to execute the computer program stored in the memory to implement the method steps of any one of the implementation manners of the first aspect.
In a fourth aspect, a computer-readable storage medium is provided, in which a computer program is stored which, when being executed by a processor, carries out the method steps of any of the implementations of the first aspect.
The technical scheme provided by the embodiment of the invention has the following beneficial effects:
through interaction among the main program, the proxy service program and the local application shell program, when equipment added in the main program needs to be configured, login-free of the equipment is achieved according to stored login information, namely login information such as a user name and a password is omitted, a configuration page of the equipment can be opened, the equipment is configured, the fact that a user needs to input the login information when the user configures the equipment every time is avoided, and operation is simplified.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic diagram of an apparatus configuration system according to an embodiment of the present invention;
fig. 2 is a flowchart of a device configuration method according to an embodiment of the present invention;
fig. 3 is a flowchart of a device configuration method according to an embodiment of the present invention;
fig. 4 is a flowchart of a device configuration method according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of a process for multiple authentication flows according to an embodiment of the present invention;
FIG. 6 is a schematic structural diagram of an apparatus configuration device according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an apparatus configuration device according to an embodiment of the present invention;
FIG. 8 is a schematic structural diagram of an apparatus configuration device according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of a terminal 900 according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
Fig. 1 is a schematic diagram of a device configuration system according to an embodiment of the present invention, where the device configuration system may include: a terminal 101 and at least one electronic device 102.
The terminal 101 may be a PC (Personal Computer), a mobile phone, or the like, and a Client (Client) is installed on the terminal 101, and the Client is a program and a core module for managing devices and other modules, and includes functions of device management, remote playback, preview, and the like. The client comprises a main program, a local application shell program and a proxy service program, and is used for providing configuration service of the target device.
The main program is responsible for the first access of the electronic equipment and storing equipment information (including login information such as a user name and a password) of the electronic equipment, and the main program can interact with the agent service program and the local application shell program. For example, the main program may launch a native application shell to load and execute a target page, such as a dispatch. Html page is written into the agent service program by the main program which can control the switch (starting and closing), setting and state monitoring of the agent service program. Html page is stored in agent service program, and is requested and loaded when local application shell program is started, it provides interface for local application shell calling, and also includes authentication method for making identity authentication according to said login information, said authentication method includes method for requesting equipment authentication detection and authentication (login).
The local application shell program is a program which runs independently and can schedule a kernel of a system with a browser to finish rendering of a corresponding webpage. The local application shell program is responsible for receiving commands such as login information of a main program, and can be embedded with a kernel of a browser (used for requesting downloading, interpretation, execution and rendering of a webpage from an agent service program), and the kernel of the browser, namely a rendering engine adopted by the browser, determines how the browser displays the content of the webpage and the format information of the webpage. For example, a browser may be installed in the terminal system, and the kernel of the browser is embedded into the local application shell program, so that when the terminal starts the local application shell program, the local application shell program can directly load the kernel of the browser.
The proxy service program, i.e., HTTP (hypertext Transfer Protocol) proxy service program, is software that runs on a terminal and is responsible for processing HTTP requests and responses between the entire client and the electronic device. Html page is included in the proxy server. When the terminal using the proxy service program exchanges information with other devices in the network, the information is firstly sent to the proxy service program, the proxy service program forwards the information to the other devices, and the responses of the other devices are returned to the terminal.
HTTP request pass-through may be performed between the local application shell program and the proxy service program, for example, the local application shell program may initiate an HTTP request, and the proxy service program forwards the HTTP request to the corresponding device.
The electronic device 102 may be a device with a built-in web configuration function, such as a security industry device, such as NVR (network Video Recorder), IPC (IP Camera), DVR (Digital Video Recorder), and so on. The web configuration function is a function of implementing configuration through a web page, the web configuration function may be implemented by a web program built in the electronic device 102, the web program is an application program accessible through a web, the web program enables a user to easily access through a terminal, the terminal only needs to be installed with a browser to implement access to the web program, for example, data of a configuration page is acquired from the web program, and the configuration page of the device is rendered based on the data.
Fig. 2 is a flowchart of a device configuration method according to an embodiment of the present invention. Referring to fig. 2, the method includes:
201. when a configuration instruction is received, the proxy service program and the local application shell program are started, and the stored login information of the target device is transmitted into the local application shell program, wherein the configuration instruction is used for configuring the target device added in the main program.
202. And loading a target page in the proxy service program through the local application shell program, and loading login information of the target equipment into the target page, wherein the target page is used for providing an authentication method for requesting identity authentication to the target equipment according to the login information.
203. And when the authentication is successful according to the authentication method, displaying a configuration page of the target equipment, wherein the configuration page is used for configuring the target equipment.
According to the method provided by the embodiment of the invention, based on the interaction among the main program, the proxy service program and the local application shell program, when the equipment added in the main program needs to be configured, the login-free of the equipment is realized according to the stored login information, namely, the login information such as a user name, a password and the like is avoided, and the configuration page of the equipment can be opened, so that the equipment is configured, the login information is prevented from being input when the user configures the equipment each time, and the operation is simplified.
Optionally, the successfully authenticating according to the authentication method includes:
sending an authentication probe request to the target device, wherein the authentication probe request is used for acquiring an authentication type supported by the target device;
when receiving the authentication type supported by the target equipment, sending an authentication request to the target equipment according to the login information of the target equipment and the authentication type supported by the target equipment;
and receiving an authentication success message sent by the target device.
Optionally, the sending an authentication request to the target device according to the login information of the target device and the authentication type supported by the target device includes:
processing the login information of the target equipment according to the authentication type supported by the target equipment to obtain the authentication information of the target equipment;
and sending the authentication request to the target equipment, wherein the authentication request carries the authentication information.
