TW201915803A - Information interaction method, apparatus and device for internet of things device - Google Patents

Information interaction method, apparatus and device for internet of things device Download PDF

Info

Publication number
TW201915803A
TW201915803A TW107118238A TW107118238A TW201915803A TW 201915803 A TW201915803 A TW 201915803A TW 107118238 A TW107118238 A TW 107118238A TW 107118238 A TW107118238 A TW 107118238A TW 201915803 A TW201915803 A TW 201915803A
Authority
TW
Taiwan
Prior art keywords
information
internet
authentication information
client
data packet
Prior art date
Application number
TW107118238A
Other languages
Chinese (zh)
Other versions
TWI719312B (en
Inventor
孫健康
王林青
林鋒
Original Assignee
香港商阿里巴巴集團服務有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 香港商阿里巴巴集團服務有限公司 filed Critical 香港商阿里巴巴集團服務有限公司
Publication of TW201915803A publication Critical patent/TW201915803A/en
Application granted granted Critical
Publication of TWI719312B publication Critical patent/TWI719312B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Power Engineering (AREA)
  • Medical Informatics (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Embodiments of the present specification disclose an information interaction method, an apparatus and a device for an Internet of Things (IoT) device. In the embodiments of the present specification, a client obtains identifier information of the IoT device, and the identifier information of the IoT device and user information are uploaded to a server. The server performs device authentication and account binding, generates authentication information and delivers the same to the client. The client uses a data packet as carrier to broadcast a target network identifier (such as service set identifier SSID of a wireless network), a password and the authentication information in a network. The device polls surrounding networks to receive the data packet, to parse the data packet and to obtain the target network identifier, the password, and the authentication information, thereby achieving access from the target network and establishing a trusted network connection with the server.

Description

關於物聯網設備的資訊交互方法、裝置及設備Information interaction method, device and device for IoT device

本說明書涉及電腦技術領域,尤其涉及關於物聯網設備的資訊交互方法、裝置及設備。The present specification relates to the field of computer technology, and in particular, to an information interaction method, device and device for an Internet of Things device.

隨著技術發展,物聯網設備的種類和應用場景越來越多。   使用者在獲得未經配置的物聯網設備後,首先需完成配網,讓設備接入網路,而後進行使用者終端和伺服端之間的交互,以及使用者終端和物聯網設備之間的交互,以完成物聯網設備認證,進而實現物聯網設備連接伺服端。   基於此,需要更便利的物聯網設備連接伺服端的方案。With the development of technology, there are more and more types of IoT devices and application scenarios. After obtaining the unconfigured IoT device, the user first needs to complete the distribution network, let the device access the network, and then interact between the user terminal and the server, and between the user terminal and the IoT device. Interact to complete the IoT device authentication, and then realize the connection of the IoT device to the server. Based on this, a more convenient solution for the IoT device to connect to the server is needed.

本說明書實施例提供物聯網設備聯網方法、裝置及設備,用於解決如下問題:需要更便利的物聯網設備連接伺服端的方案。   基於此,本說明書實施例提供一種關於物聯網設備的資訊交互方法,包括:   獲取使用者資訊和物聯網設備的標識資訊;   發送所述使用者資訊和物聯網設備的標識資訊至伺服端,以便伺服端認證;   接收伺服端返回的認證資訊;   產生並發送攜帶所述認證資訊的資料包,以便所述物聯網設備從所述資料包獲取所述認證資訊用於連接伺服端。   同時,本說明書實施例還提供另一種關於物聯網設備的資訊交互方法,包括:   接收客戶端所發送的使用者資訊和物聯網設備的標識資訊;   對所述使用者資訊和/或物聯網設備的標識資訊進行認證,得到認證資訊並返回所述客戶端。   同時,本說明書實施例還提供再一種關於物聯網設備的資訊交互方法,包括   獲取客戶端發送的攜帶認證資訊的資料包,以及獲取目標網路資訊;   根據所述目標網路資訊進行網路配置,以接入所述目標網路;   根據所述認證資訊和已接入的所述目標網路,與伺服端建立可信網路連接。   對應的,本說明書實施例還提供一種關於物聯網設備的資訊交互裝置,所述裝置包括:   獲取模組,獲取使用者資訊和物聯網設備的標識資訊;   發送模組,發送所述使用者資訊和物聯網設備的標識資訊至伺服端,以便伺服端認證;   接收模組,接收伺服端返回的認證資訊;   產生模組,產生攜帶所述認證資訊的資料包;   所述發送模組還用於,發送所述資料包,以便所述物聯網設備從所述資料包獲取所述認證資訊用於連接伺服端。   對應的,本說明書實施例還提供另一種關於物聯網設備的資訊交互裝置,包括:   接收模組,接收客戶端所發送的物聯網設備的標識資訊和使用者資訊;   認證模組,對所述使用者資訊和/或物聯網設備的標識資訊進行認證,得到認證資訊;   發送模組,發送所述認證資訊至客戶端。   對應的,本說明書實施例還提供再一種關於物聯網設備的資訊交互裝置,包括:   獲取模組,獲取客戶端發送的攜帶認證資訊的資料包,以及獲取目標網路資訊;   網路配置模組,根據所述目標網路資訊進行網路配置,以接入所述目標網路;   連接模組,根據所述認證資訊和已接入的所述目標網路,與伺服端建立可信網路連接。   本說明書實施例還提供一種關於物聯網設備的資訊交互設備,包括:   記憶體,用於儲存物聯網設備聯網程式;   處理器,調用儲存設備中的物聯網設備聯網程式,並執行:   獲取使用者資訊和物聯網設備的標識資訊;   發送所述使用者資訊和物聯網設備的標識資訊至伺服端,以便伺服端認證;   接收伺服端返回的認證資訊;   產生並發送攜帶所述認證資訊的資料包,以便所述物聯網設備從所述資料包獲取所述認證資訊用於連接伺服端。   同時,本說明書實施例還提供另一種關於物聯網設備的資訊交互設備,包括:   記憶體,用於儲存物聯網設備聯網程式;   處理器,調用記憶體中的物聯網設備聯網程式,並執行:   接收客戶端所發送的使用者資訊和物聯網設備的標識資訊;   對所述使用者資訊和/或物聯網設備的標識資訊進行認證,得到認證資訊並返回所述客戶端。   同時,本說明書實施例還提供再一種關於物聯網設備的資訊交互設備,所述設備為物聯網設備本身,包括:   記憶體,用於儲存物聯網設備聯網程式;   處理器,調用儲存設備中的物聯網設備聯網程式,並執行   獲取客戶端發送的攜帶認證資訊的資料包,以及獲取目標網路資訊;   根據所述目標網路資訊進行網路配置,以接入所述目標網路;   根據所述認證資訊和已接入的所述目標網路,與伺服端建立可信網路連接。   對應的,本說明書實施例還提供一種非易失性電腦儲存媒體,儲存有電腦可執行指令,所述電腦可執行指令設置為:   發送所述使用者資訊和物聯網設備的標識資訊至伺服端,以便伺服端認證;   接收伺服端返回的認證資訊;   產生並發送攜帶所述認證資訊的資料包,以便所述物聯網設備從所述資料包獲取所述認證資訊用於連接伺服端。   對應的,本說明書實施例還提供另一種非易失性電腦儲存媒體,儲存有電腦可執行指令,所述電腦可執行指令設置為:   接收客戶端所發送的使用者資訊和物聯網設備的標識資訊;   對所述使用者資訊和/或物聯網設備的標識資訊進行認證,得到認證資訊並返回所述客戶端。   對應的,本說明書實施例還提供另一種非易失性電腦儲存媒體,儲存有電腦可執行指令,所述電腦可執行指令設置為:   獲取客戶端發送的攜帶認證資訊的資料包,以及獲取目標網路資訊;   根據所述目標網路資訊進行網路配置,以接入所述目標網路;   根據所述認證資訊和已接入的所述目標網路,與伺服端建立可信網路連接。   本說明書實施例採用的上述至少一個技術方案能夠達到以下有益效果:   客戶端獲取物聯網設備的標識資訊,並將物聯網設備的標識資訊和使用者資訊上傳伺服端,伺服端進行設備認證和帳號綁定,產生認證資訊並下發使用者的客戶端,客戶端將目標網路標識(如無線網路的服務設定識別碼SSID)、密碼和該認證資訊以資料包為載體在網路中廣播,設備藉由輪詢周圍網路,接收資料包,解析獲取目標網路標識、密碼和認證資訊,進而實現從目標網路接入,與伺服端建立可信網路連接。   本說明書實施例中,藉由客戶端上傳物聯網設備的標識資訊和使用者資訊,伺服端綁定並認證,進而,客戶端將認證資訊傳遞給物聯網設備,實現物聯網設備聯網,降低了物聯網設備配置過程中的交互次數,使得整個配置過程更加簡潔,減少使用者的操作量,提升使用者的使用體驗。此外,客戶端還可以將目標網路資訊和認證資訊一次性同時傳遞給物聯網設備,進一步簡化了使用者的操作。The embodiments of the present invention provide a method, device, and device for networking an Internet of Things device, which are used to solve the following problem: a more convenient solution for connecting an IoT device to a server. Based on this, the embodiment of the present disclosure provides an information interaction method for the Internet of Things device, including: acquiring user information and identification information of the Internet of Things device; sending the user information and the identification information of the Internet of Things device to the server, so as to The server authenticates; receives the authentication information returned by the server; generates and sends a data packet carrying the authentication information, so that the Internet of Things device obtains the authentication information from the data packet for connecting to the server. Meanwhile, the embodiment of the present specification further provides another information interaction method for the Internet of Things device, including: receiving user information sent by the client and identification information of the Internet of Things device; and the user information and/or the Internet of Things device The identification information is authenticated, the authentication information is obtained, and the client is returned. Meanwhile, the embodiment of the present specification further provides another method for information interaction of the Internet of Things device, comprising: acquiring a data packet carrying the authentication information sent by the client, and acquiring the target network information; performing network configuration according to the target network information. And accessing the target network; establishing a trusted network connection with the server according to the authentication information and the target network that has been accessed. Correspondingly, the embodiment of the present specification further provides an information interaction device for the Internet of Things device, where the device includes: an acquisition module, acquiring user information and identification information of the Internet of Things device; and sending a module to send the user information. And the identifier information of the Internet of Things device is sent to the server for the server to authenticate; the receiving module receives the authentication information returned by the server; generates a module to generate the data packet carrying the authentication information; and the sending module is further used for Sending the data package, so that the IoT device obtains the authentication information from the data package for connecting to the server. Correspondingly, the embodiment of the present specification further provides another information interaction device for the Internet of Things device, including: a receiving module, receiving identification information and user information of the Internet of Things device sent by the client; and an authentication module, The user information and/or the identification information of the Internet of Things device is authenticated to obtain the authentication information; the sending module sends the authentication information to the client. Correspondingly, the embodiment of the present specification further provides another information interaction device for the Internet of Things device, including: acquiring a module, acquiring a data packet carrying the authentication information sent by the client, and acquiring the target network information; Performing network configuration according to the target network information to access the target network; and connecting a module, establishing a trusted network with the server according to the authentication information and the target network that has been accessed connection. The embodiment of the present specification further provides an information interaction device for an Internet of Things device, including: a memory for storing an Internet of Things device networking program; a processor, calling an Internet of Things device networking program in the storage device, and executing: acquiring a user Information and identification information of the Internet of Things device; sending the user information and the identification information of the Internet of Things device to the server for the server to authenticate; receiving the authentication information returned by the server; generating and transmitting the packet carrying the authentication information So that the IoT device obtains the authentication information from the data package for connecting to the server. Meanwhile, the embodiment of the present specification further provides another information interaction device for the Internet of Things device, including: a memory for storing an Internet of Things device networking program; a processor, calling an Internet of Things device networking program in the memory, and executing: Receiving user information sent by the client and identification information of the Internet of Things device; authenticating the user information and/or the identification information of the Internet of Things device, obtaining authentication information, and returning to the client. In the meantime, the embodiment of the present specification further provides an information interaction device for the Internet of Things device, where the device is an IoT device itself, including: a memory for storing an Internet of Things device networking program; a processor, calling the storage device An Internet of Things device networking program, and executing a data packet carrying the authentication information sent by the client, and acquiring the target network information; performing network configuration according to the target network information to access the target network; The authentication information and the target network that has been accessed are established, and a trusted network connection is established with the server. Correspondingly, the embodiment of the present specification further provides a non-volatile computer storage medium, where the computer executable instructions are stored, and the computer executable instructions are set to: send the user information and the identification information of the Internet of Things device to the server. The server authenticates; receives the authentication information returned by the server; generates and sends a data packet carrying the authentication information, so that the Internet of Things device obtains the authentication information from the data package for connecting to the server. Correspondingly, the embodiment of the present specification further provides another non-volatile computer storage medium, which stores computer executable instructions, and the computer executable instructions are set to: receive user information sent by the client and identifier of the Internet of Things device. Information; authentication of the user information and/or identification information of the Internet of Things device, obtaining authentication information and returning to the client. Correspondingly, the embodiment of the present specification further provides another non-volatile computer storage medium, where the computer executable instructions are stored, and the computer executable instructions are set to: obtain a data package that carries the authentication information sent by the client, and obtain the target. Network information; performing network configuration according to the target network information to access the target network; establishing a trusted network connection with the server according to the authentication information and the target network that has been accessed . The above at least one technical solution adopted by the embodiment of the present specification can achieve the following beneficial effects: the client obtains the identification information of the Internet of Things device, and uploads the identification information and the user information of the Internet of Things device to the server, and the server performs the device authentication and the account. Binding, generating authentication information and delivering the user's client. The client broadcasts the target network identifier (such as the wireless network service setting identifier SSID), the password, and the authentication information on the network by using the data packet as a carrier. The device polls the surrounding network, receives the data packet, parses and obtains the target network identifier, password, and authentication information, thereby achieving access from the target network and establishing a trusted network connection with the server. In the embodiment of the present specification, the client uploads the identification information and the user information of the IoT device, and the server binds and authenticates, and then the client transmits the authentication information to the Internet of Things device to realize the networking of the Internet of Things device, thereby reducing the The number of interactions in the IoT device configuration process makes the entire configuration process more concise, reducing the user's operation and improving the user experience. In addition, the client can also pass the target network information and authentication information to the IoT device at the same time, which further simplifies the user's operation.