Optionally, the displaying the configuration page of the target device includes:
sending a data request to the target device, wherein the data request is used for acquiring page data of the configuration page;
when the page data is received, the configuration page is rendered based on the page data.
Optionally, before the receiving the configuration instruction, the method further includes:
starting a main program, and displaying a page of the main program, wherein the page comprises an equipment adding button;
when the clicking operation on the button of the adding equipment is detected, displaying an adding page of the equipment;
adding the target device to the main program when the login information of the target device input in the device addition page is received;
the login information of the target device is stored.
All the above-mentioned optional technical solutions can be combined arbitrarily to form the optional embodiments of the present invention, and are not described herein again.
Fig. 3 is a flowchart of a device configuration method according to an embodiment of the present invention. The method is executed by a terminal, specifically by a client on the terminal, and referring to fig. 3, the method includes:
301. and after the main program is started, displaying a page of the main program, wherein the page comprises an equipment adding button.
The page may be the home page of the main program, or any page of the main program.
In the embodiment of the invention, the starting of the main program can be triggered by clicking the client icon by a user, when the terminal detects the clicking operation, the main program in the client can be started, the home page of the main program is displayed, and the button for adding equipment is displayed on the home page. Or, the user may click on the home page, for example, click on a function option, so that the terminal may jump from the home page of the main program to a corresponding page, where an add device button is displayed on the page.
302. And when the clicking operation on the button of the adding device is detected, the adding page of the display device is displayed.
In the embodiment of the invention, in the process of displaying the main program page by the terminal, a user can click the button of the added equipment in the page, and the terminal displays an equipment added page according to the click operation of the user. The device add page may provide input boxes for the user to enter login information, such as a username input box and a password input box. Of course, the device add page may also provide an input box for the user to input information of other devices, such as an IP address input box of the device, which is not limited in the embodiment of the present invention.
303. When the login information of the target device input in the device addition page is received, the target device is added to the main program.
The target device refers to an electronic device which needs to be configured by a user.
In the embodiment of the invention, in the process of adding the page by the terminal display device, the user can input login information such as a user name, a password and the like in the device adding page, for example, the user name of the target device is input in a user name input box, and the password of the target device is input in a password input box, so that the terminal can acquire the login information of the target device from the device adding page. When the login information is successfully verified, the terminal can add the target device to the main program. The verification process of the login information may be implemented in a Software Development Kit (SDK) mode, where the SDK is an integrated library compiled by C + + and includes a private protocol and an interface for communicating with the device. Specifically, the terminal may send the login information to the target device based on a private protocol between the client and the target device, and the target device compares the received login information with the login information stored locally by the target device, and if the two are the same, the authentication is successful.
Of course, the user may also input other information of the target device in the device addition page, for example, input the IP address of the target device in the IP address input box, so that the terminal may acquire not only the login information of the target device from the device addition page but also the IP address of the target device.
It should be noted that the above steps 301 to 303 are one possible implementation manner of adding the target device through the main program. The mode is a case where the addition is successful, and in fact, a case where the addition is failed may also occur, such as that the target device does not currently access the network, or an input user name does not exist, or an input password is incorrect, and the like. In this case, the terminal may display a prompt message to prompt the user to perform input again.
304. The login information of the target device is stored.
In the embodiment of the invention, after the target equipment is successfully added, the terminal can store the login information of the target equipment, for example, the login information of the target equipment is recorded to a local database. Of course, the terminal may also store other device information of the target device, which is not specifically limited in this embodiment of the present invention.
It should be noted that, the above steps 301 to 304 are one possible implementation manner for the terminal to access the target device through the client and store the login information of the target device. By storing the login information of the target device when accessing the target device for the first time, if the user wants to configure the target device, such as adjusting some parameters of the target device, during the use of the target device, the subsequent steps 305 to 317 can be directly performed without inputting login information such as a user name and a password.
305. Receiving a configuration instruction for a target device, wherein the configuration instruction is used for configuring the target device added in the main program.
The configuration instruction may be triggered by a click operation of a user on a configuration option, for example, the terminal may display a device page of the main program, where the device page is used to display all devices added to the main program and corresponding configuration options, where all the added devices correspond to one configuration option, or each added device corresponds to one configuration option.
If the user wants to configure any added device, one device can be selected as a target device, and a configuration option corresponding to the target device is clicked to trigger a configuration instruction for the target device, so that the terminal receives the configuration instruction for the target device.
306. And reading the configured agent port information.
Wherein the proxy port information may be HTTP proxy port information.
In the embodiment of the present invention, the terminal may determine the configured HTTP proxy port according to the configured HTTP proxy port information, where the HTTP proxy port is a port of a proxy service program, and is used to provide proxy services, such as forwarding an HTTP request and a response of the HTTP request. For example, the port of the proxy service may be 8080.
307. And when the port corresponding to the agent port information is not occupied, starting the agent service program.
Wherein the proxy server is configured to forward requests and responses between the client and the target device.
In the embodiment of the present invention, if the configured proxy port is not occupied, which indicates that the proxy service program can normally provide the proxy service, at this time, the terminal may start the proxy service program, and generate a target page, such as a dispatch. Html page can be written into the proxy root directory of the proxy service program by the main program of the terminal, for example. Html page may also be stored in the proxy server in a statically configured form, as will be appreciated.
It should be noted that, in this step 307, the configured port is not occupied, and actually, the configured proxy port may also be occupied, in this case, the terminal may display a prompt message for prompting the user to modify and store the proxy port information, and then execute the above steps 306 and 307. For example, a user may attempt to select a different port within the port selection interval of the proxy server, and when any port is unoccupied, the proxy port information may be modified, such as modifying an occupied port to the unoccupied port.