為使本發明的目的、技術方案和優點更加清楚,下面將結合本發明具體實施例及相應的圖式對本發明技術方案進行清楚、完整地描述。顯然,所描述的實施例僅是本發明一部分實施例,而不是全部的實施例。基於本說明書中的實施例,本領域具有通常知識者在沒有做出創造性勞動前提下所獲得的所有其他實施例,都屬於本發明保護的範圍。   基於前述內容,所述的物聯網設備通常是物聯網智能物品,可包括各種可隨身攜帶的智能物品(例如智能手環、智能手錶等等)以及各種智能家居物品等。為保障物聯網設備質量及後續服務,物聯網設備通常攜帶唯一對應的標識資訊以便識別。為防止冒連,伺服端通常事先需要對試圖連接它的物聯網設備進行認證。   在本說明書實施例中,關於物聯網設備的資訊交互方案可採用如圖1所示的架構,在該架構中,其中的伺服端可包括各種集群式、分散式的伺服器;其中的網路接入點可包括各種無線接入點(Access Point, AP),比如,路由器、手機熱點等。在實際應用中,物聯網設備與伺服端的交互、客戶端與伺服端的交互均可藉由網路接入點實現,這種交互對於網路接入點而言優選地是一種資料透傳過程。   下面將基於如圖1所示的架構,詳細說明本說明書實施例提供的關於物聯網設備的資訊交互過程,該過程具體包括以下三方面的步驟:客戶端方面,伺服端方面,和物聯網設備方面,分別進行說明。對於客戶端方面,包括以下步驟,如圖2所示,圖2為本說明書實施例提供的資訊交互方案中客戶端方面執行步驟的流程示意圖:   步驟S201,獲取使用者資訊和物聯網設備的標識資訊。   所述的使用者資訊通常可包括使用者的帳號資訊、使用者的設備唯一識別碼、使用者的身份證資訊、或者使用者的手機號碼等等。使用者資訊可以由客戶端從本地終端自動獲取,或者,藉由使用者手動輸入至客戶端。   所述物聯網設備的標識資訊通常由服務商事先定義,在實際應用場景中可以有多種具體表現形式,例如:各種字元組合形成的字串,使用者得到可直接輸入至客戶端;或者,數位物件識別符(Digital Object Unique Identifier, DOI),包括各種條碼、二維碼;或者,可被識別的通訊晶片等。   在實際應用中,獲取物聯網設備的標識資訊,可包括以下多種實施方式,列舉其中兩種:   第一種,利用終端(具體比如,終端上的攝像頭或者標籤讀取器等模組)對物聯網設備進行掃描,獲取物聯網設備的標識資訊。例如,當物聯網設備攜帶有DOI、射頻識別標籤(Radio Frequency Identification, RFID)或者近場通訊(Near Field Communication, NFC)晶片時,可以藉由終端的相應模組掃描獲取。   第二種,接收使用者在客戶端上輸入的物聯網設備的標識資訊,例如,物聯網設備的標識資訊為各種字元組合形成的字串時,可藉由使用者調取輸入法,將該字串手動輸入至客戶端。   步驟S203,發送所述使用者資訊和物聯網設備的標識資訊至伺服端,以便伺服端認證。   伺服端可採用預設的演算法,根據物聯網設備的標識資訊和使用者資訊產生認證資訊。例如,以某種演算法根據物聯網設備的標識資訊和使用者資訊產生唯一雜湊值,以所述雜湊值作為認證資訊;再例如,根據物聯網設備的標識資訊和使用者資訊產生安全證書作為認證資訊;等等。而後發送認證資訊至客戶端,以便於客戶端傳遞認證資訊給物聯網設備。   伺服端後續可基於認證資訊,驗證試圖連接的物聯網設備是否合法。   步驟S205,接收伺服端返回的認證資訊。   步驟S207,產生並發送攜帶所述認證資訊的資料包,以便所述物聯網設備從所述資料包獲取所述認證資訊用於連接伺服端。   所述的資料包可包括:使用者資料報協議(User Datagram Protocol, UDP)資料包、傳輸控制協議(Transmission Control Protocol, TCP)資料包、或者自定義格式的資料包等。   資料包通常包括頭部和資料體。以UDP資料包為例,其頭部包括源IP位址、目標IP位址、資料包長度以及校驗和等欄位。尚未配置的物聯網設備未必能夠解析UDP資料包的資料體內容,但是能夠比較迅速地解析UDP資料包的頭部內容,基於此,可將認證資訊寫入UDP資料包的頭部,以保證物聯網設備藉由迅速解析,進而確實獲取到認證資訊。   例如,UDP資料包的目標IP欄位中,正常情形下應寫入接收方的IP位址,以實現點對點傳輸。但在本實施例中,不再寫入接收方的IP位址,而是將認證資訊寫入資料包的目標IP位址欄位,以便物聯網設備接收並解析該目標IP位址欄位的內容,得到認證資訊。   對於自定義格式的資料包,還可以預先將支持該自定義格式的協議寫入物聯網設備的協議棧中,以支持自定義格式資料包解析過程。在這種應用場景中,客戶端根據需求將認證資訊寫入該資料包的頭部和/或資料體中。   在實際應用中,單個資料包所能攜帶的資訊量有限。當需要傳輸的認證資訊較長時,可將認證資訊拆分後寫入資料包的指定欄位(例如長度或者目標IP位址),產生多個攜帶部分認證資訊的資料包。   進一步地,客戶端可以在所連接的無線網路中的一個或者多個頻道,對產生的資料包進行廣播。在資料包廣播過程中,探測這些頻道的物聯網設備可接收到該資料包。   在一種具體實施方式下,在產生攜帶所述認證資訊的資料包之前,還可以執行:獲取目標網路資訊。進而,對於步驟S207,產生攜帶所述認證資訊的資料包,包括:產生攜帶所述認證資訊和目標網路資訊的資料包。   所述的目標網路指物聯網設備連接伺服端時所基於的網路。目標網路可以由使用者藉由客戶端進行指定,也可以由物聯網設備基於預設規則自行確定(比如,自動掃描到可用的無密碼WiFi網路作為目標網路)。以下各實施例主要基於前一種方式進行說明。   目標網路比如是客戶端當前所連接的無線網路,或者是使用者指定的另一無線網路等。   目標網路資訊一般包括目標網路的身份標識以及密碼。對於WiFi網路,該身份標識具體為服務設定識別碼(Service Set Identifier,SSID),即通常所說的WiFi名。當然,目標網路也可能沒有密碼。   例如,使用者終端本身藉由WiFi網路M1連接至網路,但是希望購買的某智能家居電器藉由WiFi網路M5連接上網,網路M5的密碼為000000。在這種場景下,目標網路資訊包括目標網路的身份標識M5及其密碼000000。   若連接網路M5不需要密碼,此時,目標網路資訊包括目標網路身份標識M5即可。   目標網路資訊的獲取方式可包括:客戶端從本地獲取,或者,由使用者預先設定,輸入至客戶端等。   藉由上述方案,客戶端可將目標網路資訊和認證資訊一次性傳遞給物聯網設備,簡化了使用者的操作。   在一種具體實施方式下,對於步驟S207,產生攜帶所述認證資訊的資料包,可採用如下方法,如圖3所示,圖3為本說明書實施例提供的資料包產生方法流程示意圖:   步驟S301,按照指定資料包欄位的格式,對所述認證資訊進行格式轉換。   資料包欄位均有預設的格式,例如UDP資料包中的長度欄位為0至255之間的數字。但是對於認證資訊而言,其本身未必全都是數字,基於此,需要將認證資訊轉換為資料包指定欄位所能接受的格式,才可寫入該欄位。   具體地,可以利用一定的規則,將認證資訊所對應的字節序列中的每個字節轉換為該指定欄位可接受的格式,再將轉換格式後的認證資訊寫入所述資料包的長度或者目標IP位址欄位。   例如,假定該規則為美國資訊交換標準代碼(American Standard Code for Information Interchange, ASCII)表。若認證資訊為字串“K2”,為將該認證資訊寫入UDP資料包的長度欄位,則首先需要將“K2”轉換為符合格式的數字。查詢ASCII表可知,“K2”中包含的字元“K”對應的字節為01001011(二進制),用十進制表示為75,則75即為“K”轉換得到的數字;類似地,“K2”中包含的字元“2”所對應的字節為00000010,用十進制資料表示為2,則2即為字元“2”轉換得到的數字;因此,“K2”被轉換為數字串752。   步驟S303,藉由將格式轉換後的認證資訊寫入相應的資料包欄位,得到攜帶所述認證資訊的資料包;其中,所以指定資料包欄位包括:資料包長度欄位和/或目標IP位址欄位。   延續前例,若指定位置為長度位置,則可將75寫入某個資料包的長度位置,將2寫入下一個的資料包的長度位置。並依次發出。   若指定位置為目標IP位址,由於目標IP位址一般的格式為a.b.c.d,其中a、b、c、d均為0至255之間的數字(例如192.168.0.11),在實際應用中,還可採用如下的處理方式:將所述的數字,寫入目標IP位址中的指定位置,例如:將數字寫入目標IP位址的最後一位。   上面對客戶端方面進行了說明,基於同樣的思路,本說明書實施例提供的關於物聯網設備的資訊交互過程,對於伺服端方面,如圖4所示,圖4為本說明書實施例提供的資訊交互方案中伺服端方面執行步驟的流程示意圖,包括以下步驟:   步驟S401,接收客戶端所發送的使用者資訊和物聯網設備的標識資訊;   步驟S403,對所述使用者資訊和/或物聯網設備的標識資訊進行認證,得到認證資訊並返回所述客戶端。   在實際應用場景中,伺服端還可以執行:建立並儲存所述物聯網設備的標識資訊和使用者資訊的綁定關係。例如,以鍵值對的形式建立所述物聯網設備的標識資訊和使用者資訊的一一對應關係,產生綁定記錄並儲存至伺服端本地。   進一步地,可以基於儲存的綁定關係,執行相關的物聯網業務。   例如,某物聯網設備正常聯網工作時,可藉由其攜帶的感測器收集信號並上傳至伺服端,伺服端進行信號分析,並根據信號分析結果和儲存的綁定關係,向所綁定的使用者資訊對應的客戶端進行反饋。假定該物聯網設備為智能手環,伺服端接收該智能手環收集並發送的脈搏信號進行分析,發送脈搏信號分析結果至綁定的使用者手機號,從而,使用者可以隨時瞭解佩戴該智能手環的人員的健康狀態。   作為一種具體的實施方式,在所述得到認證資訊並返回所述客戶端之後,還可以執行:接收所述物聯網設備所發送的所述認證資訊;基於所述認證資訊,與所述物聯網設備建立可信網路連接。   具體地,伺服端對物聯網設備所發送的認證資訊進行驗證,驗證通過後,與物聯網設備建立可信網路連接。例如,對於認證資訊,若產生後即保存於伺服端,則在接收到物聯網設備所發送的認證資訊後,藉由對接收的認證資訊與本地儲存的認證資訊進行匹配,完成驗證。又例如,若認證資訊並未在伺服端保存,可以根據預設的演算法(比如,雜湊演算法等)驗證該認證資訊是否合法。   在實際應用中,驗證認證資訊可能只是建立可信網路連接的前提之一,除此之外,可能還要進行其他的資訊處理動作,才能夠建立可信網路連接。這些動作可能需要物聯網設備和/或客戶端提供其他資訊。   所述的其他資訊比如是:物聯網設備的標識資訊、位置資訊等。藉由識別物聯網設備的標識資訊,伺服端在驗證過程中能夠同時識別出物聯網設備是什麼,並依據綁定關係獲得該物聯網設備對應的使用者資訊;類似地,藉由獲取物聯網設備的位置資訊,伺服端能夠對瞭解物聯網設備在哪裡,並基於位置執行業務。   上面對伺服端方面進行了說明,基於同樣的思路,本說明書實施例提供的物聯網物品資訊交互方法,對於所述的伺服端方面,如圖5所示,圖5為本說明書實施例提供的資訊交互方案中物聯網設備方面執行步驟的流程示意圖,包括如下步驟:   步驟S501,獲取客戶端發送的攜帶認證資訊的資料包,以及獲取目標網路資訊。   具體而言,可採用如下實施方式:對多個無線網路信號廣播頻道進行監聽;當監聽到客戶端發送的攜帶認證資訊的資料包時,獲取該資料包。   例如,物聯網設備首先獲取周圍的多個無線網路信號廣播頻道,然後進行輪詢(若只有一個則無需進行輪詢),監聽各頻道中的資料包以確定所述無線網路信號廣播頻道。當資料包滿足預設的條件時,即在當前的無線網路信號廣播頻道中獲取所述的資料包。例如,監聽接收到的資料包頭部是否含有預設的標記,若有,即確定為所述攜帶認證資訊的資料包,並獲取所述資料包。具體的確定條件可以有多種,此處不再一一列舉。   對於所述獲取目標網路資訊,在實際應用場景中,作為一種可實施方式,物聯網設備可從周圍環境的WiFi網路中自行獲取目標網路。例如,物聯網設備輪詢周圍環境的WiFi網路,發現有某個公用WiFi網路不需要密碼即可聯網,此時,該公用WiFi網路即為所述的目標網路。   作為另一種可實施方式,可藉由獲取客戶端發送的攜帶認證資訊和目標網路資訊的資料包,從而獲取所述目標網路資訊。   例如,使用者藉由家庭網路WiFi連接網路,並且指定物聯網設備也從家庭網路WiFi聯網,客戶端自行獲取所述的家庭網路的WiFi資訊作為目標網路資訊並寫入資料包進行廣播。此時,物聯網設備可從接收到的資料包中獲取目標網路資訊(即所述家庭網路的WiFi資訊)。   步驟S503,根據所述目標網路資訊進行網路配置,以接入所述目標網路。   步驟S505,根據所述認證資訊和已接入的所述目標網路,與伺服端建立可信網路連接。   即在已連接的目標網路中,發送所述認證資訊至伺服端,伺服端驗證該認證資訊合法後,雙方建立可信網路連接。   作為一種具體的實施方式,在所述步驟S503,根據所述目標網路資訊進行網路配置之前,還包括:基於預設的規則,對所述資料包的指定欄位進行格式轉換,獲取所述認證資訊。   例如,依次查詢接收到的資料包的長度欄位,獲得數字75和2,按照ASCII表進行轉換,並依次拼接起來獲得認證資訊為“K2”。   本說明書實施例中,藉由客戶端上傳物聯網設備的標識資訊和使用者資訊,伺服端綁定並認證,進而,客戶端將認證資訊傳遞給物聯網設備,實現物聯網設備聯網,降低了物聯網設備配置過程中的交互次數,使得整個配置過程更加簡潔,減少使用者的操作量,提升使用者的使用體驗。此外,客戶端還可以將目標網路資訊和認證資訊一次性同時傳遞給物聯網設備,進一步簡化了使用者的操作。   基於同樣的思路,本說明書實施例還提供一種關於物聯網設備的資訊交互裝置,如圖6所示,圖6為本說明書實施例提供的客戶端方面的資訊交互裝置結構示意圖,包括:   獲取模組601,獲取使用者資訊和物聯網設備的標識資訊;   發送模組603,發送所述使用者資訊和物聯網設備的標識資訊至伺服端,以便伺服端認證;   接收模組605,接收伺服端返回的認證資訊;   產生模組607,產生攜帶所述認證資訊的資料包;   所述發送模組603還用於,發送資料包,以便物聯網設備從資料包獲取認證資訊用於連接伺服端。   進一步地,所述獲取模組601,藉由對物聯網設備進行掃描,獲取物聯網設備的標識資訊;或者,接收使用者手動輸入的物聯網設備的標識資訊。   進一步地,在產生攜帶所述認證資訊的資料包之前,所述獲取模組601還用於,獲取目標網路資訊;所述產生模組還用於,產生攜帶認證資訊和目標網路資訊的資料包。   進一步地,所述產生模組607,按照指定資料包欄位的格式,對認證資訊進行格式轉換;藉由將格式轉換後的認證資訊寫入相應的資料包欄位,得到攜帶所述認證資訊的資料包;其中,所以指定資料包欄位包括:資料包長度欄位和/或目標IP位址欄位   進一步地,所述發送模組603,藉由當前連接的無線網路廣播所述資料包。   同時,本說明書實施例還提供一種關於物聯網設備的資訊交互裝置,如圖7所示,圖7為本說明書實施例提供的伺服端方面的資訊交互裝置結構示意圖,包括:   接收模組701,接收客戶端所發送的物聯網設備的標識資訊和使用者資訊;   認證模組703,對所述使用者資訊和/或物聯網設備的標識資訊進行認證,得到認證資訊;   發送模組705,發送所述認證資訊至客戶端。   進一步的,所述裝置還包括:建立模組707,建立所述物聯網設備的標識資訊和使用者資訊的綁定關係,以用於執行涉及所述物聯網設備和所述使用者資訊的物聯網業務;儲存模組709,儲存所述綁定關係。   進一步地,所述得到認證資訊並返回所述客戶端之後,所述接收模組701,接收所述物聯網設備所發送的所述認證資訊,基於所述認證資訊,與所述物聯網設備建立可信網路連接。   同時,本說明書實施例還提供一種關於物聯網設備的資訊交互裝置,如圖8所示,圖8為本說明書實施例提供的物聯網設備方面的資訊交互裝置結構示意圖,包括:   獲取模組801,獲取客戶端發送的攜帶認證資訊的資料包,以及獲取目標網路資訊;   網路配置模組803,根據所述目標網路資訊進行網路配置,以接入所述目標網路;   連接模組805,根據所述認證資訊和已接入的所述目標網路,與伺服端建立可信網路連接。   進一步地,所述獲取模組801,獲取客戶端發送的攜帶認證資訊和目標網路資訊的資料包,所述目標網路資訊包括客戶端當前連接的WiFi網路的資訊   進一步地,所述獲取模組801,對多個無線網路信號廣播頻道進行監聽,當監聽到客戶端發送的攜帶認證資訊的資料包時,獲取該資料包。   進一步地,所述獲取模組801,基於預設的規則,對所述資料包的指定欄位進行格式轉換,獲取所述認證資訊。   對應地,本說明書還提供一種關於物聯網設備的資訊交互設備,包括:   記憶體,用於儲存物聯網設備聯網程式;   處理器,調用記憶體中的物聯網設備聯網程式,並執行:   獲取使用者資訊和物聯網設備的標識資訊;   發送所述使用者資訊和物聯網設備的標識資訊至伺服端,以便伺服端認證;   接收伺服端返回的認證資訊;   產生並發送攜帶所述認證資訊的資料包,以便所述物聯網設備從所述資料包獲取所述認證資訊用於連接伺服端。   對應地,本說明書還提供另一種關於物聯網設備的資訊交互設備,所述設備包括:   記憶體,用於儲存物聯網設備聯網程式;   處理器,調用記憶體中的物聯網設備聯網程式,並執行:   接收客戶端所發送的使用者資訊和物聯網設備的標識資訊;   對所述使用者資訊和/或物聯網設備的標識資訊進行認證,得到認證資訊並返回所述客戶端。   對應地,本說明書還提供再一種關於物聯網設備的資訊交互設備,所述設備為物聯網物品本身,包括:   記憶體,用於儲存物聯網設備聯網程式;   處理器,調用記憶體中的物聯網設備聯網程式,並執行   獲取客戶端發送的攜帶認證資訊的資料包,以及獲取目標網路資訊;   根據所述目標網路資訊進行網路配置,以接入所述目標網路;   根據所述認證資訊和已接入的所述目標網路,與伺服端建立可信網路連接。   基於同樣的思路,本說明書實施例還提供一種非易失性電腦儲存媒體,儲存有電腦可執行指令,所述電腦可執行指令設置為:   發送所述使用者資訊和物聯網設備的標識資訊至伺服端,以便伺服端認證;   接收伺服端返回的認證資訊;   產生並發送攜帶所述認證資訊的資料包,以便所述物聯網設備從所述資料包獲取所述認證資訊用於連接伺服端。   對應的,本說明書實施例還提供另一種非易失性電腦儲存媒體,儲存有電腦可執行指令,所述電腦可執行指令設置為:   接收客戶端所發送的使用者資訊和物聯網設備的標識資訊;   對所述使用者資訊和/或物聯網設備的標識資訊進行認證,得到認證資訊並返回所述客戶端。   對應的,本說明書實施例還提供再一種非易失性電腦儲存媒體,儲存有電腦可執行指令,所述電腦可執行指令設置為:   獲取客戶端發送的攜帶認證資訊的資料包,以及獲取目標網路資訊;   根據所述目標網路資訊進行網路配置,以接入所述目標網路;   根據所述認證資訊和已接入的所述目標網路,與伺服端建立可信網路連接。   本說明書中的各個實施例均採用遞進的方式描述,各個實施例之間相同相似的部分互相參見即可,每個實施例重點說明的都是與其他實施例的不同之處。尤其,對於裝置、設備和媒體類實施例而言,由於其基本相似於方法實施例,所以描述的比較簡單,相關之處參見方法實施例的部分說明即可,這裡就不再一一贅述。   上述對本說明書特定實施例進行了描述。其它實施例在所附申請專利範圍的範圍內。在一些情況下,在申請專利範圍中記載的動作或步驟或模組可以按照不同於實施例中的順序來執行並且仍然可以實現期望的結果。另外,在圖式中描繪的過程不一定要求示出的特定順序或者連續順序才能實現期望的結果。在某些實施方式中,多工處理和平行處理也是可以的或者可能是有利的。   在20世紀90年代,對於一個技術的改進可以很明顯地區分是硬體上的改進(例如,對二極體、電晶體、開關等電路結構的改進)還是軟體上的改進(對於方法流程的改進)。然而,隨著技術的發展,當今的很多方法流程的改進已經可以視為硬體電路結構的直接改進。設計人員幾乎都藉由將改進的方法流程編程到硬體電路中來得到相應的硬體電路結構。因此,不能說一個方法流程的改進就不能用硬體實體模組來實現。例如,可程式邏輯裝置(Programmable Logic Device, PLD)(例如現場可程式閘陣列(Field Programmable Gate Array,FPGA))就是這樣一種集成電路,其邏輯功能由使用者對裝置編程來確定。由設計人員自行編程來把一個數位系統“集成”在一片PLD上,而不需要請晶片製造廠商來設計和製作專用的集成電路晶片。而且,如今,取代手工地製作集成電路晶片,這種編程也多半改用“邏輯編譯器(logic compiler)”軟體來實現,它與程式開發撰寫時所用的軟體編譯器相類似,而要編譯之前的原始碼也得用特定的編程語言來撰寫,此稱之為硬體描述語言(Hardware Description Language,HDL),而HDL也並非僅有一種,而是有許多種,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit Hardware Description Language)與Verilog。本領域技術人員也應該清楚,只需要將方法流程用上述幾種硬體描述語言稍作邏輯編程並編程到集成電路中,就可以很容易得到實現該邏輯方法流程的硬體電路。   控制器可以按任何適當的方式實現,例如,控制器可以採取例如微處理器或處理器以及儲存可由該(微)處理器執行的電腦可讀程式碼(例如軟體或韌體)的電腦可讀媒體、邏輯閘、開關、專用集成電路(Application Specific Integrated Circuit, ASIC)、可程式邏輯控制器和嵌入微控制器的形式,控制器的例子包括但不限於以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,記憶體控制器還可以被實現為記憶體的控制邏輯的一部分。本領域技術人員也知道,除了以純電腦可讀程式碼方式實現控制器以外,完全可以藉由將方法步驟進行邏輯編程來使得控制器以邏輯閘、開關、專用集成電路、可程式邏輯控制器和嵌入微控制器等的形式來實現相同功能。因此這種控制器可以被認為是一種硬體部件,而對其內包括的用於實現各種功能的裝置也可以視為硬體部件內的結構。或者甚至,可以將用於實現各種功能的裝置視為既可以是實現方法的軟體模組又可以是硬體部件內的結構。   上述實施例闡明的系統、裝置、模組或單元,具體可以由電腦晶片或實體實現,或者由具有某種功能的產品來實現。一種典型的實現設備為電腦。具體的,電腦例如可以為個人電腦、筆記型電腦、行動電話、相機電話、智能電話、個人數位助理、媒體播放器、導航設備、電子郵件設備、遊戲控制台、平板電腦、可穿戴設備或者這些設備中的任何設備的組合。   為了描述的方便,描述以上裝置時以功能分為各種單元分別描述。當然,在實施本說明書實施例時可以把各單元的功能在同一個或多個軟體和/或硬體中實現。   本領域內的技術人員應明白,本發明的實施例可提供為方法、系統、或電腦程式產品。因此,本發明可採用完全硬體實施例、完全軟體實施例、或結合軟體和硬體方面的實施例的形式。而且,本發明可採用在一個或多個其中包含有電腦可用程式碼的電腦可用儲存媒體(包括但不限於磁碟記憶體、CD-ROM、光學記憶體等)上實施的電腦程式產品的形式。   本發明是參照根據本發明實施例的方法、設備(系統)、和電腦程式產品的流程圖和/或方塊圖來描述的。應理解可由電腦程式指令實現流程圖和/或方塊圖中的每一流程和/或方塊、以及流程圖和/或方塊圖中的流程和/或方塊的結合。可提供這些電腦程式指令到通用電腦、專用電腦、嵌入式處理機或其他可程式資料處理設備的處理器以產生一個機器,使得藉由電腦或其他可程式資料處理設備的處理器執行的指令產生用於實現在流程圖一個流程或多個流程和/或方塊圖一個方塊或多個方塊中指定的功能的裝置。   這些電腦程式指令也可儲存在能引導電腦或其他可程式資料處理設備以特定方式工作的電腦可讀記憶體中,使得儲存在該電腦可讀記憶體中的指令產生包括指令裝置的製造品,該指令裝置實現在流程圖一個流程或多個流程和/或方塊圖一個方塊或多個方塊中指定的功能。   這些電腦程式指令也可裝載到電腦或其他可程式資料處理設備上,使得在電腦或其他可程式設備上執行一系列操作步驟以產生電腦實現的處理,從而在電腦或其他可程式設備上執行的指令提供用於實現在流程圖一個流程或多個流程和/或方塊圖一個方塊或多個方塊中指定的功能的步驟。   在一個典型的配置中,計算設備包括一個或多個處理器(CPU)、輸入/輸出介面、網路介面和記憶體。   記憶體可能包括電腦可讀媒體中的非永久性記憶體,隨機存取記憶體(RAM)和/或非易失性記憶體等形式,如唯讀記憶體(ROM)或快閃記憶體(flash RAM)。記憶體是電腦可讀媒體的示例。   電腦可讀媒體包括永久性和非永久性、可移動和非可移動媒體可以由任何方法或技術來實現資訊儲存。資訊可以是電腦可讀指令、資料結構、程式的模組或其他資料。電腦的儲存媒體的例子包括,但不限於相變記憶體(PRAM)、靜態隨機存取記憶體(SRAM)、動態隨機存取記憶體(DRAM)、其他類型的隨機存取記憶體(RAM)、唯讀記憶體(ROM)、電可擦除可程式唯讀記憶體(EEPROM)、快閃記憶體或其他記憶體技術、唯讀光碟(CD-ROM)、數位化多功能光碟(DVD)或其他光學儲存、磁盒式磁帶,磁帶磁磁碟儲存或其他磁性儲存設備或任何其他非傳輸媒體,可用於儲存可以被計算設備存取的資訊。按照本文中的界定,電腦可讀媒體不包括暫存電腦可讀媒體(transitory media),如調變的資料信編號和載波。   還需要說明的是,術語“包括”、“包含”或者其任何其他變體意在涵蓋非排他性的包含,從而使得包括一系列要素的過程、方法、商品或者設備不僅包括那些要素,而且還包括沒有明確列出的其他要素,或者是還包括為這種過程、方法、商品或者設備所固有的要素。在沒有更多限制的情況下,由語句“包括一個……”限定的要素,並不排除在包括所述要素的過程、方法、商品或者設備中還存在另外的相同要素。   本領域技術人員應明白,本說明書中一個或多個的實施例可提供為方法、系統或電腦程式產品。因此,本說明書實施例可採用完全硬體實施例、完全軟體實施例或結合軟體和硬體方面的形式。而且,本說明書實施例可採用在一個或多個其中包含有電腦可用程式碼的電腦可用儲存媒體(包括但不限於磁碟記憶體、CD-ROM、光學記憶體等)上實施的電腦程式產品的形式。   本說明書實施例可以在由電腦執行的電腦可執行指令的一般上下文中描述,例如程式模組。一般地,程式模組包括執行特定事務或實現特定抽象資料類型的例程、程式、物件、組件、資料結構等等。也可以在分散式計算環境中實踐本說明書實施例,在這些分散式計算環境中,由藉由通訊網路而被連接的遠端處理設備來執行事務。在分散式計算環境中,程式模組可以位於包括儲存設備在內的本地和遠端電腦儲存媒體中。   本說明書中的各個實施例均採用遞進的方式描述,各個實施例之間相同相似的部分互相參見即可,每個實施例重點說明的都是與其他實施例的不同之處。尤其,對於系統實施例而言,由於其基本相似於方法實施例,所以描述的比較簡單,相關之處參見方法實施例的部分說明即可。   以上所述僅為本說明書實施例而已,並不用於限制本發明。對於本領域技術人員來說,本說明書實施例可以有各種更改和變化。凡在本說明書實施例的精神和原理之內所作的任何修改、等同替換、改進等,均應包含在申請專利範圍之中。