It should be noted that, in the embodiment of the present invention, the terminal executes the above-mentioned step 306 to step 307 after executing the above-mentioned step 305, that is, after receiving the configuration instruction, the terminal detects or sets the proxy port, and starts the proxy service program. In fact, the terminal may also perform the above-mentioned steps 306 to 307 after performing the above-mentioned step 301, that is, after starting the main program, the terminal detects or sets the proxy port and starts the proxy service program.
308. And starting a local application shell program, and transmitting the stored login information of the target device to the local application shell program.
In the embodiment of the present invention, after the terminal starts the local application shell program, the terminal may obtain the stored login information of the target device, for example, obtain the login information of the target device from the local database, and transmit the login information of the target device into the local application shell program.
It should be noted that, the above steps 305 to 308 are one possible implementation manner of starting the proxy service program and the local application shell program when the configuration instruction is received, and transferring the stored login information of the target device into the local application shell program. In this implementation manner, when the terminal receives the configuration instruction, the proxy service program is started, that is, when the user selects a certain device for configuration, the terminal is triggered to start the proxy service program and the local application shell program, and the forwarding address of the proxy service program is set in the subsequent step 309, so as to implement subsequent HTTP request transparent transmission. Therefore, after the configuration is completed, when the terminal closes the local application shell program, the proxy service program is also closed at the same time.
In fact, the terminal may start the proxy service program at other times, for example, the terminal may start the proxy service program after starting the main program, and then start the local application shell program when receiving the configuration instruction. That is, after the terminal starts the proxy service program, when the user selects a device to configure, the terminal is triggered to start the local application shell, so that the main program carries a corresponding device address in the HTTP request when transmitting the HTTP request of the local application shell program, and the HTTP request subsequently sent by the local application shell program carries a forwarding address (device address), so that the proxy service program forwards the request by identifying the address in the HTTP request. Therefore, after the configuration is completed, the proxy service program does not need to be closed when the terminal closes the local application shell.
309. And setting the forwarding address of the proxy service program as the address of the target device.
In the embodiment of the invention, as the user selects to configure the target equipment, the terminal can set the forwarding address of the proxy service program as the address of the target equipment, and if the proxy service program is already set with the forwarding address, the current forwarding address is modified into the forwarding address of the target equipment. Thus, in the configuration process, the proxy service program can forward the HTTP request initiated by the terminal to the target device and forward the HTTP response returned by the target device to the terminal.
It should be noted that the above steps 301 to 309 may actually be executed by a main program in the client of the terminal.
310. And loading a target page in the proxy service program through the local application shell program, and loading login information of the target equipment into the target page, wherein the target page is used for providing an authentication method for requesting identity authentication to the target equipment according to the login information.
Html page, wherein the target page may refer to dispatch.
In this embodiment of the present invention, after the local application shell program is started, the kernel of the browser may be loaded, and the kernel of the browser is used to load a dispatch.html page in the proxy service program and execute the dispatch.html page, that is, according to the method provided by the target page, an identity verification is requested from the target device, so as to obtain the configuration page of the target device, where the specific process includes calling an interface provided by the dispatch.html page to the local application shell program to load login information of the target device into the dispatch.html page, and subsequent steps 311 to 317.
311. And sending an authentication probe request to the target device, wherein the authentication probe request is used for acquiring the authentication types supported by the target device.
The device type may include Basic authentication and Digest authentication, among others. The Basic authentication is that a terminal encrypts login information such as a user name and a password in a Base64 encryption mode, an encrypted ciphertext is carried in an HTTP request, a target device decrypts the ciphertext after receiving the HTTP request, the decrypted user name and the decrypted password are compared with the locally stored user name and the locally stored password for verification, if the user name and the password are correct, the authentication is passed, namely the login is successful, and the target device sends requested data to the terminal according to the HTTP request. Digest authentication is to perform Digest operation on login information, such as MD5(Message-Digest Algorithm 5, information-Digest Algorithm 5) operation, to obtain a login Digest, then carry the login Digest in an HTTP request, and after receiving the HTTP request, perform Digest operation on locally stored login information of a target device, compare the operation result with the received login Digest, and if the operation result is the same as the received login Digest, the authentication is passed, that is, the login is successful.
In the embodiment of the present invention, if the terminal wants to send a data request to a target device that needs to be authenticated, for example, request data of a configuration page, the terminal first needs to pass authentication of the target device, and wants to successfully authenticate, it needs to know an authentication type supported by the target device. For this purpose, the terminal may send an authentication probe request to the target device according to the device authentication probe method provided by the target page, and specifically, the local application shell program of the terminal may initiate the authentication probe request by using the kernel of the browser, and the authentication probe request is forwarded to the target device by the proxy service program.
312. Receiving authentication types supported by the target device.
The authentication types supported by the target device may only include Basic authentication, may also include Digest authentication, and may also include two authentication types, namely Basic authentication and Digest authentication. When the target device supports multiple authentication types, the terminal may select one authentication type with the highest security as the authentication type supported by the target device.
In the embodiment of the present invention, after receiving the authentication probe request sent by the terminal, the target device may return the authentication type supported by the target device to the terminal according to the authentication probe request, for example, the target device may carry the authentication type in the authentication probe response and return the authentication type to the terminal. Specifically, the target device may send the authentication type to a proxy service program of the terminal, and the proxy service program forwards the authentication type to the local application shell program, so that a browser kernel in the local application shell program may receive the authentication type supported by the target device.
313. And sending an authentication request to the target equipment according to the login information of the target equipment and the authentication type supported by the target equipment.
In the embodiment of the invention, after the terminal acquires the authentication type supported by the target equipment, the authentication request can be assembled by combining the login information according to the authentication type. That is, the terminal may perform corresponding processing on the login information according to the authentication type, and then send an authentication request to the target device based on the processed login information.
In one possible implementation, the sending, by the terminal, the authentication request to the target device includes: processing the login information of the target equipment according to the authentication type supported by the target equipment to obtain the authentication information of the target equipment; and sending the authentication request to the target equipment, wherein the authentication request carries the authentication information.
Taking the authentication type as Basic authentication as an example, the terminal may encrypt the login information of the target device in a Base64 encryption manner to obtain a ciphertext, and the ciphertext is carried in the authentication request as the authentication information and sent to the target device. Taking the authentication type as Digest authentication as an example, the terminal may perform Digest operation on the login information of the target device to obtain a login Digest, and the login Digest is taken as authentication information and carried in the authentication request to be sent to the target device.
314. And receiving an authentication success message sent by the target equipment.
In the embodiment of the invention, after receiving the authentication request of the terminal, the target device can acquire the authentication information from the authentication request and perform authentication according to the authentication information. For example, the authentication type supported by the target device is Basic authentication, and the authentication information carried in the authentication request may be a ciphertext obtained by encrypting the login information. Correspondingly, after receiving the authentication request, the target device may obtain a ciphertext from the authentication request, decrypt the ciphertext, compare and verify the decrypted user name and password with the locally stored user name and password, if the user name and password are correct, the authentication is passed, and at this time, the target device may return an authentication success message to the terminal.
For example, the authentication type supported by the target device is Digest authentication, and the authentication information may be a login Digest obtained by performing Digest operation on login information. Accordingly, after receiving the authentication request, the target device may perform digest operation on the login information stored locally, compare the operation result with the received login digest, and if the operation result is the same as the received login digest, the authentication is passed, and at this time, the target device may return an authentication success message to the terminal.
After receiving the authentication success message, the terminal indicates that the login is successful, and the terminal may store the authentication information used in the authentication process, for example, a local application shell program of the terminal may store the authentication information by using a browser memory. The storage of the authentication information may be temporary storage, and after the configuration process is finished, the terminal may delete the authentication information.
It should be noted that, in the embodiment of the present invention, only two authentication manners, i.e., Basic authentication and Digest authentication, are taken as examples for description, and actually, the target device may further support other authentication manners, such as a session ID authentication manner, in this case, the terminal may obtain a session ID returned by the target device according to an authentication process corresponding to the authentication manner, store the session ID as authentication information, and send the session ID to the target device in a data request when subsequently requesting data from the target device.
It should be noted that, the embodiment of the present invention is described by taking the received authentication success message as an example, actually, if the authentication fails, the target device returns an authentication failure message to the terminal, so that the terminal receives the authentication failure message, or the terminal does not receive any return result due to network timeout, which indicates that the login fails, in this case, the terminal may display a prompt message to prompt the user that the login fails, and close the local application shell program, and at the same time, the terminal may also close the proxy service program.
It should be noted that, the above steps 311 to 314 are one possible implementation manner of successfully authenticating according to the authentication method provided by the target page. The above steps 310 to 314 are a flow of the terminal processing multiple authentications, where multiple authentications means that the target device may support multiple authentication types. The above steps 310 to 314 can be actually performed by the local application shell, specifically, the local application shell calls the browser kernel to perform the execution, and accordingly, the steps 310 to 314 are procedures of the local application shell calling the browser kernel to perform the login operation.
315. And sending a data request to the target device, wherein the data request is used for acquiring the page data of the configuration page.
The data request may carry authentication information of the target device, such as a ciphertext, a login digest, or a session ID.
In the embodiment of the invention, after the authentication is successful, namely the login is successful, the terminal can adopt a mode of sending a data request to request the target equipment for page data of the configuration page so as to render the configuration page of the target equipment.
316. And when receiving page data sent by the target device, rendering the configuration page based on the page data.
Wherein the page data is used to render a configuration page of the target device.
In the embodiment of the present invention, after receiving a data request of a target device, a terminal may send data of a configuration page to the terminal, and specifically, the target device may send the data to a proxy service program, and the proxy service program forwards the data to a local application shell program of the terminal.
317. Based on the page data, a configuration page of the target device is rendered.
The configuration page is used for configuring the target device.
In the embodiment of the present invention, the terminal may render a configuration page of the target device based on the received page data, so that a user may configure the target device in the configuration page, for example, modify a certain configuration parameter of the target device.
It should be noted that, the above steps 315 to 318 are one possible implementation manner of displaying the configuration page of the target device after the authentication is successful according to the authentication method.
The above steps 310 to 317 may be actually performed by a local application shell in the client, specifically, by the local application shell calling the browser kernel, wherein the request and the response between the terminal and the target device are both forwarded through the proxy service. For example, this step 317 is actually the native application shell rendering the configuration page of the target device based on the configuration page data using the browser kernel.
In order to facilitate a more intuitive understanding of the technical solutions in steps 301 to 317, the following describes an overall flow of the technical solutions with reference to fig. 4. Referring to fig. 4, a flowchart of a device configuration method is provided, after a main program of a client is started, a user clicks an add device, and a device add page pops up. Then, the user can input login information (user name and password) to judge whether the main program is successfully added to the equipment, and if the addition fails, the main program can prompt the user to input again; if the addition is successful, the host program may record the device information (including the login information) to the database. When equipment needs to be configured, a user selects added equipment from a main program, clicks configuration options, then the main program can read configured HTTP proxy port information and detect whether an HTTP proxy port in the configuration is occupied locally, and if yes, the user is prompted to modify the HTTP proxy port information and save the HTTP proxy port information; if not, the host program may launch an HTTP proxy service (proxy root directory generates dispatch. html page). The main program may then launch the local application shell program, passing in the login information for the currently selected device. And then, the main program modifies the forwarding address of the HTTP proxy service program into the device address.