The technical solutions of the present invention will be clearly and completely described in conjunction with the specific embodiments of the present invention and the corresponding drawings. It is apparent that the described embodiments are only a part of the embodiments of the invention, and not all of the embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present disclosure without departing from the inventive scope are the scope of the invention. Based on the foregoing, the Internet of Things device is generally an Internet of Things smart item, and may include various smart items that can be carried around (such as smart bracelets, smart watches, etc.), various smart home items, and the like. In order to ensure the quality of IoT equipment and subsequent services, IoT devices usually carry unique corresponding identification information for identification. To prevent spoofing, the server usually needs to authenticate the IoT device that is trying to connect to it in advance. In the embodiment of the present specification, the information interaction scheme for the Internet of Things device may adopt an architecture as shown in FIG. 1 , in which the server may include various clustered and distributed servers; The access point may include various access points (APs) such as routers, mobile hotspots, and the like. In practical applications, the interaction between the IoT device and the server, and the interaction between the client and the server can be implemented by a network access point, which is preferably a data transparent transmission process for the network access point. The information exchange process for the Internet of Things device provided by the embodiment of the present specification will be described in detail based on the architecture shown in FIG. 1. The process includes the following three steps: client side, server side, and Internet of things device. In terms of aspects, they are explained separately. For the client side, including the following steps, as shown in FIG. 2, FIG. 2 is a schematic flowchart of the steps performed by the client in the information interaction scheme provided by the embodiment of the present disclosure: Step S201, obtaining user information and identifier of the Internet of Things device News. The user information may generally include the user's account information, the user's device unique identification code, the user's ID card information, or the user's mobile phone number, and the like. The user information can be automatically obtained by the client from the local terminal or manually input to the client by the user. The identifier information of the IoT device is usually defined by the service provider in advance. In the actual application scenario, there may be multiple specific expressions, for example, a string formed by a combination of various characters, and the user can directly input to the client; or, Digital Object Unique Identifier (DOI), including various barcodes, two-dimensional codes; or communication chips that can be recognized. In practical applications, obtaining identification information of an IoT device may include the following various implementation manners, and two of them are listed: First, using a terminal (for example, a camera on a terminal or a module such as a tag reader) The networked device scans to obtain identification information of the IoT device. For example, when the IoT device carries a DOI, a Radio Frequency Identification (RFID), or a Near Field Communication (NFC) chip, it can be acquired by scanning the corresponding module of the terminal. The second type receives the identification information of the Internet of Things device input by the user on the client. For example, when the identification information of the Internet of Things device is a string formed by various combinations of characters, the input method may be used by the user. This string is manually entered into the client. Step S203, sending the user information and the identification information of the Internet of Things device to the server for the server to authenticate. The servo end can use a preset algorithm to generate authentication information according to the identification information and user information of the Internet of Things device. For example, a certain algorithm generates a unique hash value according to the identification information and the user information of the Internet of Things device, and uses the hash value as the authentication information; for example, the security certificate is generated according to the identification information and the user information of the Internet of Things device. Certification information; and so on. Then send the authentication information to the client, so that the client can pass the authentication information to the IoT device. The server can then verify whether the IoT device attempting to connect is legal based on the authentication information. Step S205: Receive authentication information returned by the server. Step S207: Generate and send a data package carrying the authentication information, so that the Internet of Things device obtains the authentication information from the data package for connecting to the server. The data package may include: a User Datagram Protocol (UDP) data packet, a Transmission Control Protocol (TCP) data packet, or a data packet in a custom format. The data package usually includes a header and a data body. Taking a UDP packet as an example, the header includes fields such as a source IP address, a destination IP address, a packet length, and a checksum. The unconfigured IoT device may not be able to parse the data content of the UDP packet, but can parse the header content of the UDP packet relatively quickly. Based on this, the authentication information can be written into the header of the UDP packet to ensure the object. Networked devices do get authentication information by quickly parsing them. For example, in the target IP field of the UDP packet, the IP address of the receiver should be written under normal circumstances to achieve point-to-point transmission. However, in this embodiment, the IP address of the receiver is not written, but the authentication information is written into the target IP address field of the data packet, so that the IoT device receives and parses the target IP address field. Content, get certification information. For custom format packets, the protocol supporting the custom format can also be pre-written into the protocol stack of the IoT device to support the custom format packet parsing process. In this application scenario, the client writes authentication information to the header and/or body of the packet as needed. In practical applications, the amount of information that a single packet can carry is limited. When the authentication information to be transmitted is long, the authentication information may be split and written into a specified field (for example, a length or a target IP address) of the data packet to generate a plurality of data packets carrying partial authentication information. Further, the client can broadcast the generated data packet on one or more channels in the connected wireless network. During the packet broadcast process, the IoT device that probes these channels can receive the packet. In a specific implementation manner, before the data packet carrying the authentication information is generated, the target network information may be acquired. Further, in step S207, generating a data packet carrying the authentication information includes: generating a data packet carrying the authentication information and target network information. The target network refers to the network on which the IoT device is connected when connecting to the server. The target network can be specified by the user through the client, or can be determined by the IoT device based on preset rules (for example, automatically scanning to an available passwordless WiFi network as the target network). The following embodiments are mainly explained based on the former method. The target network is, for example, a wireless network to which the client is currently connected, or another wireless network designated by the user. The target network information generally includes the identity of the target network and the password. For a WiFi network, the identity is specifically a Service Set Identifier (SSID), which is a so-called WiFi name. Of course, the target network may also have no password. For example, the user terminal itself is connected to the network through the WiFi network M1, but a smart home appliance that is desired to be purchased is connected to the Internet through the WiFi network M5, and the password of the network M5 is 000000. In this scenario, the target network information includes the identity network M5 of the target network and its password 000000. If the password is not required to connect to the network M5, the target network information includes the target network identity M5. The method for obtaining the target network information may include: obtaining the client locally, or pre-setting by the user, inputting to the client, and the like. With the above solution, the client can transmit the target network information and the authentication information to the IoT device at one time, which simplifies the user's operation. In a specific implementation, for the step S207, the data packet carrying the authentication information is generated, and the following method may be used. As shown in FIG. 3, FIG. 3 is a schematic flowchart of a method for generating a data packet according to an embodiment of the present disclosure: Step S301 , format conversion of the authentication information according to the format of the specified data package field. The data package field has a preset format, such as a number in the UDP packet with a length field between 0 and 255. However, for authentication information, it may not all be a number. Based on this, the authentication information needs to be converted into a format acceptable for the specified field of the data package before the field can be written. Specifically, each byte in the byte sequence corresponding to the authentication information may be converted into a format acceptable for the specified field by using a certain rule, and then the formatted authentication information is written into the data packet. Length or destination IP address field. For example, assume that the rule is an American Standard Code for Information Interchange (ASCII) table. If the authentication information is the string "K2", in order to write the authentication information into the length field of the UDP packet, it is first necessary to convert "K2" into a format-compliant number. By querying the ASCII table, the byte corresponding to the character "K" contained in "K2" is 010011011 (binary), and the decimal value is 75, then 75 is the number obtained by "K" conversion; similarly, "K2" The byte corresponding to the character "2" contained in the character is 00000010, and is represented by 2 in decimal data, and 2 is the number converted by the character "2"; therefore, "K2" is converted into the numeric string 752. Step S303, by writing the formatted authentication information into the corresponding data packet field, obtaining a data package carrying the authentication information; wherein, the designated data package field includes: a data packet length field and/or a target. IP address field. Continuing the previous example, if the specified position is the length position, 75 can be written to the length position of a data packet, and 2 is written to the length position of the next data packet. And issued in turn. If the specified location is the destination IP address, the format of the target IP address is abcd, where a, b, c, and d are numbers between 0 and 255 (for example, 192.168.0.11). In practical applications, The following processing may be employed: writing the number to a specified location in the target IP address, for example, writing the number to the last bit of the destination IP address. The client side is described above. Based on the same idea, the information exchange process of the IoT device provided by the embodiment of the present specification is as shown in FIG. 4 for the server side, and FIG. 4 is provided by the embodiment of the present specification. The flow chart of the execution steps of the server in the information interaction scheme includes the following steps: Step S401: Receive user information sent by the client and identifier information of the Internet of Things device; Step S403, the user information and/or object The identification information of the networked device is authenticated, the authentication information is obtained, and the client is returned. In an actual application scenario, the server may further perform: establishing and storing a binding relationship between the identifier information of the IoT device and the user information. For example, a one-to-one correspondence between the identification information of the Internet of Things device and the user information is established in the form of a key-value pair, and the binding record is generated and stored locally to the server. Further, the related Internet of Things service can be executed based on the stored binding relationship. For example, when an IoT device is working in a normal network, the signal can be collected by the sensor carried by the IoT device and uploaded to the server. The server analyzes the signal and binds it according to the signal analysis result and the stored binding relationship. Feedback from the client corresponding to the user information. Assuming that the IoT device is a smart bracelet, the server receives the pulse signal collected and sent by the smart bracelet for analysis, and sends the pulse signal analysis result to the bound user's mobile phone number, so that the user can understand the wearing of the smart phone at any time. The health status of the person in the bracelet. As a specific implementation manner, after