Furthermore, the local application shell program may load a dispatch.html page and call an interface provided by the dispatch.html page to import login information, then perform a login operation (send an authentication probe request and an authentication request) based on the dispatch.html page, and the HTTP proxy service program forwards the request to the target device and receives a result returned by the target device. The client can judge whether the authentication (or login) is successful according to the returned result, if not, the login is prompted to fail, and the local application shell program is closed; if so, storing authentication information such as a login abstract or a session ID by using a browser memory, and then attaching the authentication information to request the configuration page.
The execution of the login operation based on the dispatch.html page is to process a multi-authentication flow, and referring to fig. 5, a schematic diagram for processing the multi-authentication flow is provided, the dispatch.html page is loaded and executed (loading login information) by an application shell program, the local application shell program sends an authentication probe request and receives an authentication type supported by a device, after the authentication type is obtained, assembles an authentication request in combination with the login information, then sends the authentication request to the HTTP proxy service program and receives a return state.
Html page is stored in a client side, and an agent service program (with dispatch) and a local application shell program (with an embedded browser kernel) are combined to finish login-free of equipment, namely login information such as user name and password is avoided, a configuration page of the equipment can be entered, and finally a terminal uses data provided by the equipment to render the configuration page of the equipment, so that a user can configure the equipment on the configuration page, and the speed of configuring the equipment at the client side is improved.
According to the method provided by the embodiment of the invention, based on the interaction among the main program, the proxy service program and the local application shell program, when the equipment added in the main program needs to be configured, the login-free of the equipment is realized according to the stored login information, namely, the login information such as a user name, a password and the like is avoided, and the configuration page of the equipment can be opened, so that the equipment is configured, the login information is prevented from being input when the user configures the equipment each time, and the operation is simplified.
Fig. 6 is a schematic structural diagram of an apparatus configuration device according to an embodiment of the present invention. Referring to fig. 6, the apparatus includes:
a starting module 601, configured to start the proxy service program and the local application shell program when receiving a configuration instruction, and transmit stored login information of the target device to the local application shell program, where the configuration instruction is used to configure the target device added to the main program;
a loading module 602, configured to load a target page in the proxy service program through the local application shell program, and load login information of the target device into the target page, where the target page is used to provide an authentication method for requesting identity authentication from the target device according to the login information;
a display module 603, configured to display a configuration page of the target device after the authentication is successful according to the authentication method, where the configuration page is used to configure the target device.
Optionally, referring to fig. 7, the apparatus further comprises:
an authentication module 604, configured to send an authentication probe request to the target device, where the authentication probe request is used to obtain an authentication type supported by the target device; when receiving the authentication type supported by the target equipment, sending an authentication request to the target equipment according to the login information of the target equipment and the authentication type supported by the target equipment; and receiving an authentication success message sent by the target device.
Optionally, the authentication module 604 is configured to process login information of the target device according to an authentication type supported by the target device, so as to obtain authentication information of the target device; and sending the authentication request to the target equipment, wherein the authentication request carries the authentication information.
Optionally, the display module 603 is configured to send a data request to the target device, where the data request is used to obtain page data of the configuration page; when the page data is received, the configuration page is rendered based on the page data.
Optionally, referring to fig. 8, the method further comprises:
the starting module 601 is further configured to start a main program, and display a page of the main program, where the page includes an add device button;
the display module 603 is further configured to display a device add page when a click operation on the add device button is detected;
an adding module 605, configured to add the target device to the main program when the login information of the target device input in the device adding page is received;
the storage module 606 is configured to store login information of the target device.
According to the device provided by the embodiment of the invention, based on the interaction among the main program, the proxy service program and the local application shell program, when the equipment added in the main program needs to be configured, the login-free of the equipment is realized according to the stored login information, namely, the login information such as a user name, a password and the like is avoided, and the configuration page of the equipment can be opened, so that the equipment is configured, the login information is prevented from being input when the user configures the equipment each time, and the operation is simplified.
It should be noted that: in the device configuration apparatus provided in the foregoing embodiment, when configuring a device, only the division of each functional module is illustrated, and in practical applications, the function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules, so as to complete all or part of the functions described above. In addition, the device configuration apparatus and the device configuration method provided in the above embodiments belong to the same concept, and specific implementation processes thereof are described in the method embodiments and are not described herein again.
Fig. 9 is a schematic structural diagram of a terminal 900 according to an embodiment of the present invention. The terminal 900 may be: a smart phone, a tablet computer, an MP3 player (Moving Picture Experts Group Audio Layer III, motion video Experts compression standard Audio Layer 3), an MP4 player (Moving Picture Experts Group Audio Layer IV, motion video Experts compression standard Audio Layer 4), a notebook computer, or a desktop computer. Terminal 900 may also be referred to by other names such as user equipment, portable terminals, laptop terminals, desktop terminals, and the like.
In general, terminal 900 includes: a processor 901 and a memory 902.
Processor 901 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and so forth. The processor 901 may be implemented in at least one hardware form of a DSP (Digital Signal Processing), an FPGA (Field-Programmable Gate Array), and a PLA (Programmable Logic Array). The processor 901 may also include a main processor and a coprocessor, where the main processor is a processor for Processing data in an awake state, and is also called a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 901 may be integrated with a GPU (Graphics Processing Unit), which is responsible for rendering and drawing the content required to be displayed on the display screen. In some embodiments, the processor 901 may further include an AI (Artificial Intelligence) processor for processing computing operations related to machine learning.
Memory 902 may include one or more computer-readable storage media, which may be non-transitory. The memory 902 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory 902 is used to store at least one instruction for execution by processor 901 to implement the device configuration methods provided by method embodiments herein.
In some embodiments, terminal 900 can also optionally include: a peripheral interface 903 and at least one peripheral. The processor 901, memory 902, and peripheral interface 903 may be connected by buses or signal lines. Various peripheral devices may be connected to the peripheral interface 903 via a bus, signal line, or circuit board. Specifically, the peripheral device includes: at least one of a radio frequency circuit 904, a touch display screen 905, a camera 906, an audio circuit 907, a positioning component 908, and a power supply 909.