the obtaining the authentication information and returning to the client, performing: receiving the authentication information sent by the Internet of Things device; and the Internet of Things based on the authentication information The device establishes a trusted network connection. Specifically, the server verifies the authentication information sent by the Internet of Things device, and after the verification is passed, establishes a trusted network connection with the Internet of Things device. For example, if the authentication information is saved on the server after being generated, after the authentication information sent by the Internet of Things device is received, the verification is completed by matching the received authentication information with the locally stored authentication information. For another example, if the authentication information is not saved on the server, the authentication information may be verified according to a preset algorithm (for example, a hash algorithm). In practical applications, verifying authentication information may be one of the prerequisites for establishing a trusted network connection. In addition, other information processing actions may be required to establish a trusted network connection. These actions may require additional information from the IoT device and/or the client. The other information mentioned is: identification information of the Internet of Things device, location information, and the like. By identifying the identification information of the Internet of Things device, the server can simultaneously identify what the IoT device is in the verification process, and obtain the user information corresponding to the IoT device according to the binding relationship; similarly, by acquiring the Internet of Things The location information of the device, the server can understand where the IoT device is, and perform business based on location. The above is the description of the servo terminal. Based on the same idea, the information exchange method of the Internet of Things article provided by the embodiment of the present specification is as shown in FIG. 5 for the server end, and FIG. 5 is provided for the embodiment of the present specification. The flow chart of the steps of the implementation of the IoT device in the information interaction scheme includes the following steps: Step S501: Obtain a data packet that is sent by the client and that carries the authentication information, and obtain the target network information. Specifically, the following implementation manner may be adopted: monitoring multiple radio network signal broadcast channels; and acquiring the data packet carrying the authentication information sent by the client. For example, the IoT device first acquires a plurality of surrounding wireless network signal broadcast channels, and then performs polling (if there is only one, no polling is required), and listens to the data packets in each channel to determine the wireless network signal broadcast channel. . When the data packet satisfies the preset condition, the data packet is obtained in the current wireless network signal broadcast channel. For example, it is monitored whether the received packet header contains a preset tag, and if so, it is determined as the packet carrying the authentication information, and the packet is obtained. There are a variety of specific determination conditions, which are not listed here. For the obtained target network information, in an actual application scenario, as an implementable manner, the Internet of Things device can obtain the target network from the WiFi network of the surrounding environment. For example, the Internet of Things device polls the WiFi network of the surrounding environment and finds that a public WiFi network can be networked without a password. At this time, the public WiFi network is the target network. As another implementation manner, the target network information may be obtained by acquiring a data packet that is sent by the client and carries the authentication information and the target network information. For example, the user connects to the network through the home network WiFi, and the designated Internet of Things device is also connected from the home network WiFi, and the client obtains the WiFi information of the home network as the target network information and writes the data package. Broadcast. At this time, the Internet of Things device can obtain the target network information (ie, the WiFi information of the home network) from the received data package. Step S503, performing network configuration according to the target network information to access the target network. Step S505, establishing a trusted network connection with the server according to the authentication information and the target network that has been accessed. That is, in the connected target network, the authentication information is sent to the server, and after the server verifies that the authentication information is legal, the two parties establish a trusted network connection. As a specific implementation manner, before performing network configuration according to the target network information, the method further includes: performing format conversion on a specified field of the data packet according to a preset rule, and acquiring Describe the certification information. For example, the length field of the received data packet is sequentially queried, the numbers 75 and 2 are obtained, converted according to the ASCII table, and spliced together to obtain the authentication information as "K2". In the embodiment of the present specification, the client uploads the identification information and the user information of the IoT device, and the server binds and authenticates, and then the client transmits the authentication information to the Internet of Things device to realize the networking of the Internet of Things device, thereby reducing the The number of interactions in the IoT device configuration process makes the entire configuration process more concise, reducing the user's operation and improving the user experience. In addition, the client can also pass the target network information and authentication information to the IoT device at the same time, which further simplifies the user's operation. Based on the same idea, the embodiment of the present specification further provides an information interaction device for the Internet of Things device. As shown in FIG. 6 , FIG. 6 is a schematic structural diagram of an information interaction device of a client according to an embodiment of the present disclosure, including: The group 601 obtains the user information and the identification information of the Internet of Things device; the sending module 603 sends the user information and the identification information of the Internet of Things device to the server for the server to authenticate; the receiving module 605 receives the server. Returning the authentication information; generating a module 607, generating a data package carrying the authentication information; the sending module 603 is further configured to send the data packet, so that the Internet of Things device obtains the authentication information from the data packet for connecting to the server. Further, the acquiring module 601 obtains identification information of the Internet of Things device by scanning the Internet of Things device, or receives identification information of the Internet of Things device manually input by the user. Further, before the data packet carrying the authentication information is generated, the acquiring module 601 is further configured to acquire target network information, and the generating module is further configured to generate the authentication information and the target network information. Information package. Further, the generating module 607 performs format conversion on the authentication information according to the format of the specified data packet field; and the authentication information is obtained by writing the formatted authentication information into the corresponding data packet field. The data package field; wherein, the designated data package field comprises: a data packet length field and/or a target IP address field. Further, the sending module 603 broadcasts the data by using the currently connected wireless network. package. In the meantime, the embodiment of the present specification further provides an information interaction device for the Internet of Things device. As shown in FIG. 7 , FIG. 7 is a schematic structural diagram of an information interaction device according to an embodiment of the present disclosure, including: a receiving module 701. Receiving identification information and user information of the IoT device sent by the client; the authentication module 703 authenticating the user information and/or the identification information of the Internet of Things device to obtain authentication information; the sending module 705, sending The authentication information is sent to the client. Further, the device further includes: a setup module 707, configured to establish a binding relationship between the identifier information of the Internet of Things device and the user information, for executing the object related to the Internet of Things device and the user information The networked service; the storage module 709 stores the binding relationship. After the authentication information is obtained and returned to the client, the receiving module 701 receives the authentication information sent by the Internet of Things device, and establishes with the Internet of Things device based on the authentication information. Trusted network connection. In the meantime, the embodiment of the present specification further provides an information interaction device for the Internet of Things device. As shown in FIG. 8 , FIG. 8 is a schematic structural diagram of an information interaction device for the Internet of Things device according to an embodiment of the present disclosure, including: acquiring module 801 Obtaining a data packet carrying the authentication information sent by the client, and acquiring the target network information; the network configuration module 803, performing network configuration according to the target network information to access the target network; The group 805 establishes a trusted network connection with the server according to the authentication information and the target network that has been accessed. Further, the obtaining module 801 acquires a data packet that is sent by the client and carries the authentication information and the target network information, where the target network information includes information about the WiFi network currently connected by the client, and the obtaining The module 801 monitors a plurality of wireless network signal broadcast channels, and acquires the data package when the data packet carrying the authentication information sent by the client is monitored. Further, the obtaining module 801 performs format conversion on the specified field of the data packet based on a preset rule to obtain the authentication information. Correspondingly, the present specification further provides an information interaction device for the Internet of Things device, comprising: a memory for storing an Internet of Things device networking program; a processor, calling an Internet of Things device networking program in the memory, and executing: obtaining and using And the identification information of the IoT device; sending the user information and the identification information of the IoT device to the server for the server to authenticate; receiving the authentication information returned by the server; generating and transmitting the information carrying the authentication information And a packet, wherein the IoT device obtains the authentication information from the data package for connecting to a server. Correspondingly, the present specification further provides another information interaction device for the Internet of Things device, the device comprising: a memory for storing an Internet of Things device networking program; a processor, calling an Internet of Things device networking program in the memory, and Execution: receiving user information sent by the client and identification information of the Internet of Things device; authenticating the user information and/or the identification information of the Internet of Things device, obtaining authentication information, and returning to the client. Correspondingly, the present specification further provides an information interaction device for the Internet of Things device, the device being the Internet of Things item itself, comprising: a memory for storing an Internet of Things device networking program; a processor, calling the object in the memory a networked device networking program, and executing obtaining a data packet carrying the authentication information sent by the client, and acquiring the target network information; performing network configuration according to the target network information to access the target network; The authentication information and the target network that has been accessed establish a trusted network connection with the server. Based on the same idea, the embodiment of the present specification further provides a non-volatile computer storage medium, where computer executable instructions are stored, and the computer executable instructions are set to: send the user information and the identification information of the Internet of Things device to The server is configured to receive the authentication information returned by the server; and generate and send the data packet carrying the authentication information, so that the Internet of Things device obtains the authentication information from the data package for connecting to the server. Correspondingly, the embodiment of the present specification further provides another non-volatile computer storage medium, which stores computer executable instructions, and the computer executable instructions are set to: receive user information sent by the client and identifier of the Internet of Things device. Information; authentication of the user information and/or identification information of the Internet of Things device, obtaining authentication information and returning to the client. Correspondingly, the embodiment of the present specification further provides a non-volatile computer storage medium, where the computer executable instructions are stored, and the computer executable instructions are set to: obtain a data package that carries the authentication information sent by the client, and obtain the target. Network information; performing network configuration according to the target network information to access the target network; establishing a trusted network connection with the server according to the authentication information and the target network that has been accessed . The various embodiments in the specification are described in a progressive manner, and the same or similar parts between the various embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, the device, the device, and the media-type embodiment are relatively similar to the method embodiment, and the description is relatively simple. For details, refer to the description of the method embodiment, which will not be repeated here. The foregoing description of the specific embodiments of the specification has been described. Other embodiments are within the scope of the appended claims. In some cases, the actions or steps or modules described in the claims are performed in a different order than in the embodiments and the desired results can still be achieved. In addition, the processes depicted in the drawings are not necessarily in a particular order or in a sequential order to achieve the desired results. In some embodiments, multiplex processing and parallel processing are also possible or may be advantageous. In the 1990s, improvements to a technology could clearly distinguish between hardware improvements (eg, improvements to circuit structures such as diodes, transistors, switches, etc.) or software improvements (for method flow). Improve). However, as technology advances, many of today's method flow improvements can be seen as direct improvements in hardware circuit architecture. Designers almost always get the corresponding hardware structure by programming the improved method flow into the hardware circuit. Therefore, it cannot be said that the improvement of a method flow cannot be implemented by a hardware entity module. For example, a Programmable Logic Device (PLD) (such as a Field Programmable Gate Array (FPGA)) is an integrated circuit whose logic functions are determined by the user programming the device. Designers program themselves to "integrate" a digital system on a single PLD without requiring the chip manufacturer to design and fabricate a dedicated integrated circuit die. Moreover, today, instead of manually making integrated circuit chips, this programming is mostly implemented using "logic compiler" software, which is similar to the software compiler used in programming development, but before compiling The source code must also be written in a specific programming language. This is called the Hardware Description Language (HDL). HDL is not the only one, but there are many kinds, such as ABEL (Advanced Boolean Expression Language). ), AHDL (Altera Hardware Description Language), Confluence, CUPL (Cornell University Programming Language), HDCal, JHDL (Java Hardware Description Language), Lava, Lola, MyHDL, PALASM, RHDL (Ruby Hardware Description Language), etc. VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog are used. It should also be apparent to those skilled in the art that the hardware process for implementing the logic method flow can be easily obtained by simply programming the method flow into the integrated circuit with a few logic description languages. The controller can be implemented in any suitable manner, for example, the controller can be readable by, for example, a microprocessor or processor and a computer readable code (e.g., software or firmware) that can be executed by the (micro)processor. Media, logic gates, switches, Application Specific Integrated Circuits (ASICs), programmable logic controllers, and embedded microcontrollers. Examples of controllers include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM The Microchip PIC18F26K20 and the Silicone Labs C8051F320, the memory controller can also be implemented as part of the memory's control logic. It is also known to those skilled in the art that in addition to implementing the controller in a purely computer readable code, the controller can be logically programmed by means of logic gates, switches, ASICs, programmable logic controllers, and Embedded in the form of a microcontroller or the like to achieve the same function. Thus such a controller can be considered a hardware component, and the means for implementing various functions included therein can also be considered as a structure within the hardware component. Or even a device for implementing various functions can be considered as either a software module implementing the method or a structure within the hardware component. The system, device, module or unit illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product having a certain function. A typical implementation device is a computer. Specifically, the computer can be, for example, a personal computer, a notebook computer, a mobile phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet, a wearable device, or the like. A combination of any device in the device. For the convenience of description, the above devices are described separately by function into various units. Of course, the functions of the units may be implemented in the same or multiple software and/or hardware in the implementation of the embodiments of the present specification. Those skilled in the art will appreciate that embodiments of the present invention can be provided as a method, system, or computer program product. Thus, the present invention can take the form of a fully hardware embodiment, a fully software embodiment, or an embodiment combining soft and hardware aspects. Moreover, the present invention may take the form of a computer program product implemented on one or more computer usable storage media (including but not limited to disk memory, CD-ROM, optical memory, etc.) containing computer usable code. . The present invention has been described with reference to flowchart illustrations and/or block diagrams of a method, apparatus (system), and computer program product according to embodiments of the invention. It will be understood that each flow and/or block of the flowcharts and/or <RTIgt; These computer program instructions can be provided to a processor of a general purpose computer, a special purpose computer, an embedded processor or other programmable data processing device to produce a machine for generating instructions by a processor of a computer or other programmable data processing device. Means for implementing the functions specified in one or more flows of a flowchart or a block or blocks of a flowchart. The computer program instructions can also be stored in a computer readable memory that can boot a computer or other programmable data processing device to operate in a particular manner, such that instructions stored in the computer readable memory produce an article of manufacture including the instruction device. The instruction means implements the functions specified in one or more flows of the flowchart or in a block or blocks of the flowchart. These computer program instructions can also be loaded onto a computer or other programmable data processing device to perform a series of operational steps on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device. The instructions provide steps for implementing the functions specified in one or more flows of the flowchart or in a block or blocks of the flowchart. In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, a network interface, and memory. The memory may include non-permanent memory, random access memory (RAM) and/or non-volatile memory in computer readable media, such as read only memory (ROM) or flash memory ( Flash RAM). Memory is an example of a computer readable medium. Computer readable media including both permanent and non-permanent, removable and non-removable media can be stored by any method or technology. Information can be computer readable instructions, data structures, modules of programs, or other materials. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), and other types of random access memory (RAM). Read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) Or other optical storage, magnetic tape cassette, magnetic tape storage or other magnetic storage device or any other non-transportable media that can be used to store information that can be accessed by the computing device. As defined herein, computer readable media does not include temporary storage of computer readable media, such as modulated datagram numbers and carrier waves. It is also to be understood that the terms "comprises" or "comprising" or "comprising" or any other variations are intended to encompass a non-exclusive inclusion, such that a process, method, article, Other elements not explicitly listed, or elements that are inherent to such a process, method, commodity, or equipment. An element defined by the phrase "comprising a ..." does not exclude the presence of additional equivalent elements in the process, method, item, or device including the element. Those skilled in the art will appreciate that one or more embodiments of the present specification can be provided as a method, system, or computer program product. Thus, embodiments of the present specification can take the form of a complete hardware embodiment, a fully software embodiment, or a combination of software and hardware. Moreover, embodiments of the present specification may employ computer program products implemented on one or more computer usable storage media (including but not limited to disk memory, CD-ROM, optical memory, etc.) including computer usable code. form. Embodiments of the present description can be described in the general context of computer-executable instructions executed by a computer, such as a program module. Generally, program modules include routines, programs, objects, components, data structures, and the like that perform particular transactions or implement particular abstract data types. Embodiments of the present specification can also be practiced in a distributed computing environment in which transactions are performed by remote processing devices that are connected by a communication network. In a distributed computing environment, program modules can be located in local and remote computer storage media, including storage devices. The various embodiments in the specification are described in a progressive manner, and the same or similar parts between the various embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant parts can be referred to the description of the method embodiment. The above descriptions are only examples of the present specification and are not intended to limit the present invention. Various modifications and changes may be made to the embodiments of the present disclosure. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and principles of the embodiments of the present specification are intended to be included in the scope of the claims.

S201~S207‧‧‧步驟S201~S207‧‧‧Steps

S301~S303‧‧‧步驟S301~S303‧‧‧Steps

S401~S403‧‧‧步驟S401~S403‧‧‧Steps

S501~S505‧‧‧步驟S501~S505‧‧‧Steps

601‧‧‧獲取模組601‧‧‧Getting module

603‧‧‧發送模組603‧‧‧Transmission module

605‧‧‧接收模組605‧‧‧ receiving module

607‧‧‧產生模組607‧‧‧ generating module

701‧‧‧接收模組701‧‧‧ receiving module

703‧‧‧認證模組703‧‧‧Certificate Module

705‧‧‧發送模組705‧‧‧Transmission module

707‧‧‧建立模組707‧‧‧Create module

709‧‧‧儲存模組709‧‧‧ storage module

801‧‧‧獲取模組801‧‧‧Get Module

803‧‧‧網路配置模組803‧‧‧Network Configuration Module

805‧‧‧連接模組805‧‧‧Connecting module

圖1為本說明書實施例提供的架構示意圖;   圖2為本說明書實施例提供的資訊交互方案中客戶端方面執行步驟的流程示意圖;   圖3為本說明書實施例提供的資料包產生方法流程示意圖;   圖4為本說明書實施例提供的資訊交互方案中伺服端方面執行步驟的流程示意圖;   圖5為本說明書實施例提供的資訊交互方案中物聯網設備方面執行步驟的流程示意圖;   圖6為本說明書實施例提供的客戶端方面的資訊交互裝置結構示意圖;   圖7為本說明書實施例提供的伺服端方面的資訊交互裝置結構示意圖;   圖8為本說明書實施例提供的物聯網設備方面的資訊交互裝置結構示意圖。1 is a schematic structural diagram of an embodiment of the present disclosure; FIG. 2 is a schematic flowchart of a method for executing a client in an information interaction scheme according to an embodiment of the present disclosure; FIG. 4 is a schematic flowchart of steps performed by a server in an information interaction scheme according to an embodiment of the present disclosure; FIG. 5 is a schematic flowchart of steps performed by an IoT device in an information interaction scheme according to an embodiment of the present disclosure; FIG. 7 is a schematic structural diagram of an information interaction device on a server side according to an embodiment of the present disclosure; FIG. 8 is a schematic diagram of an information interaction device for an Internet of Things device according to an embodiment of the present disclosure; Schematic.

Claims (27)

一種關於物聯網設備的資訊交互方法,包括:   獲取使用者資訊和物聯網設備的標識資訊;   發送該使用者資訊和物聯網設備的標識資訊至伺服端,以便伺服端認證;   接收伺服端返回的認證資訊;   產生並發送攜帶該認證資訊的資料包,以便該物聯網設備從該資料包獲取該認證資訊用於連接伺服端。A method for information interaction of an Internet of Things device, comprising: obtaining user information and identification information of the Internet of Things device; transmitting the user information and the identification information of the Internet of Things device to the server for server authentication; receiving the return from the server Authentication information; generating and transmitting a data package carrying the authentication information, so that the IoT device obtains the authentication information from the data package for connecting to the server. 如申請專利範圍第1項所述的方法,該獲取物聯網設備的標識資訊,包括:   藉由對物聯網設備進行掃描,獲取該物聯網設備的標識資訊;或者,   接收使用者手動輸入的該物聯網設備的標識資訊。The method of claim 1, wherein the obtaining the identification information of the Internet of Things device comprises: acquiring the identification information of the IoT device by scanning the IoT device; or receiving the manually input by the user. Identification information of IoT devices. 如申請專利範圍第1項所述的方法,該產生攜帶該認證資訊的資料包之前,包括:   獲取目標網路資訊;   該產生攜帶該認證資訊的資料包,包括:產生攜帶該認證資訊和該目標網路資訊的資料包。The method of claim 1, wherein the generating the information package carrying the authentication information comprises: acquiring the target network information; and generating the data package carrying the authentication information, including: generating the carrying the authentication information and the A package of target network information. 如申請專利範圍第1項所述的方法,該產生攜帶該認證資訊的資料包,包括:   按照指定資料包欄位的格式,對該認證資訊進行格式轉換;   藉由將格式轉換後的認證資訊寫入相應的資料包欄位,得到攜帶該認證資訊的資料包;   其中,所以指定資料包欄位包括:資料包長度欄位和/或目標IP位址欄位。The method of claim 1, wherein the generating the information package carrying the authentication information comprises: converting the authentication information according to a format of the specified data packet field; and authenticating the information by converting the format Write the corresponding data package field to get the data package carrying the authentication information; wherein, the specified data package field includes: the data packet length field and/or the target IP address field. 如申請專利範圍第1項所述的方法,該發送該資料包,包括:   藉由當前連接的無線網路廣播該資料包。The method of claim 1, wherein the transmitting the data packet comprises: broadcasting the data packet by using a currently connected wireless network. 一種關於物聯網設備的資訊交互方法,包括:   接收客戶端所發送的使用者資訊和物聯網設備的標識資訊;   對該使用者資訊和/或物聯網設備的標識資訊進行認證,得到認證資訊並返回該客戶端。An information interaction method for an Internet of Things device, comprising: receiving user information sent by a client and identification information of the Internet of Things device; authenticating the user information and/or the identification information of the Internet of Things device, and obtaining the authentication information and Return to this client. 如申請專利範圍第6項所述的方法,還包括:   建立並儲存該物聯網設備的標識資訊和使用者資訊的綁定關係,以用於執行涉及該物聯網設備和該使用者資訊的物聯網業務。The method of claim 6, further comprising: establishing and storing a binding relationship between the identification information of the IoT device and the user information, for executing the object related to the IoT device and the user information Networked business. 如申請專利範圍第6項所述的方法,該得到認證資訊並返回該客戶端之後,還包括:   接收該物聯網設備所發送的該認證資訊;   基於該認證資訊,與該物聯網設備建立可信網路連接。The method of claim 6, after the obtaining the authentication information and returning to the client, the method further includes: receiving the authentication information sent by the IoT device; establishing, according to the authentication information, the IoT device Letter network connection. 一種關於物聯網設備的資訊交互方法,包括:   獲取客戶端發送的攜帶認證資訊的資料包,以及獲取目標網路資訊;   根據該目標網路資訊進行網路配置,以接入該目標網路;   根據該認證資訊和已接入的該目標網路,與伺服端建立可信網路連接。An information interaction method for an IoT device, comprising: acquiring a data packet sent by a client carrying authentication information, and acquiring target network information; performing network configuration according to the target network information to access the target network; A trusted network connection is established with the server according to the authentication information and the target network that has been accessed. 如申請專利範圍第9項所述的方法,該獲取客戶端發送的攜帶認證資訊的資料包,以及獲取目標網路資訊,包括:   獲取客戶端發送的攜帶認證資訊和目標網路資訊的資料包;   該目標網路資訊包括客戶端當前連接的WiFi網路的資訊。For example, in the method of claim 9, the acquiring the data packet carrying the authentication information sent by the client, and obtaining the target network information, includes: acquiring the data packet that is sent by the client and carrying the authentication information and the target network information. The target network information includes information about the WiFi network currently connected to the client. 如申請專利範圍第9項所述的方法,該獲取客戶端發送的攜帶認證資訊的資料包,包括:   對多個無線網路信號廣播頻道進行監聽;   當監聽到客戶端發送的攜帶認證資訊的資料包時,獲取該資料包。For example, in the method of claim 9, the acquiring the data packet carrying the authentication information sent by the client includes: monitoring multiple broadcast channels of the wireless network signal; and monitoring the carrying of the authentication information sent by the client Obtain the package when the package is available. 如申請專利範圍第9項所述的方法,該根據該目標網路資訊進行網路配置之前,包括:   基於預設的規則,對該資料包的指定欄位進行格式轉換,獲取該認證資訊。For example, in the method of claim 9, the network configuration according to the target network information includes: converting a specified field of the data packet according to a preset rule to obtain the authentication information. 一種關於物聯網設備的資訊交互裝置,包括:   獲取模組,獲取使用者資訊和物聯網設備的標識資訊;   發送模組,發送該使用者資訊和物聯網設備的標識資訊至伺服端,以便伺服端認證;   接收模組,接收伺服端返回的認證資訊;   產生模組,產生攜帶該認證資訊的資料包;   該發送模組還用於,發送該資料包,以便該物聯網設備從該資料包獲取該認證資訊用於連接伺服端。An information interaction device for an Internet of Things device, comprising: acquiring a module, acquiring user information and identification information of the Internet of Things device; sending a module, transmitting the user information and the identification information of the Internet of Things device to the server for servoping The receiving module receives the authentication information returned by the server; generates a module to generate a data packet carrying the authentication information; the sending module is further configured to send the data packet, so that the IoT device can obtain the data packet Obtain the authentication information for connecting to the server. 如申請專利範圍第13項所述的裝置,該獲取模組,藉由對物聯網設備進行掃描,獲取該物聯網設備的標識資訊;或者,接收使用者手動輸入的該物聯網設備的標識資訊。The device of claim 13, wherein the acquiring module acquires identification information of the Internet of Things device by scanning the Internet of Things device; or receiving identification information of the IoT device manually input by the user. . 如申請專利範圍第13項所述的裝置,在產生攜帶該認證資訊的資料包之前,該獲取模組還用於,獲取目標網路資訊;該產生模組還用於,產生攜帶該認證資訊和目標網路資訊的資料包。The device of claim 13, wherein the obtaining module is further configured to acquire target network information before generating the data packet carrying the authentication information; the generating module is further configured to generate the information to be carried And a package of target network information. 如申請專利範圍第13項所述的裝置,該產生模組,按照指定資料包欄位的格式,對該認證資訊進行格式轉換;藉由將格式轉換後的認證資訊寫入相應的資料包欄位,得到攜帶該認證資訊的資料包;其中,所以指定資料包欄位包括:資料包長度欄位和/或目標IP位址欄位。The device of claim 13, wherein the generating module performs format conversion on the authentication information according to a format of the specified data packet field; and writes the formatted authentication information into the corresponding data package column Bit, get the data package carrying the authentication information; wherein, the specified data package field includes: the data packet length field and/or the target IP address field. 如申請專利範圍第13項所述的裝置,該發送模組,藉由當前連接的無線網路廣播該資料包。The device of claim 13, wherein the transmitting module broadcasts the data packet by using a currently connected wireless network. 一種關於物聯網設備的資訊交互裝置,包括:   接收模組,接收客戶端所發送的物聯網設備的標識資訊和使用者資訊;   認證模組,對該使用者資訊和/或物聯網設備的標識資訊進行認證,得到認證資訊;   發送模組,發送該認證資訊至客戶端。An information interaction device for an Internet of Things device, comprising: a receiving module, receiving identification information and user information of an IoT device sent by a client; an authentication module, an identifier of the user information and/or an Internet of Things device The information is authenticated and the authentication information is obtained; the sending module sends the authentication information to the client. 如申請專利範圍第18項所述的裝置,還包括:建立模組,建立該物聯網設備的標識資訊和使用者資訊的綁定關係,以用於執行涉及該物聯網設備和該使用者資訊的物聯網業務;儲存模組,儲存該綁定關係。The device of claim 18, further comprising: establishing a module, establishing a binding relationship between the identification information of the Internet of Things device and the user information, for performing the information related to the Internet of Things device and the user information The Internet of Things business; a storage module that stores the binding relationship. 如申請專利範圍第19項所述的裝置,得到認證資訊並返回該客戶端之後,該接收模組,接收該物聯網設備所發送的該認證資訊,基於該認證資訊,與該物聯網設備建立可信網路連接。The device of claim 19, after receiving the authentication information and returning to the client, the receiving module receives the authentication information sent by the Internet of Things device, and establishes with the Internet of Things device based on the authentication information. Trusted network connection. 一種關於物聯網設備的資訊交互裝置,包括:   獲取模組,獲取客戶端發送的攜帶認證資訊的資料包,以及獲取目標網路資訊;   網路配置模組,根據該目標網路資訊進行網路配置,以接入該目標網路;   連接模組,根據該認證資訊和已接入的該目標網路,與伺服端建立可信網路連接。An information interaction device for an IoT device, comprising: acquiring a module, acquiring a data packet carrying the authentication information sent by the client, and acquiring target network information; and a network configuration module, performing network according to the target network information The configuration is to access the target network; the connection module establishes a trusted network connection with the server according to the authentication information and the target network that has been accessed. 如申請專利範圍第21項所述的裝置,該獲取模組,獲取客戶端發送的攜帶認證資訊和目標網路資訊的資料包,該目標網路資訊包括客戶端當前連接的WiFi網路的資訊。The device of claim 21, the acquiring module acquires a data packet that is sent by the client and carries the authentication information and the target network information, where the target network information includes information about the WiFi network currently connected by the client. . 如申請專利範圍第21項所述的裝置,該獲取模組,對多個無線網路信號廣播頻道進行監聽,當監聽到客戶端發送的攜帶認證資訊的資料包時,獲取該資料包。The device as claimed in claim 21, wherein the acquiring module monitors a plurality of wireless network signal broadcast channels, and acquires the data package when the data packet carrying the authentication information sent by the client is monitored. 如申請專利範圍第21項所述的裝置,該獲取模組,基於預設的規則,對該資料包的指定欄位進行格式轉換,獲取該認證資訊。The device according to claim 21, wherein the acquiring module performs format conversion on the specified field of the data packet based on a preset rule to obtain the authentication information. 一種關於物聯網設備的資訊交互設備,包括:   記憶體,用於儲存物聯網設備聯網程式;   處理器,調用儲存設備中的物聯網設備聯網程式,並執行:   獲取使用者資訊和物聯網設備的標識資訊;   發送該使用者資訊和物聯網設備的標識資訊至伺服端,以便伺服端認證;   接收伺服端返回的認證資訊;   產生並發送攜帶該認證資訊的資料包,以便該物聯網設備從該資料包獲取該認證資訊用於連接伺服端。An information interaction device for an Internet of Things device, comprising: a memory for storing an Internet of Things device networking program; a processor, calling an Internet of Things device networking program in the storage device, and executing: obtaining user information and an IoT device Identifying the information; sending the user information and the identification information of the IoT device to the server for the server to authenticate; receiving the authentication information returned by the server; generating and transmitting the data packet carrying the authentication information, so that the IoT device can The data package obtains the authentication information for connecting to the server. 一種關於物聯網設備的資訊交互設備,包括:   記憶體,用於儲存物聯網設備聯網程式;   處理器,調用記憶體中的物聯網設備聯網程式,並執行:   接收客戶端所發送的使用者資訊和物聯網設備的標識資訊;   對該使用者資訊和/或物聯網設備的標識資訊進行認證,得到認證資訊並返回該客戶端。An information interaction device for an Internet of Things device, comprising: a memory for storing an Internet of Things device networking program; a processor, calling an Internet of Things device networking program in the memory, and executing: receiving user information sent by the client Identification information of the Internet of Things device; authentication of the user information and/or identification information of the Internet of Things device, obtaining authentication information and returning to the client. 一種關於物聯網設備的資訊交互設備,該設備為物聯網設備本身,包括:   記憶體,用於儲存物聯網設備聯網程式;   處理器,調用儲存設備中的物聯網設備聯網程式,並執行   獲取客戶端發送的攜帶認證資訊的資料包,以及獲取目標網路資訊;   根據該目標網路資訊進行網路配置,以接入該目標網路;   根據該認證資訊和已接入的該目標網路,與伺服端建立可信網路連接。An information interaction device for an Internet of Things device, which is an IoT device itself, comprising: a memory for storing an Internet of Things device networking program; a processor, calling an Internet of Things device networking program in the storage device, and executing a client Sending a packet carrying the authentication information and obtaining the target network information; performing network configuration according to the target network information to access the target network; and according to the authentication information and the target network that has been accessed, Establish a trusted network connection with the server.
TW107118238A 2017-09-18 2018-05-29 Information interaction method, device and equipment for internet of things equipment TWI719312B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
??201710839411.3 2017-09-18
CN201710839411.3 2017-09-18
CN201710839411.3A CN107612909B (en) 2017-09-18 2017-09-18 Information interaction method, device and equipment about Internet of things equipment

Publications (2)

Publication Number Publication Date
TW201915803A true TW201915803A (en) 2019-04-16
TWI719312B TWI719312B (en) 2021-02-21

Family

ID=61060735

Family Applications (1)

Application Number Title Priority Date Filing Date
TW107118238A TWI719312B (en) 2017-09-18 2018-05-29 Information interaction method, device and equipment for internet of things equipment

Country Status (3)

Country Link
CN (2) CN112217831B (en)
TW (1) TWI719312B (en)
WO (1) WO2019052532A1 (en)

Families Citing this family (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112217831B (en) * 2017-09-18 2023-04-25 创新先进技术有限公司 Information interaction method, device and equipment for Internet of things equipment
CN108173726A (en) * 2018-01-24 2018-06-15 物链(北京)科技有限公司 Electronic equipment quickly accesses access device, system and its cut-in method of Internet of Things
CN110072236B (en) * 2018-01-24 2022-07-22 阿里巴巴集团控股有限公司 Device connection method, device and system
CN112202908B (en) * 2018-01-30 2023-06-30 创新先进技术有限公司 Method, device, electronic equipment and system for associating equipment with account
CN108566391B (en) * 2018-03-30 2020-05-12 阿里巴巴集团控股有限公司 Login method and device for Internet of things equipment
CN109756386B (en) * 2018-09-07 2021-09-28 启迪云控(北京)科技有限公司 Communication optimization method and device based on cloud network vehicle cooperation
CN109827784A (en) * 2018-11-29 2019-05-31 深圳市元征科技股份有限公司 A kind of work state monitoring method and device of four-wheel position finder
CN109547474A (en) * 2018-12-21 2019-03-29 深圳市创梦天地科技有限公司 A kind of data transmission method and device
CN109714769B (en) * 2018-12-28 2020-01-14 北京深思数盾科技股份有限公司 Information binding method, device, equipment and storage medium
CN110519353B (en) * 2019-08-16 2022-03-04 蚂蚁蓉信(成都)网络科技有限公司 Service request processing method, device and equipment
CN110751244B (en) * 2019-09-26 2021-07-27 支付宝(杭州)信息技术有限公司 IOT (Internet of things) equipment activation method, IOT equipment activation device and IOT equipment activation equipment
CN114270781A (en) * 2019-10-18 2022-04-01 深圳市欢太科技有限公司 Device access method, device, system control method, electronic device and storage medium
CN112825574A (en) * 2019-11-15 2021-05-21 中兴通讯股份有限公司 Network connection establishing method, wireless access device, system and storage medium
CN110855677B (en) * 2019-11-15 2023-07-18 北京小米移动软件有限公司 Distribution network method and device, electronic equipment and storage medium
CN110856174B (en) * 2019-12-13 2020-11-27 上海兴容信息技术有限公司 Access authentication system, method, device, computer equipment and storage medium
CN111241549B (en) * 2020-01-08 2022-11-15 广州中国科学院计算机网络信息中心 Credible analysis method under heterogeneous identification system
CN110958276B (en) * 2020-02-24 2020-05-12 常州唯实智能物联创新中心有限公司 Trusted acquisition and logging method and device based on digital identity of intelligent Internet of things equipment
CN111328076B (en) 2020-02-25 2023-07-18 北京小米移动软件有限公司 Equipment network distribution method, device and medium
CN111400032B (en) * 2020-03-02 2023-07-21 杭州迪普信息技术有限公司 Resource allocation method and device
CN111262747B (en) * 2020-03-23 2023-05-02 中国建设银行股份有限公司 Internet of things-based equipment network access control method and Internet of things platform
CN111432031B (en) * 2020-04-17 2022-06-03 支付宝(杭州)信息技术有限公司 Internet of things equipment identity information generation method and device and electronic equipment
CN111787048B (en) * 2020-04-28 2023-08-04 北京沃东天骏信息技术有限公司 Connection method of terminal equipment, scheduling server and Internet of things system
CN111669448B (en) * 2020-06-30 2023-04-07 苏州三六零智能安全科技有限公司 Information interaction method and device for Internet of things equipment, storage medium and device
CN118171910A (en) * 2020-08-13 2024-06-11 支付宝(杭州)信息技术有限公司 Business risk identification method and device and electronic equipment
CN111985201B (en) * 2020-08-19 2023-12-29 支付宝(杭州)信息技术有限公司 Data processing rule generation method and device and electronic equipment
CN112002402A (en) * 2020-08-25 2020-11-27 上海至数企业发展有限公司 Medical equipment monitoring method and system based on digital twin body and storage medium
CN114117262A (en) * 2020-08-31 2022-03-01 Oppo广东移动通信有限公司 Internet of things equipment network distribution method and device, intelligent terminal and storage medium
CN112468567A (en) * 2020-10-22 2021-03-09 杭州智尔科技有限公司 Internet of things data transmission method and device and electronic equipment
CN112468538B (en) * 2020-11-04 2022-08-02 杭州萤石软件有限公司 Operation method and system of Internet of things equipment
CN112416545A (en) * 2020-11-04 2021-02-26 北京五八信息技术有限公司 Task processing method and device
CN118350027A (en) * 2020-11-20 2024-07-16 支付宝(杭州)信息技术有限公司 Method and device for processing privacy data
CN112583819B (en) * 2020-12-08 2023-03-24 支付宝(杭州)信息技术有限公司 Network interface state detection method, device and equipment
CN113949586B (en) * 2020-12-22 2024-06-14 技象科技(南京)有限公司 Distributed high-efficiency Internet of things equipment access system
CN112737902B (en) * 2020-12-31 2023-02-03 青岛海尔科技有限公司 Network configuration method and device, storage medium and electronic equipment
CN112800043A (en) * 2021-02-05 2021-05-14 凯通科技股份有限公司 Internet of things terminal information extraction method, device, equipment and storage medium
CN113765987A (en) * 2021-02-20 2021-12-07 北京沃东天骏信息技术有限公司 Method, device and system for managing and processing information of equipment of Internet of things
CN113037736B (en) * 2021-03-02 2023-07-14 四川九州电子科技股份有限公司 Authentication method, device, system and computer storage medium
CN115022353B (en) * 2021-03-05 2024-03-15 阿里巴巴新加坡控股有限公司 Network connection method, device and system of intelligent equipment
CN113259920B (en) * 2021-03-16 2021-11-30 浙江绍兴苏泊尔生活电器有限公司 Household appliance product
CN113726866A (en) * 2021-08-25 2021-11-30 湖南中车时代通信信号有限公司 Vehicle-ground communication method, device, equipment and medium
CN113726796B (en) * 2021-08-31 2023-10-27 深圳平安智慧医健科技有限公司 Data interaction method, device, equipment and medium based on medical internet of things
CN113766606B (en) * 2021-09-07 2023-07-25 四川长虹网络科技有限责任公司 Network distribution method, system, computer equipment and storage medium based on cellular communication
CN113989423A (en) * 2021-09-27 2022-01-28 广州三七网络科技有限公司 Digital asset manufacturing method, apparatus, computer device and storage medium
CN114158043A (en) * 2021-11-11 2022-03-08 珠海格力电器股份有限公司 Network distribution method, system and storage medium
CN114553948A (en) * 2022-02-11 2022-05-27 支付宝(杭州)信息技术有限公司 Service processing method and device
CN114666255B (en) * 2022-03-16 2024-04-05 京东科技信息技术有限公司 Method for testing network distribution performance of Internet of things equipment and related equipment thereof
CN114827968B (en) * 2022-03-31 2022-11-08 远峰科技股份有限公司 Big data transmission method of BLE intelligent key CANFD
CN114866576B (en) * 2022-04-02 2022-12-27 广东新邦智联科技有限公司 Power equipment management method, device, equipment and storage medium based on Internet of things
CN114928475B (en) * 2022-04-25 2023-11-21 浪潮工业互联网股份有限公司 Industrial equipment authentication method, equipment and medium based on identification analysis
CN114816800A (en) * 2022-05-07 2022-07-29 支付宝(杭州)信息技术有限公司 Event processing method and device applied to IoT (Internet of things) equipment
CN115277240B (en) * 2022-08-03 2024-06-25 河海大学 Authentication method and device for Internet of things equipment
CN116089380B (en) * 2023-04-10 2023-06-30 宇动源(北京)信息技术有限公司 Building data and Internet of things data binding method and system

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3006504B2 (en) * 1996-08-27 2000-02-07 日本電気株式会社 Authentication method of wireless terminal in wireless network and wireless network
US20110030039A1 (en) * 2009-07-31 2011-02-03 Eric Bilange Device, method and apparatus for authentication on untrusted networks via trusted networks
CN102368760B (en) * 2010-12-31 2014-10-22 中国人民解放军信息工程大学 Data secure transmission method among multilevel information systems
CN102231748B (en) * 2011-08-02 2014-12-24 杭州迪普科技有限公司 Method and device for verifying client
CN103401884B (en) * 2013-08-16 2017-07-28 深信服网络科技(深圳)有限公司 Public wireless environment online authentication method and system based on wechat
CN104427501B (en) * 2013-09-11 2016-04-06 腾讯科技(深圳)有限公司 Method for network access, device and system
CN104967595B (en) * 2014-10-31 2019-03-01 腾讯科技(深圳)有限公司 The method and apparatus that equipment is registered in platform of internet of things
CN105451300B (en) * 2015-11-04 2019-02-01 Oppo广东移动通信有限公司 A kind of method for connecting network and mobile device
CN106878935A (en) * 2015-12-11 2017-06-20 北京奇虎科技有限公司 A kind of sharing method of shop WiFi network, server and device
CN107018165A (en) * 2016-01-28 2017-08-04 阿里巴巴集团控股有限公司 The method and device of control internet of things equipment, server, mobile device
US20170238236A1 (en) * 2016-02-17 2017-08-17 Zitovault, Inc. Mac address-bound wlan password
CN106341834A (en) * 2016-08-25 2017-01-18 智能唯识科技(深圳)有限公司 Internet-of-things device configuration method, Internet-of-things device configuration apparatus, Internet-of-things device configuration system and Internet-of-things device
CN106488447A (en) * 2016-09-27 2017-03-08 深圳Tcl智能家庭科技有限公司 A kind of method and system of smart machine access network
CN106454828A (en) * 2016-09-30 2017-02-22 广东美的制冷设备有限公司 Network access authentication method, network access authentication device, network access device and router
GB2557353B (en) * 2016-12-08 2019-12-04 British Telecomm Configuration of wireless-equipped devices
CN106856609A (en) * 2017-02-28 2017-06-16 苏州福瑞思信息科技有限公司 A kind of network collocating method and device
CN106850209A (en) * 2017-02-28 2017-06-13 苏州福瑞思信息科技有限公司 A kind of identity identifying method and device
CN112217831B (en) * 2017-09-18 2023-04-25 创新先进技术有限公司 Information interaction method, device and equipment for Internet of things equipment

Also Published As

Publication number Publication date
WO2019052532A1 (en) 2019-03-21
CN112217831B (en) 2023-04-25
CN112217831A (en) 2021-01-12
TWI719312B (en) 2021-02-21
CN107612909A (en) 2018-01-19
CN107612909B (en) 2020-09-08

Similar Documents

Publication Publication Date Title
TWI719312B (en) Information interaction method, device and equipment for internet of things equipment
US10230720B2 (en) Authorization code flow for in-browser applications
US10686602B2 (en) Portable device interface methods and systems
WO2021077833A1 (en) Method and device for pushing information, electronic device, and computer-readable storage medium
US11641400B2 (en) Method and apparatus for secure passive wireless communication with Bluetooth vitals devices
EP3437249B1 (en) Registration of devices in secure domain
JP6756009B2 (en) Data transmission
CN109391634A (en) Establish method, terminal and the computer readable storage medium of communication
JP2018534852A (en) Internet Key Exchange (IKE) for secure association between devices
TW201706901A (en) Authentication method, apparatus, and system
CN108664395A (en) Applied program testing method, device, equipment and storage medium
CN109379742A (en) Access method, device and storage medium of wireless local area network
CN110620762A (en) RDMA (remote direct memory Access) -based data transmission method, network card, server and medium
CN108040355A (en) Method for network access and system
CN105848145A (en) WIFI intelligent configuration method and device
KR20160084680A (en) Method for authenticating iot device, method for executing iot device authentication, user device and authentication server
KR20080039153A (en) Method for pairing between mobile communication terminal and bluetooth device, mobile communication terminal and system for the same
WO2023141876A1 (en) Data transmission method, apparatus and system, electronic device, and readable medium
CN106095132B (en) Playback equipment keypress function setting method and device
CN111242652A (en) Block chaining method of tracing information and related equipment
CN105072212B (en) To code method and to code system
CN113038192B (en) Video processing method and device, electronic equipment and storage medium
JP6646189B2 (en) Enabling proximity operation using a long-range wireless communication interface
CN107370731B (en) Method and device for realizing communication between different applications based on natural language
CN113099025B (en) Method and device for adding friends in social application