The peripheral interface 903 may be used to connect at least one peripheral related to I/O (Input/Output) to the processor 901 and the memory 902. In some embodiments, the processor 901, memory 902, and peripheral interface 903 are integrated on the same chip or circuit board; in some other embodiments, any one or two of the processor 901, the memory 902 and the peripheral interface 903 may be implemented on a separate chip or circuit board, which is not limited by this embodiment.
The Radio Frequency circuit 904 is used for receiving and transmitting RF (Radio Frequency) signals, also called electromagnetic signals. The radio frequency circuitry 904 communicates with communication networks and other communication devices via electromagnetic signals. The radio frequency circuit 904 converts an electrical signal into an electromagnetic signal to transmit, or converts a received electromagnetic signal into an electrical signal. Optionally, the radio frequency circuit 904 comprises: an antenna system, an RF transceiver, one or more amplifiers, a tuner, an oscillator, a digital signal processor, a codec chipset, a subscriber identity module card, and so forth. The radio frequency circuit 904 may communicate with other terminals via at least one wireless communication protocol. The wireless communication protocols include, but are not limited to: the world wide web, metropolitan area networks, intranets, generations of mobile communication networks (2G, 3G, 4G, and 5G), Wireless local area networks, and/or WiFi (Wireless Fidelity) networks. In some embodiments, the radio frequency circuit 904 may also include NFC (Near Field Communication) related circuits, which are not limited in this application.
The display screen 905 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof. When the display screen 905 is a touch display screen, the display screen 905 also has the ability to capture touch signals on or over the surface of the display screen 905. The touch signal may be input to the processor 901 as a control signal for processing. At this point, the display 905 may also be used to provide virtual buttons and/or a virtual keyboard, also referred to as soft buttons and/or a soft keyboard. In some embodiments, the display 905 may be one, providing the front panel of the terminal 900; in other embodiments, the number of the display panels 905 may be at least two, and each of the display panels is disposed on a different surface of the terminal 900 or is in a foldable design; in still other embodiments, the display 905 may be a flexible display disposed on a curved surface or a folded surface of the terminal 900. Even more, the display screen 905 may be arranged in a non-rectangular irregular figure, i.e. a shaped screen. The Display panel 905 can be made of LCD (Liquid Crystal Display), OLED (Organic Light-Emitting Diode), and other materials.
The camera assembly 906 is used to capture images or video. Optionally, camera assembly 906 includes a front camera and a rear camera. Generally, a front camera is disposed at a front panel of the terminal, and a rear camera is disposed at a rear surface of the terminal. In some embodiments, the number of the rear cameras is at least two, and each rear camera is any one of a main camera, a depth-of-field camera, a wide-angle camera and a telephoto camera, so that the main camera and the depth-of-field camera are fused to realize a background blurring function, and the main camera and the wide-angle camera are fused to realize panoramic shooting and VR (Virtual Reality) shooting functions or other fusion shooting functions. In some embodiments, camera assembly 906 may also include a flash. The flash lamp can be a monochrome temperature flash lamp or a bicolor temperature flash lamp. The double-color-temperature flash lamp is a combination of a warm-light flash lamp and a cold-light flash lamp, and can be used for light compensation at different color temperatures.
Audio circuit 907 may include a microphone and a speaker. The microphone is used for collecting sound waves of a user and the environment, converting the sound waves into electric signals, and inputting the electric signals to the processor 901 for processing, or inputting the electric signals to the radio frequency circuit 904 for realizing voice communication. For stereo sound acquisition or noise reduction purposes, the microphones may be multiple and disposed at different locations of the terminal 900. The microphone may also be an array microphone or an omni-directional pick-up microphone. The speaker is used to convert electrical signals from the processor 901 or the radio frequency circuit 904 into sound waves. The loudspeaker can be a traditional film loudspeaker or a piezoelectric ceramic loudspeaker. When the speaker is a piezoelectric ceramic speaker, the speaker can be used for purposes such as converting an electric signal into a sound wave audible to a human being, or converting an electric signal into a sound wave inaudible to a human being to measure a distance. In some embodiments, audio circuit 907 may also include a headphone jack.
The positioning component 908 is used to locate the current geographic Location of the terminal 900 for navigation or LBS (Location Based Service). The Positioning component 908 may be a Positioning component based on the Global Positioning System (GPS) in the united states, the beidou System in china, or the galileo System in russia.
Power supply 909 is used to provide power to the various components in terminal 900. The power source 909 may be alternating current, direct current, disposable or rechargeable. When the power source 909 includes a rechargeable battery, the rechargeable battery may be a wired rechargeable battery or a wireless rechargeable battery. The wired rechargeable battery is a battery charged through a wired line, and the wireless rechargeable battery is a battery charged through a wireless coil. The rechargeable battery may also be used to support fast charge technology.
In some embodiments, terminal 900 can also include one or more sensors 910. The one or more sensors 910 include, but are not limited to: acceleration sensor 911, gyro sensor 912, pressure sensor 913, fingerprint sensor 914, optical sensor 915, and proximity sensor 916.
The acceleration sensor 911 can detect the magnitude of acceleration in three coordinate axes of the coordinate system established with the terminal 900. For example, the acceleration sensor 911 may be used to detect the components of the gravitational acceleration in three coordinate axes. The processor 901 can control the touch display 905 to display the user interface in a landscape view or a portrait view according to the gravitational acceleration signal collected by the acceleration sensor 911. The acceleration sensor 911 may also be used for acquisition of motion data of a game or a user.
The gyro sensor 912 may detect a body direction and a rotation angle of the terminal 900, and the gyro sensor 912 may cooperate with the acceleration sensor 911 to acquire a 3D motion of the user on the terminal 900. The processor 901 can implement the following functions according to the data collected by the gyro sensor 912: motion sensing (such as changing the UI according to a user's tilting operation), image stabilization at the time of photographing, game control, and inertial navigation.
Pressure sensors 913 may be disposed on the side bezel of terminal 900 and/or underneath touch display 905. When the pressure sensor 913 is disposed on the side frame of the terminal 900, the user's holding signal of the terminal 900 may be detected, and the processor 901 performs left-right hand recognition or shortcut operation according to the holding signal collected by the pressure sensor 913. When the pressure sensor 913 is disposed at a lower layer of the touch display 905, the processor 901 controls the operability control on the UI interface according to the pressure operation of the user on the touch display 905. The operability control comprises at least one of a button control, a scroll bar control, an icon control and a menu control.
The fingerprint sensor 914 is used for collecting a fingerprint of the user, and the processor 901 identifies the user according to the fingerprint collected by the fingerprint sensor 914, or the fingerprint sensor 914 identifies the user according to the collected fingerprint. Upon recognizing that the user's identity is a trusted identity, processor 901 authorizes the user to perform relevant sensitive operations including unlocking the screen, viewing encrypted information, downloading software, paying, and changing settings, etc. The fingerprint sensor 914 may be disposed on the front, back, or side of the terminal 900. When a physical key or vendor Logo is provided on the terminal 900, the fingerprint sensor 914 may be integrated with the physical key or vendor Logo.
The optical sensor 915 is used to collect ambient light intensity. In one embodiment, the processor 901 may control the display brightness of the touch display 905 based on the ambient light intensity collected by the optical sensor 915. Specifically, when the ambient light intensity is high, the display brightness of the touch display screen 905 is increased; when the ambient light intensity is low, the display brightness of the touch display screen 905 is turned down. In another embodiment, the processor 901 can also dynamically adjust the shooting parameters of the camera assembly 906 according to the ambient light intensity collected by the optical sensor 915.
Proximity sensor 916, also known as a distance sensor, is typically disposed on the front panel of terminal 900. The proximity sensor 916 is used to collect the distance between the user and the front face of the terminal 900. In one embodiment, when the proximity sensor 916 detects that the distance between the user and the front face of the terminal 900 gradually decreases, the processor 901 controls the touch display 905 to switch from the bright screen state to the dark screen state; when the proximity sensor 916 detects that the distance between the user and the front surface of the terminal 900 gradually becomes larger, the processor 901 controls the touch display 905 to switch from the breath screen state to the bright screen state.
Those skilled in the art will appreciate that the configuration shown in fig. 9 does not constitute a limitation of terminal 900, and may include more or fewer components than those shown, or may combine certain components, or may employ a different arrangement of components.
In an exemplary embodiment, a computer-readable storage medium is also provided, for example a memory storing a computer program, which when executed by a processor implements the device configuration method in the above-described embodiments. For example, the computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a Compact Disc Read-Only Memory (CD-ROM), a magnetic tape, a floppy disk, an optical data storage device, and the like.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only exemplary of the present invention and should not be taken as limiting the invention, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (12)

1. A method for device configuration, the method comprising:
when a configuration instruction is received, starting an agent service program and a local application shell program, and transmitting stored login information of a target device into the local application shell program, wherein the configuration instruction is used for configuring the target device added in a main program;
loading a target page in the proxy service program through the local application shell program, and loading login information of the target equipment into the target page, wherein the target page is used for providing an authentication method for requesting identity authentication to the target equipment according to the login information;
and when the authentication is successful according to the authentication method, displaying a configuration page of the target equipment, wherein the configuration page is used for configuring the target equipment.
2. The method of claim 1, wherein the successfully authenticating according to the authentication method comprises:
sending an authentication probe request to the target device, wherein the authentication probe request is used for acquiring an authentication type supported by the target device;
when receiving the authentication type supported by the target equipment, sending an authentication request to the target equipment according to the login information of the target equipment and the authentication type supported by the target equipment;
and receiving an authentication success message sent by the target equipment.
3. The method of claim 2, wherein sending an authentication request to the target device according to the login information of the target device and the authentication types supported by the target device comprises:
processing the login information of the target equipment according to the authentication type supported by the target equipment to obtain the authentication information of the target equipment;
and sending the authentication request to the target equipment, wherein the authentication request carries the authentication information.
4. The method of claim 1, wherein the displaying the configuration page of the target device comprises:
sending a data request to the target device, wherein the data request is used for acquiring page data of the configuration page;
when the page data is received, rendering the configuration page based on the page data.
5. The method of claim 1, wherein prior to receiving the configuration instruction, the method further comprises:
starting the main program, and displaying a page of the main program, wherein the page comprises an equipment adding button;
when the clicking operation on the button of the adding equipment is detected, displaying an adding page of the equipment;
adding the target device to the main program when login information of the target device input in the device addition page is received;
and storing the login information of the target equipment.
6. An apparatus for device configuration, the apparatus comprising:
the starting module is used for starting an agent service program and a local application shell program when a configuration instruction is received, and transferring the stored login information of the target equipment into the local application shell program, wherein the configuration instruction is used for configuring the target equipment added in a main program;
a loading module, configured to load a target page in the proxy service program through the local application shell program, and load login information of the target device into the target page, where the target page is used to provide an authentication method for requesting identity authentication from the target device according to the login information;
and the display module is used for displaying a configuration page of the target equipment after the authentication is successful according to the authentication method, wherein the configuration page is used for configuring the target equipment.
7. The apparatus of claim 6, further comprising:
the authentication module is used for sending an authentication detection request to the target equipment, wherein the authentication detection request is used for acquiring an authentication type supported by the target equipment; when receiving the authentication type supported by the target equipment, sending an authentication request to the target equipment according to the login information of the target equipment and the authentication type supported by the target equipment; and receiving an authentication success message sent by the target equipment.
8. The apparatus according to claim 7, wherein the authentication module is configured to process login information of the target device according to an authentication type supported by the target device, so as to obtain authentication information of the target device; and sending the authentication request to the target equipment, wherein the authentication request carries the authentication information.
9. The apparatus according to claim 6, wherein the display module is configured to send a data request to the target device, where the data request is used to obtain page data of the configuration page; when the page data is received, rendering the configuration page based on the page data.
10. The apparatus of claim 6, wherein the method further comprises:
the starting module is also used for starting the main program and displaying a page of the main program, wherein the page comprises an equipment adding button;
the display module is further used for displaying an adding page of the equipment when the clicking operation of the adding equipment button is detected;
an adding module, configured to add the target device to the main program when login information of the target device input in the device adding page is received;
and the storage module is used for storing the login information of the target equipment.
11. A terminal comprising a processor and a memory; the memory is used for storing a computer program; the processor, configured to execute the computer program stored in the memory, implements the method steps of any of claims 1-5.
12. A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, which computer program, when being executed by a processor, carries out the method steps of any one of claims 1-5.
CN201810186415.0A 2018-03-07 2018-03-07 Equipment configuration method and device Active CN110263525B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810186415.0A CN110263525B (en) 2018-03-07 2018-03-07 Equipment configuration method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810186415.0A CN110263525B (en) 2018-03-07 2018-03-07 Equipment configuration method and device

Publications (2)

Publication Number Publication Date
CN110263525A CN110263525A (en) 2019-09-20
CN110263525B true CN110263525B (en) 2020-11-27

Family

ID=67911405

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810186415.0A Active CN110263525B (en) 2018-03-07 2018-03-07 Equipment configuration method and device

Country Status (1)

Country Link
CN (1) CN110263525B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111241499B (en) * 2020-01-07 2023-05-05 腾讯科技(深圳)有限公司 Application program login method, device, terminal and storage medium
CN111970298B (en) * 2020-08-26 2024-01-05 腾讯科技(深圳)有限公司 Application access method and device, storage medium and computer equipment
CN112380527B (en) * 2020-11-12 2024-02-23 新华三信息技术有限公司 Management system of server and access method of server management page
CN113778998A (en) * 2021-09-28 2021-12-10 北京安华金和科技有限公司 Database proxy fault prevention processing method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103034518A (en) * 2012-12-14 2013-04-10 北京奇虎科技有限公司 Method and browser for loading browser control tool
CN103034517A (en) * 2012-12-14 2013-04-10 北京奇虎科技有限公司 Method and device for loading browser control tool
CN103118031A (en) * 2013-02-25 2013-05-22 东莞宇龙通信科技有限公司 Method and electronic device for logging in application account
CN104322010A (en) * 2012-03-07 2015-01-28 思杰***有限公司 Systems and methods for comparing configuration files and generating corrective commands
CN107404485A (en) * 2017-08-02 2017-11-28 北京天翔睿翼科技有限公司 A kind of self-validation cloud connection method and its system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9473485B2 (en) * 2011-03-21 2016-10-18 Blue Cedar Networks, Inc. Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104322010A (en) * 2012-03-07 2015-01-28 思杰***有限公司 Systems and methods for comparing configuration files and generating corrective commands
CN103034518A (en) * 2012-12-14 2013-04-10 北京奇虎科技有限公司 Method and browser for loading browser control tool
CN103034517A (en) * 2012-12-14 2013-04-10 北京奇虎科技有限公司 Method and device for loading browser control tool
CN103118031A (en) * 2013-02-25 2013-05-22 东莞宇龙通信科技有限公司 Method and electronic device for logging in application account
CN107404485A (en) * 2017-08-02 2017-11-28 北京天翔睿翼科技有限公司 A kind of self-validation cloud connection method and its system

Also Published As

Publication number Publication date
CN110263525A (en) 2019-09-20

Similar Documents

Publication Publication Date Title
CN110674022B (en) Behavior data acquisition method and device and storage medium
CN109905318B (en) Equipment control method, device and storage medium
CN108833607B (en) Physical address acquisition method, device and readable medium
CN109688147B (en) Application login method, device, terminal, server, system and storage medium
CN110263525B (en) Equipment configuration method and device
CN109327608B (en) Song sharing method, terminal, server and system
CN108874496B (en) Application management method, device, terminal, server and storage medium
CN112751679B (en) Instant messaging message processing method, terminal and server
CN108769992B (en) User authentication method, device, terminal and storage medium
CN107959727B (en) Method and device for communication between webpage and client
CN108881286B (en) Multimedia playing control method, terminal, sound box equipment and system
CN113542290B (en) Data access request processing method, device, equipment and readable storage medium
KR20180005071A (en) Mobile terminal and method for controlling the same
CN110837473A (en) Application program debugging method, device, terminal and storage medium
CN110851823B (en) Data access method, device, terminal and storage medium
CN113204298A (en) Method and device for displaying release progress, electronic equipment and storage medium
CN111177013A (en) Log data acquisition method and device, computer equipment and storage medium
CN109726064B (en) Method, device and system for simulating abnormal operation of client and storage medium
CN115378900A (en) Song list sharing method, device, terminal and storage medium
CN111191227A (en) Method and device for preventing malicious code from executing
CN110825465B (en) Log data processing method and device, electronic equipment and storage medium
CN112988254B (en) Method, device and equipment for managing hardware equipment
CN110971692B (en) Method and device for opening service and computer storage medium
CN111131619B (en) Account switching processing method, device and system
CN108683684B (en) Method, device and system for logging in target instant messaging application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant