WO2023173365A1 - Device discovery method and apparatus, device, storage medium, and program product - Google Patents

Device discovery method and apparatus, device, storage medium, and program product Download PDF

Info

Publication number
WO2023173365A1
WO2023173365A1 PCT/CN2022/081467 CN2022081467W WO2023173365A1 WO 2023173365 A1 WO2023173365 A1 WO 2023173365A1 CN 2022081467 W CN2022081467 W CN 2022081467W WO 2023173365 A1 WO2023173365 A1 WO 2023173365A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
uwb
target device
signal strength
configuration
Prior art date
Application number
PCT/CN2022/081467
Other languages
French (fr)
Chinese (zh)
Inventor
包永明
茹昭
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to PCT/CN2022/081467 priority Critical patent/WO2023173365A1/en
Publication of WO2023173365A1 publication Critical patent/WO2023173365A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic

Definitions

  • This application relates to the technical field of the Internet of Things, and in particular to a device discovery method, device, equipment, storage medium and program product.
  • IoT Internet of Things
  • the configuration device can usually obtain the device information of the IoT device by scanning a QR code or the user manually inputting a pairing code.
  • Embodiments of the present application provide a device discovery method, device, equipment, storage medium and program product.
  • the technical solutions are as follows:
  • embodiments of the present application provide a device discovery method, which is executed by a target device.
  • the method includes:
  • embodiments of the present application provide a device discovery method, which is executed by a configuration device.
  • the method includes:
  • the device information of the device is encrypted
  • a device discovery device which includes:
  • a receiving module configured to obtain the first UWB identification information of the configured device through ultra-wideband UWB;
  • a parsing module configured to parse the first UWB identification information and obtain verification information of the configuration device
  • An encryption module configured to encrypt the device information of the target device according to the verification information
  • a sending module configured to send the encrypted device information to the configuration device through UWB.
  • a device discovery device which includes:
  • a sending module configured to send the first UWB identification information to the target device in an ultra-wideband UWB manner, so that the target device can parse the first UWB identification information and obtain verification information of the configuration device. According to the verification information , encrypt the device information of the target device;
  • a receiving module configured to receive the encrypted device information sent by the target device through UWB;
  • a decryption module configured to decrypt the encrypted device information and obtain the device information of the target device.
  • embodiments of the present application provide a computer device, which includes a processor, a memory, and a transceiver.
  • the memory stores a computer program, and the computer program is configured to be executed by the processor, so as to Implement the above device discovery method.
  • embodiments of the present application also provide a computer-readable storage medium, in which a computer program is stored, and the computer program is loaded and executed by a processor to implement the above device discovery method.
  • the present application also provides a chip, which is used to run in a computer device, so that the computer device executes the above device discovery method.
  • the present application provides a computer program product including computer instructions stored in a computer-readable storage medium.
  • the processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device performs the above device discovery method.
  • the present application provides a computer program, which is executed by a processor of a computer device to implement the above device discovery method.
  • the verification information of the configuration device can be encoded and mapped to the UWB identification information of the configuration device.
  • the target device obtains the first UWB identification information of the configuration device through ultra-wideband UWB, parses the first UWB identification information to obtain the verification information, and then After encrypting the device information of the target device based on the verification information, it is sent to the configuration device through UWB; in the above solution, the user does not need to use the configuration device to perform QR code scanning, input, or control the configuration device to close to the target device and other cumbersome operations. This simplifies the device discovery process in IoT scenarios, improves device discovery efficiency, and ensures the security of device information transmission.
  • Figure 1 is a schematic diagram of the network architecture of the Internet of Things provided by an embodiment of the present application.
  • Figure 2 is a flow chart of a device discovery method provided by an embodiment of the present application.
  • Figure 3 is a flow chart of a device discovery method provided by an embodiment of the present application.
  • Figure 4 is a flow chart of a device discovery method provided by an embodiment of the present application.
  • Figure 5 is a flow chart of a device discovery method provided by an embodiment of the present application.
  • Figure 6 is a schematic diagram of device discovery and control sequence involved in the embodiment shown in Figure 5;
  • Figure 7 is a schematic diagram of another device discovery and control sequence involved in the embodiment shown in Figure 5;
  • Figure 8 is a block diagram of a device discovery device provided by an embodiment of the present application.
  • Figure 9 is a block diagram of a device discovery device provided by an embodiment of the present application.
  • Figure 10 is a schematic structural diagram of a computer device provided by an embodiment of the present application.
  • the network architecture of the Internet of Things may include: Internet of Things devices 110 and configuration devices 120;
  • the Internet of Things device 110 may be a device used to provide server functions corresponding to the Internet of Things protocol in the Internet of Things.
  • the source device can provide subscriptable resources to the outside world.
  • the IoT device 110 may be a smart home device, such as smart lamps, smart TVs, smart air conditioners, smart refrigerators, smart microwave ovens, smart rice cookers, sweeping robots, smart speakers, smart switches, and so on.
  • a smart home device such as smart lamps, smart TVs, smart air conditioners, smart refrigerators, smart microwave ovens, smart rice cookers, sweeping robots, smart speakers, smart switches, and so on.
  • the IoT device 110 may be an industrial production equipment, such as a lathe, an industrial robot, a solar panel, a wind turbine, etc.
  • the Internet of Things device 110 may be a commercial service device, such as an unmanned vending machine or the like.
  • the IoT device 110 may be an intelligent monitoring device, such as a surveillance camera, an infrared sensor, a sound sensor, a temperature sensor, etc.
  • the Internet of Things device 110 may also be a user-side terminal device.
  • the IoT device 110 can be a smart controller, a smart remote control, a smart phone, a tablet, a smart watch, a smart TV, a gateway, etc.; or the IoT device 110 can also be a personal computer, such as a desktop computer or a portable computer. , personal workstation, etc.
  • the configuration device 120 may be a user-side terminal device.
  • the configuration device 120 may be a smartphone, a tablet, a smart watch, a smart TV, or the like.
  • the configuration device 120 may also be a client entity (which may be a virtual entity) running on a terminal device.
  • the configuration device 120 may be running on a smartphone and used to configure the Internet of Things device. 110 APP for management and configuration.
  • the above-mentioned Internet of Things device 110 may be an electronic device that meets the same or different Internet of Things protocols.
  • it may be an electronic device that meets the Matter under the Connectivity Standards Alliance (CSA) (or Zigbee Alliance). protocol (or connected home over IP Working Group (CHIP) project).
  • CSA Connectivity Standards Alliance
  • CHAP connected home over IP Working Group
  • Matter is an IP-based IoT connection standard that solves the compatibility, security and connectivity issues existing in the current smart home market. Matter defines the technical solution for configuring IoT devices, including steps such as device discovery, device authentication, device configuration, and device operation.
  • the IoT devices in the Matter system can use QR Code (Quick Response Code, QR code), Manual Pairing Code (manual pairing code) ), NFC Tag (tag) and other methods to share the device information in Table 1 below to the configuration device in the system (also called Matter configurator).
  • QR Code Quick Response Code
  • QR code Manual Pairing Code
  • NFC Tag tag
  • Vendor ID Vendor ID (Identity, identification) Product ID Product ID Discovery Capabilities Bitmask Device discovery method bit mask Discriminator Device identification value (12bit) Passcode Password code(27bit) TLV data User-defined data
  • the format of the user-defined data in the above Table 1 is tag-length-value (Tag-Length-Value, TLV) format.
  • the configuration device is usually a smart terminal such as the user's smartphone.
  • the user is usually required to operate the smartphone.
  • the smartphone For example, after users purchase matter smart home devices, they need to scan the QR code on the device with their mobile phone to obtain device information, or manually enter the manual pairing code provided by the device into the mobile phone to obtain device information, or bring the mobile phone into close contact with the device to obtain device information through NFC. method to obtain device information.
  • NFC. method to obtain device information.
  • Figure 2 shows a flow chart of a device discovery method provided by an embodiment of the present application.
  • the method can be executed by a target device.
  • the target device can be an Internet of Things device in the network architecture shown in Figure 1. 110; This method may include the following steps:
  • Step 201 Obtain the first UWB identification information of the configuration device through ultra-wideband UWB.
  • the target device has an Ultra Wide Band (UWB) component, and UWB scanning can be enabled through the UWB component to obtain the UWB identification information of the configured device.
  • UWB component is a component with a UWB communication function, which can scan the UWB identification information of other devices, or communicate with the UWB components of other devices.
  • the above-mentioned UWB identification information may be the UWB tag identification information of a UWB tag built in/externally to the device; for example, the above-mentioned first UWB identification information may be the identification information of a UWB tag in the configuration device, for example , which can be the UWB tag ID of the configured device.
  • the above-mentioned UWB identification information may be the UWB component identification information of a UWB component built into the device.
  • the above-mentioned first UWB identification information may be the UWB component ID of the UWB component in the configuration device.
  • Step 202 Parse the first UWB identification information to obtain verification information of the configured device.
  • the first UWB identification information of the configuration device may be obtained by coding and mapping the verification information of the configuration device.
  • the target device can parse the first UWB identification information to obtain the verification information of the configured device.
  • Step 203 Encrypt the device information of the target device according to the verification information.
  • Step 204 Send the encrypted device information to the configuration device through UWB.
  • the verification information of the configuration device can be encoded and mapped to the UWB identification information of the configuration device.
  • the target device obtains the configuration device's third identification information through ultra-wideband UWB.
  • a UWB identification information parsing the first UWB identification information to obtain verification information, and then encrypting the device information of the target device according to the verification information, and then sending it to the configuration device through UWB;
  • the user does not need to use the configuration device for secondary Cumbersome operations such as QR code scanning, inputting, or controlling and configuring the device close to the target device simplify the device discovery process in IoT scenarios, improve device discovery efficiency, and ensure the security of device information transmission.
  • Figure 3 shows a flow chart of a device discovery method provided by an embodiment of the present application.
  • the method can be executed by a configuration device.
  • the configuration device can be the configuration device 120 in the network architecture shown in Figure 1. ; This method may include the following steps:
  • Step 301 Send the first UWB identification information to the target device in the ultra-wideband UWB mode, so that the target device can parse the first UWB identification information, obtain verification information of the configured device, and encrypt the device information of the target device based on the verification information.
  • Step 302 Receive the encrypted device information sent by the target device through UWB.
  • Step 303 Decrypt the encrypted device information to obtain the device information of the target device.
  • the verification information of the configuration device can be encoded and mapped to the UWB identification information of the configuration device.
  • the configuration device sends the first UWB to the target device in the UWB mode.
  • the target device can parse the first UWB identification information to obtain verification information, and then encrypt the device information of the target device according to the verification information, and then send it to the configuration device through UWB; accordingly, the configuration device can decrypt according to the verification information to obtain the above Device information; in the above solution, users do not need to use the configuration device to perform QR code scanning, input or control the configuration device close to the target device and other cumbersome operations, thereby simplifying the device discovery process in the Internet of Things scenario and improving device discovery efficiency. At the same time, the security of device information transmission is ensured.
  • Figure 4 shows a flow chart of a device discovery method provided by an embodiment of the present application.
  • the mobile phone 41 and the smart home device 42 are respectively provided with UWB components.
  • the mobile phone 41 and the smart home device 42 may each have built-in or external UWB tags.
  • the smart home device 42 After the smart home device 42 is powered on, the user turns on the UWB component/UWB tag of the mobile phone 41; the smart home device 42 scans the surrounding UWB devices. At this time, the mobile phone 41 can identify its own UWB through the UWB component/UWB tag. The information is sent to smart home device 42 (step 1). Among them, the UWB identification information sent by the mobile phone 41 is obtained by encoding and mapping based on the verification information of the mobile phone 41.
  • the smart home device 42 After the smart home device 42 obtains the above-mentioned UWB identification information through UWB, it can parse the UWB identification information to obtain the verification information of the mobile phone 41, and use the verification information of the mobile phone 41 to verify its own device information (such as all or all of the above in Table 1). part of the information) is encrypted (step 2), and the encrypted device information is sent to the mobile phone 41 through the UWB component (step 3); the mobile phone 41 decrypts the received encrypted device information (step 4) to obtain the intelligent device information of the home device 42, thereby completing the device discovery process.
  • Figure 5 shows a flow chart of a device discovery method provided by an embodiment of the present application.
  • This method can be interactively executed by a configuration device and a target device;
  • the target device can be a device in the network architecture shown in Figure 1 Internet of Things device 110
  • the above-mentioned configuration device may be the configuration device 120 in the network architecture shown in Figure 1; the method may include the following steps:
  • Step 501 The configuration device sends the first UWB identification information to the target device in the ultra-wideband UWB mode; accordingly, the target device obtains the first UWB identification information of the configuration device in the UWB mode.
  • the target device is a smart home device and the configuration device is the user's mobile phone
  • the user purchases the smart home device, he installs and powers on the smart home device, and installs an application (Application, APP) for managing the device on the mobile phone.
  • Application, APP Application
  • the user can turn on the UWB function of the mobile phone and approach the smart home device.
  • the smart home device obtains UWB identification information from the mobile phone through UWB.
  • smart home devices integrate UWB components (such as UWB chips). After the smart home device is powered on, the UWB scanning function can be turned on; UWB components are also integrated on the mobile phone, or a mobile phone case with UWB components is used. If the UWB component is integrated in In the mobile phone, the APP directly turns on the UWB function and sends UWB Tag information to the smart home device; if the UWB component is set in the mobile phone case, and the mobile phone case and the mobile phone communicate through BLE (Bluetooth Low Energy, low-power Bluetooth), the mobile phone The APP sends instructions to the mobile phone case through BLE, instructing the mobile phone case to send UWB tag information to the smart home device through the UWB component.
  • UWB components such as UWB chips.
  • the target device before the target device obtains the first UWB identification information of the configuration device through ultra-wideband UWB, it also includes:
  • the target device does not know any information about the configuration device before the configuration device discovers the target device, and during the device discovery process, the target device may obtain the UWB identification information of multiple UWB devices. Therefore, the target device needs to solve how to Accurately locate issues with target devices.
  • the target device when the target device obtains the UWB identification information of the configuration device through UWB, it will also obtain the first UWB measurement information between the target device and the configuration device.
  • the first UWB measurement information satisfies
  • the configuration device is determined to be located, which can also be called locking the configuration device.
  • the target device performs the step of obtaining the first UWB identification information of the configuration device through UWB.
  • the second UWB measurement information includes at least one of second angle information, second distance information, and second signal strength information.
  • the second UWB measurement information may include at least one of angle information, distance information, and signal strength information between the configuration device and the target device.
  • the above-mentioned second UWB measurement information may change as the relative positional relationship between the configuration device and the target device changes (including relative angle relationship, distance relationship and whether there is an obstacle).
  • the above-mentioned second UWB measurement information may be obtained by measurement by the target device, or the above-mentioned second UWB measurement information may be obtained by measurement by the configuration device.
  • the above second UWB measurement information can be obtained by joint measurement by the target device and the configuration device.
  • part of the above-mentioned second UWB measurement information is obtained by measurement by the target device, and other part of the information is obtained by measurement by the configuration device; or the above-mentioned second UWB measurement information may be an average result of the respective measurement results of the target device and the configuration device.
  • the second condition includes at least one of the following conditions:
  • the target device when the target device obtains the UWB identification information of the configuration device, and the second UWB measurement information indicates that the configuration device is currently within the second angle interval in front of the target device, it can be determined that the configuration device is located.
  • the configuration device can be moved in front of the target device to ensure that the configuration device is currently within the second angle range in front of the target device.
  • the target device when the target device obtains the UWB identification information of the configuration device, and the second UWB measurement information indicates that the configuration device is currently within the second distance interval around the target device, it can be determined that the configuration device is located.
  • the configuration device can be moved near the target device to ensure that the configuration device is currently within the second distance interval around the target device.
  • the signal strength indicated by the second signal strength information is within the second signal strength interval.
  • the target device when the target device obtains the UWB identification information of the configuration device, and the signal strength indicated by the second UWB measurement information is within the second signal strength interval (for example, the signal strength indicated by the second UWB measurement information is greater than second signal strength threshold), it can be determined that the configured device is located.
  • the configuration device may generate second UWB identification information of the configuration device according to the verification information of the configuration device.
  • the configuration device can pre-generate its own verification information through a compression algorithm or a specific encoding method, and use the generated string as the first UWB identification information.
  • the above verification information may include at least one of identity information and verification information.
  • the configuration device can generate the first UWB identification information of the configuration device based on the identity identification information of the configuration device and the role information of the configuration device.
  • the configuration device can pass its own identity identification information and role information together through a compression algorithm or a specific encoding method in advance to generate a string with a fixed number of bytes, and use the generated string as the first UWB identification information.
  • the target device may also generate the second UWB identification information of the target device based on the verification information of the target device.
  • the verification information of the target device may also include at least one of the identity information of the target device and the role information of the target device; for example, when the verification information contains identity information and verification information , the target device can generate the second UWB identification information of the target device according to the identity identification information of the target device and the role information of the target device.
  • the target device can encode and map its own identity identification information and role information into the second UWB identification information when it is powered on.
  • the second UWB identification information may also be information that is pre-written into the target device before the target device leaves the factory.
  • the configuration device may obtain third UWB measurement information with the target device; when the third UWB measurement information satisfies the third condition, determine that the target device is located.
  • the third UWB measurement information includes at least one of third angle information, third distance information, and third signal strength information.
  • the third condition includes at least one of the following conditions:
  • the angle indicated by the third angle information is within the third angle interval
  • the distance indicated by the third distance information is within the third distance interval
  • the signal strength indicated by the third signal strength information is within the third signal strength interval.
  • the configuration device can also determine to locate the target device before step 501.
  • the configuration device can obtain the second UWB identification information of the target device through UWB, and at the same time obtain the above-mentioned third UWB measurement information, and obtain the target device through UWB.
  • the third UWB measurement information determines whether the target device is located.
  • the determination method is similar to the way the target device determines whether the configuration device is located, and will not be described again here.
  • Step 502 The target device parses the first UWB identification information to obtain verification information of the configured device.
  • the target device after the target device obtains the first UWB identification information, it can parse the first UWB identification information according to the parsing method corresponding to the encoding mapping method of the first UWB identification information, and obtain the verification of the target device. information.
  • the above verification information includes identity identification information, such as identity ID (Identity, identification).
  • Step 503 The target device encrypts the device information of the target device based on the verification information.
  • the device information of the target device is encrypted based on the verification information, including:
  • the target device can use the identity ID of the above configured device as an encryption key to encrypt the device information of the target device.
  • the target device can also extract specified fields from the identity ID of the configured device as an encryption key to encrypt the device information of the target device.
  • the target device can also calculate by configuring the device's identity ID to obtain the encryption key to encrypt the device information of the target device.
  • the target device can also encrypt the device information of the target device using a preset encryption key based on the verification information.
  • the above verification information can be used to verify the legality of the configuration device obtaining the device information of the target device.
  • the verification information obtained by the target device parsing the first UWB identification information includes the role information of the configuration device; the target device encrypts the device information of the target device based on the verification information, including:
  • the target device When the role information of the configuration device indicates that the role of the configuration device is a configurator, the target device encrypts the device information of the target device based on the verification information.
  • the configuration device and the Internet of Things device may have respective role information, and the role information may be used to represent the role of the corresponding device in the Internet of Things.
  • UWB identification information is obtained through the mapping of identity ID and Role information (role information).
  • Identity ID is used for identity recognition in UWB communication.
  • Role information can be bitmask (bit mask/bit mask), which represents the object.
  • the target device determines that the located configuration device is a configurator
  • the device information of the target device can be encrypted and sent.
  • the target device encrypts the device information of the target device based on the verification information, including:
  • the device information of the target device is encrypted according to the verification information.
  • the first UWB measurement information includes at least one of first angle information, first distance information, and first signal strength information.
  • the first condition includes at least one of the following conditions:
  • the angle indicated by the first angle information is within the first angle interval
  • the distance indicated by the first distance information is within the first distance interval
  • the signal strength indicated by the first signal strength information is within the first signal strength interval.
  • the target device before the target device encrypts and sends the device information, it can determine whether the conditions for encryption and sending are met through UWB measurement information.
  • the determination method is similar to the way the target device determines whether the configuration device is located. This No further details will be given.
  • the first condition is a more stringent condition than the second condition.
  • the second angle interval is the same as the first angle interval, or the second angle interval includes the first angle interval.
  • the second distance interval is the same as the first distance interval, or the second distance interval includes the first distance interval.
  • the second signal strength interval is the same as the first signal strength interval, or the second signal strength interval Contains the first signal strength interval.
  • Step 504 The target device sends the encrypted device information to the configuration device through UWB; accordingly, the configuration device receives the encrypted device information sent by the target device through UWB.
  • the configuration device before receiving the encrypted device information sent by the target device, can also obtain the second UWB identification information of the target device through UWB; parse the second UWB identification information to obtain the target device. Verification information of the device, which contains role information. Configure the device to receive the encrypted device information sent by the target device through UWB, including: when the role information of the target device indicates that the role of the target device is an IoT device, configure the device to receive the encrypted device information sent by the target device through UWB. .
  • the configuration device when the configuration device determines that the located target device is an Internet of Things device, it can receive the encrypted device information of the target device.
  • Step 505 The configuration device decrypts the encrypted device information to obtain the device information of the target device.
  • the configuration device can decrypt the encrypted device information based on the verification information of the configuration device to obtain the device information of the target device.
  • the configuration device when the verification information of the configuration device includes the identity identification information of the configuration device, the configuration device generates an encryption key based on the identity identification information, and decrypts the encrypted device information based on the generated encryption key.
  • the configuration device can decrypt the encrypted device information according to the preset encryption key to obtain the device information of the target device.
  • the process of decrypting the encrypted device information by the configuration device corresponds to the process of encrypting the device information by the target device, and will not be described again here.
  • Step 506 The configuration device establishes a pairing connection with the target device based on the device information of the target device; correspondingly, the target device establishes a pairing connection with the configuration device based on the device information of the target device.
  • the configuration device establishes a pairing connection with the target device based on the device information of the target device, including:
  • a UWB-based pairing connection is established with the target device; correspondingly, the target device establishes a UWB-based pairing connection with the configuration device according to the password in the device information of the target device.
  • the configuration device establishes a pairing connection with the target device based on the device information of the target device, including:
  • a pairing connection based on the Internet of Things protocol (such as Matter protocol) is established with the target device.
  • the pairing is successful, and the target device can be configured at this time.
  • the above-mentioned pairing refers to the secure communication channel before establishing the configuration: including the establishment of the secure channel and device authentication.
  • the above-mentioned configuration may include: the configuration of the interoperability certificate after the pairing secure channel is established, and the basic information of the device. Configuration, clock synchronization configuration, location information configuration, access control permission configuration, etc.
  • an association relationship between the UWB identification information and the device identification information of the target device can be established.
  • the above device identification information may be the node ID (Node ID) of the target device obtained by the configuration device during the configuration of the target device.
  • the configuration device can locally establish and store the association between the UWB identification information and the device identification information of the target device, so that it can be obtained through UWB again later.
  • UWB identification information is received, it can be quickly determined that the pairing between the configuration device and the target device has been completed, avoiding the need to re-execute the device discovery and pairing process.
  • the configuration device can also control the target device based on the association between the second UWB identification information and the device identification information of the target device.
  • the target device After establishing an association between the second UWB identification information and the device identification information of the target device, based on the association between the second UWB identification information and the device identification information of the target device, the target device is The process of device control can include:
  • the target device is Device control methods can include:
  • FIG. 6 shows a schematic diagram of device discovery and pairing sequence according to an embodiment of the present application.
  • the device taking the configuration device as the configurator (APP) in the mobile phone, the target device as a smart home device (hereinafter referred to as the device), and the UWB identification information as the UWB tag ID as an example, the device discovery and pairing process can as follows:
  • the configurator device has a built-in UWB communication component, and its UWB tag ID consists of: identity ID (identification information) and Role (role information).
  • identity ID is used for UWB communication identification.
  • the device has a built-in UWB communication component, and its UWB tag ID consists of: identity ID and Role.
  • identity ID is used for UWB communication identification.
  • Role can be bitmask, indicating the role.
  • the instructions are the same as step 1; the device will VendorID, ProductID, Discriminator, Discovery Bitmask, Passcode and other information (i.e. the above device information) are stored in the secure storage area.
  • UWB communication can be established between the mobile APP and the device, and the identity and role of the other party can be identified through UWB identification information (the tag ID consists of the identity ID and Role).
  • the user holds the mobile phone and points to the device within a certain distance.
  • S62 The configurator detects the identification information of the UWB component of the device through UWB in real time.
  • the device returns its UWB tag ID, and UWB distance information, angle, signal strength and other information from the configurator.
  • the device is locked, that is, the device is determined to be positioned.
  • S65 The device detects the identification information of the UWB component of the configurator in real time through UWB.
  • the configurator returns the UWB tag ID, and UWB distance information, angle, signal strength and other information to the device.
  • the device determines through the obtained UWB angle information that when the angle is within a certain range, it locks the configurator.
  • S68 The device determines that the locked device is the configurator device through the Role information in the obtained UWB identification information.
  • the device obtains the UWB distance information.
  • the device specifies the distance range within which pairing information can be returned, VendorID, ProductID, Discriminator, Discovery Bitmask, and Passcode information are read from the secure storage area.
  • S610 The device generates a key k based on the identity ID of the configurator, and uses k to encrypt VendorID, ProductID, Discriminator, Discovery Bitmask, and Passcode information.
  • the device sends encrypted data through the UWB channel to the mobile APP whose identity ID is the configurator (devices whose role is not the configurator cannot send).
  • the configurator uses key k to decrypt the data and obtains VendorID, ProductID, Discriminator, Discovery Bitmask, and Passcode information.
  • S613 The configurator establishes pairing based on the UWB channel through the obtained passcode, or establishes pairing based on the Matter standard channel.
  • FIG. 7 shows another device discovery and pairing sequence diagram related to an embodiment of the present application.
  • the configuration device as the configurator (APP) in the mobile phone
  • the target device as a smart home device (hereinafter referred to as the device)
  • the UWB identification information as the UWB tag ID
  • the device discovery and pairing process can be as follows :
  • the configurator device has a built-in UWB communication component, and its UWB tag ID consists of: identity ID and role.
  • the identity ID is used for UWB communication identification.
  • the device has a built-in UWB communication component, and its UWB tag ID consists of: identity ID and Role.
  • identity ID is used for UWB communication identification.
  • Role can be bitmask, indicating the role.
  • the instructions are the same as step 1; the device will VendorID, ProductID, Discriminator, Discovery Bitmask, Passcode and other information (that is, the above device information) are stored in the device's secure storage area.
  • UWB communication can be established between the mobile APP and the device, and the identity and role of the other party can be identified through UWB identification information (the tag ID consists of the identity ID and Role).
  • the user holds the mobile phone and points to the device within a certain distance.
  • the device detects the identification information of the UWB component of the mobile phone APP in real time through UWB.
  • the configurator returns the UWB tag ID, and UWB distance information, angle, signal strength and other information to the device.
  • the device determines, through the obtained UWB angle information, that when the angle is within a certain range, it locks the configurator.
  • S75 The device knows that the locked device is the configurator device through the Role information in the obtained UWB identification information.
  • the device reads the VendorID, ProductID, Discriminator, Discovery Bitmask, and Passcode information from the secure storage area through the obtained UWB distance information. When the distance is small enough or when the device specifies the distance range within which pairing information can be returned.
  • the device generates key k based on the identity ID of the configurator, and uses k to encrypt VendorID, ProductID, Discriminator, Discovery Bitmask, and Passcode.
  • the device sends encrypted data through the UWB channel to the mobile phone whose identity ID and role is the configurator (devices whose role is not the configurator cannot send).
  • the configurator uses key k to decrypt the data and obtains VendorID, ProductID, Discriminator, Discovery Bitmask, and Passcode.
  • S710 The configurator establishes pairing based on the UWB channel through the obtained Passcode, or establishes pairing based on the Matter standard channel.
  • the device determines the distance between the configurator and the device through UWB, and decides whether to send the information required for pairing to the configurator. When the distance is small enough, it can effectively prevent other illegal users from using UWB. Configure the device remotely; the device uses the identity ID of the configurator to encrypt the information required for pairing the device and sends it to the configurator, making the transmission of data required for pairing more secure.
  • the verification information of the configuration device can be encoded and mapped to the UWB identification information of the configuration device.
  • the configuration device sends the first UWB identification to the target device through UWB.
  • the target device can parse the first UWB identification information to obtain the verification information, and then encrypt the device information of the target device according to the verification information, and then send it to the configuration device through UWB; accordingly, the configuration device can decrypt according to the verification information to obtain the above device information; in the above solution, users do not need to use the configuration device to perform QR code scanning, input, or control the configuration device to close to the target device, etc., thus simplifying the device discovery process in the Internet of Things scenario and improving device discovery efficiency. The security of device information transmission is ensured.
  • FIG. 8 shows a block diagram of a device discovery device provided by an embodiment of the present application.
  • the device discovery device 800 has the function of implementing the configuration device in the method shown in FIG. 2 or FIG. 5 .
  • the device discovery device 800 may include:
  • the receiving module 801 is used to obtain the first UWB identification information of the configuration device through the ultra-wideband UWB method;
  • Parsing module 802 is used to parse the first UWB identification information and obtain verification information of the configuration device;
  • Encryption module 803 configured to encrypt the device information of the target device according to the verification information
  • the sending module 804 is configured to send the encrypted device information to the configuration device through UWB.
  • the verification information includes identity identification information.
  • the encryption module 803 is used to:
  • Device information of the target device is encrypted according to the encryption key.
  • the above verification information also includes role information
  • the encryption module 803 is configured to encrypt the device information of the target device according to the verification information when the role information of the configuration device indicates that the role of the configuration device is a configurator.
  • the encryption module 803 is used to:
  • the device information of the target device is encrypted according to the verification information.
  • the first UWB measurement information includes at least one of first angle information, first distance information, and first signal strength information.
  • the first condition includes at least one of the following conditions:
  • the angle indicated by the first angle information is within the first angle interval
  • the distance indicated by the first distance information is within a first distance interval
  • the signal strength indicated by the first signal strength information is within a first signal strength interval.
  • the device further includes:
  • a measurement information acquisition module configured to acquire the second UWB measurement information with the configuration device before the receiving module acquires the first UWB identification information of the configuration device through ultra-wideband UWB;
  • a positioning module configured to determine to locate the configuration device when the second UWB measurement information satisfies the second condition.
  • the second UWB measurement information includes at least one of second angle information, second distance information, and second signal strength information.
  • the second condition includes at least one of the following conditions:
  • the angle indicated by the second angle information is within the second angle interval
  • the distance indicated by the second distance information is within the second distance interval
  • the signal strength indicated by the second signal strength information is within a second signal strength interval.
  • the device further includes:
  • a label generation module configured to generate second UWB identification information of the target device according to the verification information of the target device.
  • the device further includes:
  • a pairing module configured to establish a pairing connection with the configuration device according to the device information of the target device.
  • the pairing module is configured to establish a UWB-based pairing connection with the configuration device according to the password in the device information of the target device.
  • FIG. 9 shows a block diagram of a device discovery device provided by an embodiment of the present application.
  • the device discovery device 900 has the function of being executed by the target device in implementing the method shown in FIG. 3 or FIG. 5 .
  • the device discovery device 900 may include:
  • the sending module 901 is configured to send the first UWB identification information to the target device in the ultra-wideband UWB mode, so that the target device can parse the first UWB identification information and obtain the verification information of the configuration device. According to the verification Information, encrypt the device information of the target device;
  • the receiving module 902 is configured to receive the encrypted device information sent by the target device through UWB;
  • the decryption module 903 is used to decrypt the encrypted device information to obtain the device information of the target device.
  • the device further includes:
  • a pairing module configured to establish a pairing connection with the target device according to the device information of the target device.
  • the pairing module is configured to establish a UWB-based pairing connection with the target device according to the password in the device information of the target device.
  • the device further includes:
  • a measurement information acquisition module configured to acquire third UWB measurement information with the target device before the sending module sends the first UWB identification information to the target device in an ultra-wideband UWB manner;
  • a positioning module configured to determine to locate the target device when the third UWB measurement information satisfies a third condition.
  • the third UWB measurement information includes at least one of third angle information, third distance information, and third signal strength information.
  • the third condition includes at least one of the following conditions:
  • the angle indicated by the third angle information is within a third angle interval
  • the distance indicated by the third distance information is within a third distance interval
  • the signal strength indicated by the third signal strength information is within a third signal strength interval.
  • the receiving module 902 is further configured to obtain the second UWB of the target device through UWB before receiving the encrypted device information sent by the target device through UWB. identification information;
  • the device further includes: a parsing module for parsing the second UWB identification information to obtain verification information of the target device; the verification information includes role information;
  • the receiving module 902 is configured to receive the encrypted device information sent by the target device in a UWB manner when the role information of the target device indicates that the role of the target device is an Internet of Things device.
  • FIG. 10 shows a schematic structural diagram of a computer device 1000 provided by an embodiment of the present application.
  • the computer device 1000 may include a processor 1001, a receiver 1002, a transmitter 1003, a memory 1004, and a bus 1005.
  • the processor 1001 includes one or more processing cores.
  • the processor 1001 executes various functional applications and information processing by running software programs and modules.
  • the receiver 1002 and the transmitter 1003 can be implemented as a communication component, and the communication component can be a communication chip.
  • This communication chip can also be called a transceiver.
  • the memory 1004 is connected to the processor 1001 through a bus 1005.
  • the memory 1004 can be used to store a computer program, and the processor 1001 is used to execute the computer program to implement various steps in the above method embodiments.
  • memory 1004 may be implemented by any type of volatile or non-volatile storage device, or combination thereof, including but not limited to: magnetic or optical disks, electrically erasable programmable Read-only memory, erasable programmable read-only memory, static ready-access memory, read-only memory, magnetic memory, flash memory, programmable read-only memory.
  • the transceiver when the computer device 1000 is implemented as a configuration device, the transceiver is configured to send the first UWB identification information to the target device in an ultra-wideband UWB manner, so that the target device can identify the first UWB identification information. Parse the UWB identification information to obtain the verification information of the configuration device, encrypt the device information of the target device according to the verification information; receive the encrypted device information sent by the target device through UWB; The processor is configured to decrypt the encrypted device information to obtain the device information of the target device.
  • the process performed by the processor and/or transceiver in the computer device 1000 may refer to the various steps performed by the configuration device in the method shown in either of the above-mentioned FIG. 3 or FIG. 5 .
  • the transceiver when the computer device 1000 is implemented as a target device, the transceiver is configured to obtain the first UWB identification information of the configuration device through ultra-wideband UWB; and the processor is configured to configure the device.
  • the first UWB identification information is parsed to obtain the verification information of the configuration device; the device information of the target device is encrypted according to the verification information; the transceiver is used to send the configuration device to the configuration device in a UWB manner. Send the encrypted device information.
  • the process performed by the processor and/or transceiver in the computer device 1000 may refer to the various steps performed by the target device in the method shown in either of the above-mentioned FIG. 2 or FIG. 5 .
  • Embodiments of the present application also provide a computer-readable storage medium.
  • a computer program is stored in the storage medium.
  • the computer program is loaded and executed by a processor to implement the method shown in Figure 2, Figure 3 or Figure 5. , all or part of the steps performed by the configuration device or the target device.
  • This application also provides a chip, which is used to run in a computer device, so that the computer device executes all or part of the methods shown in Figure 2, Figure 3 or Figure 5, which are executed by the configuration device or the target device. step.
  • the application also provides a computer program product, which computer program product or computer program includes computer instructions, and the computer instructions are stored in a computer-readable storage medium.
  • the processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device executes the method shown in Figure 2, Figure 3 or Figure 5, which is executed by the configuration device or the target device. all or part of the steps.
  • This application also provides a computer program, which is executed by the processor of the computer device to implement all or part of the steps executed by the configuration device or the target device in the method shown in Figure 2, Figure 3 or Figure 5. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A device discovery method and apparatus, a device, a storage medium, and a program product, relating to the technical field of Internet of Things. The method comprises: acquiring first ultra-wideband (UWB) identification information of a configuration device in a UWB manner (201); parsing the first UWB identification information to obtain verification information of the configuration device (202); encrypting device information of a target device according to the verification information (203); and sending the encrypted device information to the configuration device in a UWB manner (204). The solution simplifies the device discovery process in an Internet of Things scenario, improves the device discovery efficiency, and ensures the safety of device information transmission.

Description

设备发现方法、装置、设备、存储介质及程序产品Device discovery methods, devices, equipment, storage media and program products 技术领域Technical field
本申请涉及物联网技术领域,特别涉及一种设备发现方法、装置、设备、存储介质及程序产品。This application relates to the technical field of the Internet of Things, and in particular to a device discovery method, device, equipment, storage medium and program product.
背景技术Background technique
随着物联网(Internet of Things,IoT)技术的不断发展,越来越多的物联网设备在智能家居、工业生产等诸多领域给用户的生产生活带来了极大的便利性。With the continuous development of Internet of Things (IoT) technology, more and more IoT devices have brought great convenience to users' production and life in many fields such as smart homes and industrial production.
配置设备对物联网设备进行配置之前,需要先发现物联网设备,也就是获取可配置的物联网设备的设备信息。在相关技术中,配置设备通常可以通过扫描二维码或者用户手动输入配对代码等方式,获取物联网设备的设备信息。Configuring the device Before configuring the IoT device, you need to discover the IoT device first, that is, obtain the device information of the configurable IoT device. In related technologies, the configuration device can usually obtain the device information of the IoT device by scanning a QR code or the user manually inputting a pairing code.
发明内容Contents of the invention
本申请实施例提供了一种设备发现方法、装置、设备、存储介质及程序产品。所述技术方案如下:Embodiments of the present application provide a device discovery method, device, equipment, storage medium and program product. The technical solutions are as follows:
一方面,本申请实施例提供了一种设备发现方法,所述方法由目标设备执行,所述方法包括:On the one hand, embodiments of the present application provide a device discovery method, which is executed by a target device. The method includes:
通过超宽带UWB方式获取配置设备的第一UWB标识信息;Obtain the first UWB identification information of the configured device through ultra-wideband UWB;
对所述第一UWB标识信息进行解析,获得所述配置设备的验证信息;Parse the first UWB identification information to obtain verification information of the configuration device;
根据所述验证信息,对所述目标设备的设备信息进行加密;Encrypt the device information of the target device according to the verification information;
通过UWB方式向所述配置设备发送加密后的所述设备信息。Send the encrypted device information to the configuration device in a UWB manner.
一方面,本申请实施例提供了一种设备发现方法,所述方法由配置设备执行,所述方法包括:On the one hand, embodiments of the present application provide a device discovery method, which is executed by a configuration device. The method includes:
通过超宽带UWB方式向目标设备发送第一UWB标识信息,以便所述目标设备对所述第一UWB标识信息进行解析,获得所述配置设备的验证信息,根据所述验证信息,对所述目标设备的设备信息进行加密;Send the first UWB identification information to the target device in the ultra-wideband UWB mode, so that the target device parses the first UWB identification information, obtains the verification information of the configuration device, and performs verification on the target device based on the verification information. The device information of the device is encrypted;
通过UWB方式接收所述目标设备发送的加密后的所述设备信息;Receive the encrypted device information sent by the target device through UWB;
对加密后的所述设备信息进行解密,获得所述目标设备的设备信息。Decrypt the encrypted device information to obtain the device information of the target device.
另一方面,本申请实施例提供了一种设备发现装置,所述装置包括:On the other hand, embodiments of the present application provide a device discovery device, which includes:
接收模块,用于通过超宽带UWB方式获取配置设备的第一UWB标识信息;A receiving module, configured to obtain the first UWB identification information of the configured device through ultra-wideband UWB;
解析模块,用于对所述第一UWB标识信息进行解析,获得所述配置设备的验证信息;A parsing module, configured to parse the first UWB identification information and obtain verification information of the configuration device;
加密模块,用于根据所述验证信息,对所述目标设备的设备信息进行加密;An encryption module, configured to encrypt the device information of the target device according to the verification information;
发送模块,用于通过UWB方式向所述配置设备发送加密后的所述设备信息。A sending module, configured to send the encrypted device information to the configuration device through UWB.
另一方面,本申请实施例提供了一种设备发现装置,所述装置包括:On the other hand, embodiments of the present application provide a device discovery device, which includes:
发送模块,用于通过超宽带UWB方式向目标设备发送第一UWB标识信息,以便所述目标设备对所述第一UWB标识信息进行解析,获得所述配置设备的验证信息,根据所述验证信息,对所述目标设备的设备信息进行加密;A sending module configured to send the first UWB identification information to the target device in an ultra-wideband UWB manner, so that the target device can parse the first UWB identification information and obtain verification information of the configuration device. According to the verification information , encrypt the device information of the target device;
接收模块,用于通过UWB方式接收所述目标设备发送的加密后的所述设备信息;A receiving module, configured to receive the encrypted device information sent by the target device through UWB;
解密模块,用于对加密后的所述设备信息进行解密,获得所述目标设备的设备信息。A decryption module, configured to decrypt the encrypted device information and obtain the device information of the target device.
再一方面,本申请实施例提供了一种计算机设备,所述计算机设备包括处理器、存储器和收发器,所述存储器存储有计算机程序,所述计算机程序用于被所述处理器执行,以实现上述设备发现方法。In yet another aspect, embodiments of the present application provide a computer device, which includes a processor, a memory, and a transceiver. The memory stores a computer program, and the computer program is configured to be executed by the processor, so as to Implement the above device discovery method.
又一方面,本申请实施例还提供了一种计算机可读存储介质,所述存储介质中存储有计算机程序,所述计算机程序由处理器加载并执行以实现上述设备发现方法。On another aspect, embodiments of the present application also provide a computer-readable storage medium, in which a computer program is stored, and the computer program is loaded and executed by a processor to implement the above device discovery method.
又一方面,本申请还提供了一种芯片,所述芯片用于在计算机设备中运行,以使得所述计算机设备执行上述设备发现方法。In another aspect, the present application also provides a chip, which is used to run in a computer device, so that the computer device executes the above device discovery method.
又一方面,本申请提供了一种计算机程序产品,该计算机程序产品包括计算机指令,该计算机指令存储在计算机可读存储介质中。计算机设备的处理器从计算机可读存储介质读取该计算机指令,处理器执行该计算机指令,使得该计算机设备执行上述设备发现方法。In yet another aspect, the present application provides a computer program product including computer instructions stored in a computer-readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device performs the above device discovery method.
又一方面,本申请提供了一种计算机程序,该计算机程序由计算机设备的处理器执行,以实现上述设备发现方法。In another aspect, the present application provides a computer program, which is executed by a processor of a computer device to implement the above device discovery method.
本申请实施例提供的技术方案可以带来如下有益效果:The technical solutions provided by the embodiments of this application can bring the following beneficial effects:
配置设备的验证信息可以编码映射为配置设备的UWB标识信息,在设备发现过程中,目标设备通过 超宽带UWB方式获取配置设备的第一UWB标识信息,解析第一UWB标识信息得到验证信息,然后根据验证信息对目标设备的设备信息进行加密后,通过UWB方式发送给配置设备;在上述方案中,用户不需要使用配置设备进行二维码扫描、输入或者控制配置设备贴近目标设备等繁琐操作,从而简化了物联网场景中的设备发现流程,提高了设备发现效率,同时保证了设备信息传递的安全性。The verification information of the configuration device can be encoded and mapped to the UWB identification information of the configuration device. During the device discovery process, the target device obtains the first UWB identification information of the configuration device through ultra-wideband UWB, parses the first UWB identification information to obtain the verification information, and then After encrypting the device information of the target device based on the verification information, it is sent to the configuration device through UWB; in the above solution, the user does not need to use the configuration device to perform QR code scanning, input, or control the configuration device to close to the target device and other cumbersome operations. This simplifies the device discovery process in IoT scenarios, improves device discovery efficiency, and ensures the security of device information transmission.
附图说明Description of the drawings
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments will be briefly introduced below. Obviously, the drawings in the following description are only some embodiments of the present application. For those of ordinary skill in the art, other drawings can also be obtained based on these drawings without exerting creative efforts.
图1是本申请一个实施例提供的物联网的网络架构的示意图;Figure 1 is a schematic diagram of the network architecture of the Internet of Things provided by an embodiment of the present application;
图2是本申请一个实施例提供的设备发现方法的流程图;Figure 2 is a flow chart of a device discovery method provided by an embodiment of the present application;
图3是本申请一个实施例提供的设备发现方法的流程图;Figure 3 is a flow chart of a device discovery method provided by an embodiment of the present application;
图4是本申请一个实施例提供的设备发现方法的流程图;Figure 4 is a flow chart of a device discovery method provided by an embodiment of the present application;
图5是本申请一个实施例提供的设备发现方法的流程图;Figure 5 is a flow chart of a device discovery method provided by an embodiment of the present application;
图6是图5所示实施例涉及的一种设备发现和控制时序示意图;Figure 6 is a schematic diagram of device discovery and control sequence involved in the embodiment shown in Figure 5;
图7是图5所示实施例涉及的另一种设备发现和控制时序示意图;Figure 7 is a schematic diagram of another device discovery and control sequence involved in the embodiment shown in Figure 5;
图8是本申请一个实施例提供的设备发现装置的框图;Figure 8 is a block diagram of a device discovery device provided by an embodiment of the present application;
图9是本申请一个实施例提供的设备发现装置的框图;Figure 9 is a block diagram of a device discovery device provided by an embodiment of the present application;
图10是本申请一个实施例提供的计算机设备的结构示意图。Figure 10 is a schematic structural diagram of a computer device provided by an embodiment of the present application.
具体实施方式Detailed ways
为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施方式作进一步地详细描述。In order to make the purpose, technical solutions and advantages of the present application clearer, the embodiments of the present application will be further described in detail below with reference to the accompanying drawings.
本申请实施例描述的网络架构以及业务场景是为了更加清楚地说明本申请实施例的技术方案,并不构成对本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。The network architecture and business scenarios described in the embodiments of this application are to more clearly explain the technical solutions of the embodiments of this application, and do not constitute a limitation on the technical solutions provided by the embodiments of this application. Those of ordinary skill in the art will know that with the network architecture evolution and the emergence of new business scenarios, the technical solutions provided in the embodiments of this application are also applicable to similar technical problems.
请参考图1,其示出了本申请一个实施例提供的物联网的网络架构的示意图。该物联网的网络架构可以包括:物联网设备110以及配置设备120;Please refer to Figure 1, which shows a schematic diagram of the network architecture of the Internet of Things provided by an embodiment of the present application. The network architecture of the Internet of Things may include: Internet of Things devices 110 and configuration devices 120;
物联网设备110可以是在物联网中,用于提供物联网协议对应的服务端功能的设备。源设备可以对外提供可订阅的资源。The Internet of Things device 110 may be a device used to provide server functions corresponding to the Internet of Things protocol in the Internet of Things. The source device can provide subscriptable resources to the outside world.
比如,物联网设备110可以是智能家居设备,例如,智能灯具、智能电视、智能空调、智能冰箱、智能微波炉、智能电饭煲、扫地机器人、智能音箱、智能开关等等。For example, the IoT device 110 may be a smart home device, such as smart lamps, smart TVs, smart air conditioners, smart refrigerators, smart microwave ovens, smart rice cookers, sweeping robots, smart speakers, smart switches, and so on.
或者,物联网设备110可以是工业生产设备,例如,车床、工业机器人、太阳能面板、风力发电机等等。Alternatively, the IoT device 110 may be an industrial production equipment, such as a lathe, an industrial robot, a solar panel, a wind turbine, etc.
或者,物联网设备110可以是商业服务设备,例如,无人售货机等等。Alternatively, the Internet of Things device 110 may be a commercial service device, such as an unmanned vending machine or the like.
或者,物联网设备110可以是智能监控设备,例如,监控摄像头、红外传感器、声音传感器、温度传感器等等。Alternatively, the IoT device 110 may be an intelligent monitoring device, such as a surveillance camera, an infrared sensor, a sound sensor, a temperature sensor, etc.
在一种可能的实现方式中,物联网设备110也可以是用户侧的终端设备。比如,物联网设备110可以是智能控制器、智能遥控器、智能手机、平板电脑、智能手表、智能电视、网关等等;或者,物联网设备110也可以是个人电脑,比如台式电脑、便携式计算机、个人工作站等等。In a possible implementation, the Internet of Things device 110 may also be a user-side terminal device. For example, the IoT device 110 can be a smart controller, a smart remote control, a smart phone, a tablet, a smart watch, a smart TV, a gateway, etc.; or the IoT device 110 can also be a personal computer, such as a desktop computer or a portable computer. , personal workstation, etc.
配置设备120可以是用户侧的终端设备。比如,配置设备120可以是智能手机、平板电脑、智能手表、智能电视等等。The configuration device 120 may be a user-side terminal device. For example, the configuration device 120 may be a smartphone, a tablet, a smart watch, a smart TV, or the like.
在另一种可能的实现方式中,配置设备120也可以是基于终端设备运行的客户端实体(可以是虚拟实体),例如,配置设备120可以是运行在智能手机中,用于对物联网设备110进行管理配置的APP。In another possible implementation, the configuration device 120 may also be a client entity (which may be a virtual entity) running on a terminal device. For example, the configuration device 120 may be running on a smartphone and used to configure the Internet of Things device. 110 APP for management and configuration.
在本申请实施例中,上述物联网设备110可以是满足相同或者不同的物联网协议的电子设备,比如,可以是满足连接标准联盟(Connectivity Standards Alliance,CSA)(或称Zigbee联盟)下的Matter协议(或称通过IP(Internet Protocol,网际互联协议)连接家庭工作组(Connected Home over IP Working Group,CHIP)项目)的电子设备。In this embodiment of the present application, the above-mentioned Internet of Things device 110 may be an electronic device that meets the same or different Internet of Things protocols. For example, it may be an electronic device that meets the Matter under the Connectivity Standards Alliance (CSA) (or Zigbee Alliance). protocol (or connected home over IP Working Group (CHIP) project).
Matter是一种基于IP的物联网连接标准,解决当下智能家居市场存在的兼容性、安全性和连接性等问题。Matter定义了配置物联网设备的技术方案,包括设备发现、设备认证、设备配置和设备操作等步骤。Matter is an IP-based IoT connection standard that solves the compatibility, security and connectivity issues existing in the current smart home market. Matter defines the technical solution for configuring IoT devices, including steps such as device discovery, device authentication, device configuration, and device operation.
在一种可能的实现方式中,在设备发现步骤中,Matter***中的物联网设备(也称为Matter设备)可以通过QR Code(Quick Response Code,二维码)、Manual Pairing Code(手动配对代码)、NFC Tag(标签)等方式将下述表1中的设备信息共享给***中的配置设备(也称为Matter配置器)。In a possible implementation, in the device discovery step, the IoT devices in the Matter system (also known as Matter devices) can use QR Code (Quick Response Code, QR code), Manual Pairing Code (manual pairing code) ), NFC Tag (tag) and other methods to share the device information in Table 1 below to the configuration device in the system (also called Matter configurator).
表1Table 1
Vendor IDVendor ID 厂商ID(Identity,标识)Vendor ID (Identity, identification)
Product IDProduct ID 产品IDProduct ID
Discovery Capabilities BitmaskDiscovery Capabilities Bitmask 设备发现方式比特掩码Device discovery method bit mask
DiscriminatorDiscriminator 设备鉴别值(12bit)Device identification value (12bit)
PasscodePasscode 口令码(27bit)Password code(27bit)
TLV dataTLV data 用户自定义数据User-defined data
其中,上述表1中的用户自定义数据的格式为标签-长度-值(Tag-Length-Value,TLV)格式。Among them, the format of the user-defined data in the above Table 1 is tag-length-value (Tag-Length-Value, TLV) format.
在上述设备发现方案中,配置设备通常为用户的智能手机等智能终端。在设备发现过程中,通常需要用户对智能手机进行操作。例如,用户购买matter智能家居设备后,需要通过手机扫描设备上二维码获取设备信息,或者在手机中手动输入设备提供的manual pairing code获取设备信息,或者将手机近距离接触设备,以通过NFC方式获取设备信息。这些操作都给用户带来了一些操作上的不便。比如,扫描二维码和手动输入manual pairing code都需要用户在手机执行一系列的操作,而NFC方式则需要用户将手机与设备间保持近距离接触。In the above device discovery solution, the configuration device is usually a smart terminal such as the user's smartphone. During the device discovery process, the user is usually required to operate the smartphone. For example, after users purchase matter smart home devices, they need to scan the QR code on the device with their mobile phone to obtain device information, or manually enter the manual pairing code provided by the device into the mobile phone to obtain device information, or bring the mobile phone into close contact with the device to obtain device information through NFC. method to obtain device information. These operations have brought some operational inconvenience to users. For example, scanning the QR code and manually entering the manual pairing code require the user to perform a series of operations on the mobile phone, while the NFC method requires the user to keep the mobile phone in close contact with the device.
而本申请实施例后续提供的方案,可以简化设备发现过程中的用户操作,提高设备发现的效率。The solutions provided later in the embodiments of this application can simplify user operations in the device discovery process and improve the efficiency of device discovery.
请参考图2,其示出了本申请一个实施例提供的设备发现方法的流程图,该方法可以由目标设备执行,比如,该目标设备可以是图1所示的网络架构中的物联网设备110;该方法可以包括如下几个步骤:Please refer to Figure 2, which shows a flow chart of a device discovery method provided by an embodiment of the present application. The method can be executed by a target device. For example, the target device can be an Internet of Things device in the network architecture shown in Figure 1. 110; This method may include the following steps:
步骤201,通过超宽带UWB方式获取配置设备的第一UWB标识信息。Step 201: Obtain the first UWB identification information of the configuration device through ultra-wideband UWB.
在本申请实施例中,目标设备具有超宽带(Ultra Wide Band,UWB)组件,可以通过UWB组件开启UWB扫描,获得配置设备的UWB标识信息。其中,上述UWB组件是具有UWB通信功能的组件,其可以扫描其它设备的UWB标识信息,或者,与其它设备的UWB组件进行通信。In this embodiment of the present application, the target device has an Ultra Wide Band (UWB) component, and UWB scanning can be enabled through the UWB component to obtain the UWB identification information of the configured device. Wherein, the above-mentioned UWB component is a component with a UWB communication function, which can scan the UWB identification information of other devices, or communicate with the UWB components of other devices.
在一种可能的实现方式中,上述UWB标识信息,可以是设备内置/外接的UWB标签的UWB标签标识信息;比如,上述第一UWB标识信息可以是配置设备中的UWB标签的标识信息,例如,可以是配置设备的UWB标签ID。In a possible implementation, the above-mentioned UWB identification information may be the UWB tag identification information of a UWB tag built in/externally to the device; for example, the above-mentioned first UWB identification information may be the identification information of a UWB tag in the configuration device, for example , which can be the UWB tag ID of the configured device.
或者,上述UWB标识信息,可以是设备内置的UWB组件的UWB组件标识信息,比如,上述第一UWB标识信息可以是配置设备中的UWB组件的UWB组件ID。Alternatively, the above-mentioned UWB identification information may be the UWB component identification information of a UWB component built into the device. For example, the above-mentioned first UWB identification information may be the UWB component ID of the UWB component in the configuration device.
步骤202,对第一UWB标识信息进行解析,获得配置设备的验证信息。Step 202: Parse the first UWB identification information to obtain verification information of the configured device.
在本申请实施例中,上述配置设备的第一UWB标识信息可以是通过对配置设备的验证信息进行编码映射的方式得到的。In this embodiment of the present application, the first UWB identification information of the configuration device may be obtained by coding and mapping the verification information of the configuration device.
相应的,目标设备获取到上述第一UWB标识信息之后,可以对第一UWB标识信息进行解析,得到配置设备的验证信息。Correspondingly, after obtaining the above-mentioned first UWB identification information, the target device can parse the first UWB identification information to obtain the verification information of the configured device.
步骤203,根据验证信息,对目标设备的设备信息进行加密。Step 203: Encrypt the device information of the target device according to the verification information.
步骤204,通过UWB方式向配置设备发送加密后的设备信息。Step 204: Send the encrypted device information to the configuration device through UWB.
综上所述,在本申请实施例所示的方案中,配置设备的验证信息可以编码映射为配置设备的UWB标识信息,在设备发现过程中,目标设备通过超宽带UWB方式获取配置设备的第一UWB标识信息,解析第一UWB标识信息得到验证信息,然后根据验证信息对目标设备的设备信息进行加密后,通过UWB方式发送给配置设备;在上述方案中,用户不需要使用配置设备进行二维码扫描、输入或者控制配置设备贴近目标设备等繁琐操作,从而简化了物联网场景中的设备发现流程,提高了设备发现效率,同时保证了设备信息传递的安全性。To sum up, in the solution shown in the embodiment of the present application, the verification information of the configuration device can be encoded and mapped to the UWB identification information of the configuration device. During the device discovery process, the target device obtains the configuration device's third identification information through ultra-wideband UWB. A UWB identification information, parsing the first UWB identification information to obtain verification information, and then encrypting the device information of the target device according to the verification information, and then sending it to the configuration device through UWB; in the above solution, the user does not need to use the configuration device for secondary Cumbersome operations such as QR code scanning, inputting, or controlling and configuring the device close to the target device simplify the device discovery process in IoT scenarios, improve device discovery efficiency, and ensure the security of device information transmission.
请参考图3,其示出了本申请一个实施例提供的设备发现方法的流程图,该方法可以由配置设备执行,比如,该配置设备可以是图1所示的网络架构中的配置设备120;该方法可以包括如下几个步骤:Please refer to Figure 3, which shows a flow chart of a device discovery method provided by an embodiment of the present application. The method can be executed by a configuration device. For example, the configuration device can be the configuration device 120 in the network architecture shown in Figure 1. ;This method may include the following steps:
步骤301,通过超宽带UWB方式向目标设备发送第一UWB标识信息,以便目标设备对第一UWB标识信息进行解析,获得配置设备的验证信息,根据验证信息,对目标设备的设备信息进行加密。Step 301: Send the first UWB identification information to the target device in the ultra-wideband UWB mode, so that the target device can parse the first UWB identification information, obtain verification information of the configured device, and encrypt the device information of the target device based on the verification information.
步骤302,通过UWB方式接收目标设备发送的加密后的设备信息。Step 302: Receive the encrypted device information sent by the target device through UWB.
步骤303,对加密后的设备信息进行解密,获得目标设备的设备信息。Step 303: Decrypt the encrypted device information to obtain the device information of the target device.
综上所述,在本申请实施例所示的方案中,配置设备的验证信息可以编码映射为配置设备的UWB标识信息,在设备发现过程中,配置设备通过UWB方式向目标设备发送第一UWB标识信息,以便目标设 备解析第一UWB标识信息得到验证信息,然后根据验证信息对目标设备的设备信息进行加密后,通过UWB方式发送给配置设备;相应的,配置设备可以根据验证信息解密得到上述设备信息;在上述方案中,用户不需要使用配置设备进行二维码扫描、输入或者控制配置设备贴近目标设备等繁琐操作,从而简化了物联网场景中的设备发现流程,提高了设备发现效率,同时保证了设备信息传递的安全性。To sum up, in the solution shown in the embodiment of the present application, the verification information of the configuration device can be encoded and mapped to the UWB identification information of the configuration device. During the device discovery process, the configuration device sends the first UWB to the target device in the UWB mode. Identification information, so that the target device can parse the first UWB identification information to obtain verification information, and then encrypt the device information of the target device according to the verification information, and then send it to the configuration device through UWB; accordingly, the configuration device can decrypt according to the verification information to obtain the above Device information; in the above solution, users do not need to use the configuration device to perform QR code scanning, input or control the configuration device close to the target device and other cumbersome operations, thereby simplifying the device discovery process in the Internet of Things scenario and improving device discovery efficiency. At the same time, the security of device information transmission is ensured.
基于上述图2或图3所示的方案,请参考图4,其示出了本申请一个实施例提供的设备发现方法的流程图。Based on the solution shown in Figure 2 or Figure 3 above, please refer to Figure 4, which shows a flow chart of a device discovery method provided by an embodiment of the present application.
如图4所示,以配置设备是用户的手机41,目标设备是智能家居设备42为例,手机41和智能家居设备42中分别设置有UWB组件。可选的,手机41和智能家居设备42还可以分别内置或者外接有UWB标签。As shown in Figure 4, taking the configuration device as the user's mobile phone 41 and the target device as the smart home device 42 as an example, the mobile phone 41 and the smart home device 42 are respectively provided with UWB components. Optionally, the mobile phone 41 and the smart home device 42 may each have built-in or external UWB tags.
在设备发现过程中,智能家居设备42通电后,用户开启手机41的UWB组件/UWB标签;智能家居设备42扫描周围的UWB设备,此时手机41可以通过UWB组件/UWB标签将自己的UWB标识信息发送给智能家居设备42(步骤1)。其中,手机41发送的UWB标识信息是基于手机41的验证信息进行编码映射得到的。智能家居设备42通过UWB方式获取到上述UWB标识信息后,可以对UWB标识信息进行解析,得到手机41的验证信息,根据手机41的验证信息对自己的设备信息(比如上述表1中的全部或者部分信息)进行加密(步骤2),并将加密后的设备信息,通过UWB组件发送给手机41(步骤3);手机41对接收到的加密后的设备信息进行解密(步骤4),得到智能家居设备42的设备信息,从而完成设备发现过程。During the device discovery process, after the smart home device 42 is powered on, the user turns on the UWB component/UWB tag of the mobile phone 41; the smart home device 42 scans the surrounding UWB devices. At this time, the mobile phone 41 can identify its own UWB through the UWB component/UWB tag. The information is sent to smart home device 42 (step 1). Among them, the UWB identification information sent by the mobile phone 41 is obtained by encoding and mapping based on the verification information of the mobile phone 41. After the smart home device 42 obtains the above-mentioned UWB identification information through UWB, it can parse the UWB identification information to obtain the verification information of the mobile phone 41, and use the verification information of the mobile phone 41 to verify its own device information (such as all or all of the above in Table 1). part of the information) is encrypted (step 2), and the encrypted device information is sent to the mobile phone 41 through the UWB component (step 3); the mobile phone 41 decrypts the received encrypted device information (step 4) to obtain the intelligent device information of the home device 42, thereby completing the device discovery process.
请参考图5,其示出了本申请一个实施例提供的设备发现方法的流程图,该方法可以由配置设备以及目标设备交互执行;比如,上述目标设备可以是图1所示网络架构中的物联网设备110,上述配置设备可以是图1所示网络架构中的配置设备120;该方法可以包括如下几个步骤:Please refer to Figure 5, which shows a flow chart of a device discovery method provided by an embodiment of the present application. This method can be interactively executed by a configuration device and a target device; for example, the target device can be a device in the network architecture shown in Figure 1 Internet of Things device 110, the above-mentioned configuration device may be the configuration device 120 in the network architecture shown in Figure 1; the method may include the following steps:
步骤501,配置设备通过超宽带UWB方式向目标设备发送第一UWB标识信息;相应的,目标设备通过UWB方式获取配置设备的第一UWB标识信息。Step 501: The configuration device sends the first UWB identification information to the target device in the ultra-wideband UWB mode; accordingly, the target device obtains the first UWB identification information of the configuration device in the UWB mode.
比如,以目标设备是智能家居设备,配置设备是用户的手机为例,用户购买智能家居设备之后,将智能家居设备安装通电,并在手机上安装用于管理设备的应用程序(Application,APP)。之后,用户可以打开手机的UWB功能并靠近智能家居设备,智能家居设备通过UWB方式,向手机获取UWB标识信息。For example, assuming that the target device is a smart home device and the configuration device is the user's mobile phone, after the user purchases the smart home device, he installs and powers on the smart home device, and installs an application (Application, APP) for managing the device on the mobile phone. . After that, the user can turn on the UWB function of the mobile phone and approach the smart home device. The smart home device obtains UWB identification information from the mobile phone through UWB.
例如,智能家居设备上集成UWB组件(比如UWB芯片),智能家居设备通电后,可以开启UWB扫描功能;手机上也集成UWB组件,或者,使用带有UWB组件的手机壳,如果UWB组件集成在手机中,则APP直接开启UWB功能,向智能家居设备发送UWB Tag信息;如果UWB组件设置在手机壳中,且手机壳和手机间通过BLE(Bluetooth Low Energy,低功耗蓝牙)通信,则手机APP通过BLE向手机壳发指令,指示手机壳通过UWB组件向智能家居设备发送UWB tag信息。For example, smart home devices integrate UWB components (such as UWB chips). After the smart home device is powered on, the UWB scanning function can be turned on; UWB components are also integrated on the mobile phone, or a mobile phone case with UWB components is used. If the UWB component is integrated in In the mobile phone, the APP directly turns on the UWB function and sends UWB Tag information to the smart home device; if the UWB component is set in the mobile phone case, and the mobile phone case and the mobile phone communicate through BLE (Bluetooth Low Energy, low-power Bluetooth), the mobile phone The APP sends instructions to the mobile phone case through BLE, instructing the mobile phone case to send UWB tag information to the smart home device through the UWB component.
在一种可能的实现方式中,目标设备通过超宽带UWB方式获取配置设备的第一UWB标识信息之前,还包括:In a possible implementation, before the target device obtains the first UWB identification information of the configuration device through ultra-wideband UWB, it also includes:
获取与配置设备之间的第二UWB测量信息;当第二UWB测量信息满足第二条件时,确定定位到配置设备。Obtain second UWB measurement information with the configuration device; when the second UWB measurement information meets the second condition, determine to locate the configuration device.
由于配置设备在发现目标设备之前,目标设备并未获知配置设备的任何信息,并且,在发现设备过程中,目标设备可能会获取到多个UWB设备的UWB标识信息,因此,目标设备需要解决如何准确的定位目标设备的问题。Since the target device does not know any information about the configuration device before the configuration device discovers the target device, and during the device discovery process, the target device may obtain the UWB identification information of multiple UWB devices. Therefore, the target device needs to solve how to Accurately locate issues with target devices.
对于上述问题,在本申请实施例中,目标设备在通过UWB方式获取配置设备的UWB标识信息时,还会获取目标设备与配置设备之间的第一UWB测量信息,当第一UWB测量信息满足条件时,确定定位到配置设备,也可以称为锁定配置设备,此时,目标设备执行通过UWB方式获取配置设备的第一UWB标识信息的步骤。Regarding the above problems, in the embodiment of the present application, when the target device obtains the UWB identification information of the configuration device through UWB, it will also obtain the first UWB measurement information between the target device and the configuration device. When the first UWB measurement information satisfies When conditions are met, the configuration device is determined to be located, which can also be called locking the configuration device. At this time, the target device performs the step of obtaining the first UWB identification information of the configuration device through UWB.
在一种可能的实现方式中,第二UWB测量信息包括第二角度信息、第二距离信息以及第二信号强度信息中的至少一种。In a possible implementation, the second UWB measurement information includes at least one of second angle information, second distance information, and second signal strength information.
在本申请实施例中,上述第二UWB测量信息可以包括配置设备与目标设备之间的角度信息、距离信息以及信号强度信息中的至少一种。In this embodiment of the present application, the second UWB measurement information may include at least one of angle information, distance information, and signal strength information between the configuration device and the target device.
其中,上述第二UWB测量信息可以随着配置设备与目标设备之间相对位置关系(包括相对角度关系、距离关系以及是否处在障碍物)的变化而发生变化。Wherein, the above-mentioned second UWB measurement information may change as the relative positional relationship between the configuration device and the target device changes (including relative angle relationship, distance relationship and whether there is an obstacle).
其中,上述第二UWB测量信息可以由目标设备测量获得,或者,上述第二UWB测量信息可以由配置设备测量获得。The above-mentioned second UWB measurement information may be obtained by measurement by the target device, or the above-mentioned second UWB measurement information may be obtained by measurement by the configuration device.
或者,上述第二UWB测量信息可以由目标设备和配置设备共同测量获得。比如,上述第二UWB测量信息中的部分信息由目标设备测量获得,其它部分信息由配置设备测量获得;或者,上述第二UWB测量信息可以是目标设备和配置设备各自的测量结果的平均结果。Alternatively, the above second UWB measurement information can be obtained by joint measurement by the target device and the configuration device. For example, part of the above-mentioned second UWB measurement information is obtained by measurement by the target device, and other part of the information is obtained by measurement by the configuration device; or the above-mentioned second UWB measurement information may be an average result of the respective measurement results of the target device and the configuration device.
在一种可能的实现方式中,第二条件包括以下条件中的至少一项:In a possible implementation, the second condition includes at least one of the following conditions:
条件1)当第二UWB测量信息包括第二角度信息时,第二角度信息指示的角度处于第二角度区间内。Condition 1) When the second UWB measurement information includes second angle information, the angle indicated by the second angle information is within the second angle interval.
在本申请实施例中,当目标设备获取到配置设备的UWB标识信息,并且,第二UWB测量信息指示配置设备当前处于目标设备前方第二角度区间内,则可以确定定位到配置设备。In this embodiment of the present application, when the target device obtains the UWB identification information of the configuration device, and the second UWB measurement information indicates that the configuration device is currently within the second angle interval in front of the target device, it can be determined that the configuration device is located.
从用户角度来说,若用户想要通过配置设备发现目标设备,则可以将配置设备移动至目标设备的前方,以确保配置设备当前处于目标设备前方第二角度区间内。From the user's perspective, if the user wants to discover the target device through the configuration device, the configuration device can be moved in front of the target device to ensure that the configuration device is currently within the second angle range in front of the target device.
条件2)当第二UWB测量信息包括第二距离信息时,第二距离信息指示的距离处于第二距离区间内。Condition 2) When the second UWB measurement information includes the second distance information, the distance indicated by the second distance information is within the second distance interval.
在本申请实施例中,当目标设备获取到配置设备的UWB标识信息,并且,第二UWB测量信息指示配置设备当前处于目标设备周围的第二距离区间内,则可以确定定位到配置设备。In this embodiment of the present application, when the target device obtains the UWB identification information of the configuration device, and the second UWB measurement information indicates that the configuration device is currently within the second distance interval around the target device, it can be determined that the configuration device is located.
从用户角度来说,若用户想要通过配置设备发现目标设备,则可以将配置设备移动至目标设备附近,以确保配置设备当前处于目标设备周围的第二距离区间内。From a user's perspective, if the user wants to discover the target device through the configuration device, the configuration device can be moved near the target device to ensure that the configuration device is currently within the second distance interval around the target device.
条件3)当第二UWB测量信息包括第二信号强度信息时,第二信号强度信息指示的信号强度处于第二信号强度区间内。Condition 3) When the second UWB measurement information includes second signal strength information, the signal strength indicated by the second signal strength information is within the second signal strength interval.
在本申请实施例中,当目标设备获取到配置设备的UWB标识信息,并且,第二UWB测量信息指示的信号强度处于第二信号强度区间内(比如,第二UWB测量信息指示的信号强度大于第二信号强度阈值)时,则可以确定定位到配置设备。In this embodiment of the present application, when the target device obtains the UWB identification information of the configuration device, and the signal strength indicated by the second UWB measurement information is within the second signal strength interval (for example, the signal strength indicated by the second UWB measurement information is greater than second signal strength threshold), it can be determined that the configured device is located.
在一种可能的实现方式中,在步骤501之前,配置设备可以根据配置设备的验证信息,生成配置设备的第二UWB标识信息。In a possible implementation, before step 501, the configuration device may generate second UWB identification information of the configuration device according to the verification information of the configuration device.
其中,配置设备可以预先将自己的验证信息,通过压缩算法,或者通过特定编码方法,生成固定字节数的字符串,并将生成的字符串作为第一UWB标识信息。Among them, the configuration device can pre-generate its own verification information through a compression algorithm or a specific encoding method, and use the generated string as the first UWB identification information.
在一种可能的实现方式中,上述验证信息中可以包含身份标识信息以及验证信息中的至少一种。比如,当验证信息中包含身份标识信息以及验证信息时,配置设备可以根据配置设备的身份标识信息,以及配置设备的角色信息,生成配置设备的第一UWB标识信息。In a possible implementation, the above verification information may include at least one of identity information and verification information. For example, when the verification information includes identity identification information and verification information, the configuration device can generate the first UWB identification information of the configuration device based on the identity identification information of the configuration device and the role information of the configuration device.
其中,配置设备可以预先将自己的身份标识信息和角色信息一起通过压缩算法或者通过特定编码方法,生成固定字节数的字符串,并将生成的字符串作为第一UWB标识信息。Among them, the configuration device can pass its own identity identification information and role information together through a compression algorithm or a specific encoding method in advance to generate a string with a fixed number of bytes, and use the generated string as the first UWB identification information.
在一种可能的实现方式中,在步骤501之前,目标设备也可以根据目标设备的验证信息,生成目标设备的第二UWB标识信息。In a possible implementation, before step 501, the target device may also generate the second UWB identification information of the target device based on the verification information of the target device.
在一种可能的实现方式中,目标设备的验证信息也可以包含目标设备的身份标识信息,以及目标设备的角色信息中的至少一种;比如,当验证信息中包含身份标识信息以及验证信息时,目标设备可以根据目标设备的身份标识信息,以及目标设备的角色信息,生成目标设备的第二UWB标识信息。In a possible implementation, the verification information of the target device may also include at least one of the identity information of the target device and the role information of the target device; for example, when the verification information contains identity information and verification information , the target device can generate the second UWB identification information of the target device according to the identity identification information of the target device and the role information of the target device.
其中,目标设备可以在通电时,将自己的身份标识信息和角色信息编码映射为第二UWB标识信息。Wherein, the target device can encode and map its own identity identification information and role information into the second UWB identification information when it is powered on.
或者,上述第二UWB标识信息也可以是在目标设备出厂之前,预先写入目标设备的信息。Alternatively, the second UWB identification information may also be information that is pre-written into the target device before the target device leaves the factory.
在一种可能的实现方式中,在步骤501之前,配置设备可以获取与目标设备之间的第三UWB测量信息;当第三UWB测量信息满足第三条件时,确定定位到目标设备。In a possible implementation, before step 501, the configuration device may obtain third UWB measurement information with the target device; when the third UWB measurement information satisfies the third condition, determine that the target device is located.
在一种可能的实现方式中,第三UWB测量信息包括第三角度信息、第三距离信息以及第三信号强度信息中的至少一种。In a possible implementation, the third UWB measurement information includes at least one of third angle information, third distance information, and third signal strength information.
在一种可能的实现方式中,第三条件包括以下条件中的至少一项:In a possible implementation, the third condition includes at least one of the following conditions:
当第三UWB测量信息包括第三角度信息时,第三角度信息指示的角度处于第三角度区间内;When the third UWB measurement information includes third angle information, the angle indicated by the third angle information is within the third angle interval;
当第三UWB测量信息包括第三距离信息时,第三距离信息指示的距离处于第三距离区间内;When the third UWB measurement information includes third distance information, the distance indicated by the third distance information is within the third distance interval;
当第三UWB测量信息包括第三信号强度信息时,第三信号强度信息指示的信号强度处于第三信号强度区间内。When the third UWB measurement information includes third signal strength information, the signal strength indicated by the third signal strength information is within the third signal strength interval.
在本申请实施例中,配置设备也可以在步骤501之前确定定位到目标设备,比如,配置设备可以通过UWB方式获取目标设备的第二UWB标识信息,同时获取上述第三UWB测量信息,并通过第三UWB测量信息判断是否定位到目标设备,其判断方式与目标设备判断是否定位到配置设备的方式类似,此处不再赘述。In this embodiment of the present application, the configuration device can also determine to locate the target device before step 501. For example, the configuration device can obtain the second UWB identification information of the target device through UWB, and at the same time obtain the above-mentioned third UWB measurement information, and obtain the target device through UWB. The third UWB measurement information determines whether the target device is located. The determination method is similar to the way the target device determines whether the configuration device is located, and will not be described again here.
步骤502,目标设备对第一UWB标识信息进行解析,获得配置设备的验证信息。Step 502: The target device parses the first UWB identification information to obtain verification information of the configured device.
在本申请实施例中,目标设备获取到第一UWB标识信息后,即可以按照第一UWB标识信息的编码 映射方式所对应的解析方式,对第一UWB标识信息进行解析,得到目标设备的验证信息。In the embodiment of the present application, after the target device obtains the first UWB identification information, it can parse the first UWB identification information according to the parsing method corresponding to the encoding mapping method of the first UWB identification information, and obtain the verification of the target device. information.
在一种可能的实现方式中,上述验证信息包括身份标识信息,比如身份ID(Identity,标识)。In a possible implementation, the above verification information includes identity identification information, such as identity ID (Identity, identification).
步骤503,目标设备根据验证信息,对目标设备的设备信息进行加密。Step 503: The target device encrypts the device information of the target device based on the verification information.
在一种可能的实现方式中,当验证信息包括身份标识信息时,上述根据验证信息,对目标设备的设备信息进行加密,包括:In a possible implementation, when the verification information includes identity identification information, the device information of the target device is encrypted based on the verification information, including:
根据配置设备的身份标识信息生成加密密钥;Generate encryption keys based on the identity information of the configured device;
根据加密密钥,对目标设备的设备信息进行加密。Encrypt the device information of the target device based on the encryption key.
比如,在一种可能的实现方式中,目标设备可以将上述配置设备的身份ID作为加密密钥,对目标设备的设备信息进行加密。For example, in one possible implementation, the target device can use the identity ID of the above configured device as an encryption key to encrypt the device information of the target device.
或者,目标设备也可以从配置设备的身份ID中提取指定字段作为加密密钥,以对目标设备的设备信息进行加密。Alternatively, the target device can also extract specified fields from the identity ID of the configured device as an encryption key to encrypt the device information of the target device.
或者,目标设备也可以通过配置设备的身份ID进行计算,得到加密密钥,以对目标设备的设备信息进行加密。Alternatively, the target device can also calculate by configuring the device's identity ID to obtain the encryption key to encrypt the device information of the target device.
在另一种可能的实现方式中,目标设备也可以根据验证信息,通过预先设置的加密密钥,对目标设备的设备信息进行加密。In another possible implementation, the target device can also encrypt the device information of the target device using a preset encryption key based on the verification information.
在本申请实施例中,上述验证信息可以用于验证配置设备获取目标设备的设备信息的合法性。In this embodiment of the present application, the above verification information can be used to verify the legality of the configuration device obtaining the device information of the target device.
在一种可能的实现方式中,目标设备对第一UWB标识信息进行解析获得的验证信息包括配置设备的角色信息;目标设备根据验证信息,对目标设备的设备信息进行加密,包括:In a possible implementation, the verification information obtained by the target device parsing the first UWB identification information includes the role information of the configuration device; the target device encrypts the device information of the target device based on the verification information, including:
当配置设备的角色信息指示配置设备的角色为配置器时,目标设备根据验证信息,对目标设备的设备信息进行加密。When the role information of the configuration device indicates that the role of the configuration device is a configurator, the target device encrypts the device information of the target device based on the verification information.
在本申请实施例中,配置设备和物联网设备可以具有各自的角色信息,该角色信息可以用来表示对应设备在物联网中的角色。In this embodiment of the present application, the configuration device and the Internet of Things device may have respective role information, and the role information may be used to represent the role of the corresponding device in the Internet of Things.
以上述UWB标识信息是通过身份ID和Role信息(角色信息)映射获得为例,身份ID用于在UWB通信中进行身份识别,Role信息可以为bitmask(比特掩码/位掩码),表示物联网中承担的角色,举例说明:当Role=0x01时,表示角色为物联网设备,Role=0x02时,表示角色为配置器设备,Role=0x04时,表示角色为控制设备,Role=0x06时,表示角色为配置器设备+控制设备。Take the above UWB identification information as an example, which is obtained through the mapping of identity ID and Role information (role information). Identity ID is used for identity recognition in UWB communication. Role information can be bitmask (bit mask/bit mask), which represents the object. The role assumed in the network, for example: when Role=0x01, it means that the role is an Internet of Things device; when Role=0x02, it means that the role is a configurator device; when Role=0x04, it means that the role is a control device; when Role=0x06, Indicates that the role is configurator device + control device.
也就是说,在本申请实施例中,当目标设备确定定位到的上述配置设备是一个配置器时,可以对目标设备的设备信息进行加密和发送。That is to say, in this embodiment of the present application, when the target device determines that the located configuration device is a configurator, the device information of the target device can be encrypted and sent.
在一种可能的实现方式中,目标设备根据验证信息,对目标设备的设备信息进行加密,包括:In a possible implementation, the target device encrypts the device information of the target device based on the verification information, including:
获取与配置设备之间的第一UWB测量信息;Obtain and configure the first UWB measurement information between devices;
当第一UWB测量信息满足第一条件时,根据验证信息,对目标设备的设备信息进行加密。When the first UWB measurement information meets the first condition, the device information of the target device is encrypted according to the verification information.
在一种可能的实现方式中,第一UWB测量信息包括第一角度信息、第一距离信息以及第一信号强度信息中的至少一种。In a possible implementation, the first UWB measurement information includes at least one of first angle information, first distance information, and first signal strength information.
在一种可能的实现方式中,第一条件包括以下条件中的至少一项:In a possible implementation, the first condition includes at least one of the following conditions:
当第一UWB测量信息包括第一角度信息时,第一角度信息指示的角度处于第一角度区间内;When the first UWB measurement information includes first angle information, the angle indicated by the first angle information is within the first angle interval;
当第一UWB测量信息包括第一距离信息时,第一距离信息指示的距离处于第一距离区间内;When the first UWB measurement information includes first distance information, the distance indicated by the first distance information is within the first distance interval;
当第一UWB测量信息包括第一信号强度信息时,第一信号强度信息指示的信号强度处于第一信号强度区间内。When the first UWB measurement information includes first signal strength information, the signal strength indicated by the first signal strength information is within the first signal strength interval.
在本申请实施例中,目标设备在对设备信息进行加密和发送之前,可以通过UWB测量信息确定是否满足加密和发送的条件,其判断方式与目标设备判断是否定位到配置设备的方式类似,此处不再赘述。In the embodiment of this application, before the target device encrypts and sends the device information, it can determine whether the conditions for encryption and sending are met through UWB measurement information. The determination method is similar to the way the target device determines whether the configuration device is located. This No further details will be given.
可选的,当上述第一条件与第二条件包含想同类型的子条件时,第一条件相比于第二条件更为严格的条件。Optionally, when the above first condition and the second condition include sub-conditions of the same type, the first condition is a more stringent condition than the second condition.
比如,当第一UWB测量信息包括第一角度信息,且第二UWB测量信息包括第二角度信息时,第二角度区间与第一角度区间相同,或者,第二角度区间包含第一角度区间。For example, when the first UWB measurement information includes first angle information and the second UWB measurement information includes second angle information, the second angle interval is the same as the first angle interval, or the second angle interval includes the first angle interval.
再比如,当第一UWB测量信息包括第一距离信息,且第二UWB测量信息包括第二距离信息时,第二距离区间与第一距离区间相同,或者,第二距离区间包含第一距离区间。For another example, when the first UWB measurement information includes first distance information, and the second UWB measurement information includes second distance information, the second distance interval is the same as the first distance interval, or the second distance interval includes the first distance interval. .
再比如,当第一UWB测量信息包括第一信号强度信息,且第二UWB测量信息包括第二信号强度信息时,第二信号强度区间与第一信号强度区间相同,或者,第二信号强度区间包含第一信号强度区间。For another example, when the first UWB measurement information includes first signal strength information, and the second UWB measurement information includes second signal strength information, the second signal strength interval is the same as the first signal strength interval, or the second signal strength interval Contains the first signal strength interval.
步骤504,目标设备通过UWB方式向配置设备发送加密后的设备信息;相应的,配置设备通过UWB方式接收目标设备发送的加密后的设备信息。Step 504: The target device sends the encrypted device information to the configuration device through UWB; accordingly, the configuration device receives the encrypted device information sent by the target device through UWB.
在一种可能的实现方式中,配置设备在接收目标设备发送的加密后的设备信息之前,还可以通过UWB方式获取目标设备的第二UWB标识信息;对第二UWB标识信息进行解析,获得目标设备的验证 信息,该验证信息中包含角色信息。配置设备通过UWB方式接收目标设备发送的加密后的设备信息,包括:当目标设备的角色信息指示目标设备的角色为物联网设备时,配置设备通过UWB方式接收目标设备发送的加密后的设备信息。In a possible implementation, before receiving the encrypted device information sent by the target device, the configuration device can also obtain the second UWB identification information of the target device through UWB; parse the second UWB identification information to obtain the target device. Verification information of the device, which contains role information. Configure the device to receive the encrypted device information sent by the target device through UWB, including: when the role information of the target device indicates that the role of the target device is an IoT device, configure the device to receive the encrypted device information sent by the target device through UWB. .
也就是说,在本申请实施例中,当配置设备确定定位到的上述目标设备是一个物联网设备时,可以接收目标设备的加密后的设备信息。That is to say, in this embodiment of the present application, when the configuration device determines that the located target device is an Internet of Things device, it can receive the encrypted device information of the target device.
步骤505,配置设备对加密后的设备信息进行解密,获得目标设备的设备信息。Step 505: The configuration device decrypts the encrypted device information to obtain the device information of the target device.
在一种可能的实现方式中,配置设备可以根据配置设备的验证信息,对加密后的设备信息进行解密,获得目标设备的设备信息。In a possible implementation, the configuration device can decrypt the encrypted device information based on the verification information of the configuration device to obtain the device information of the target device.
比如,当配置设备的验证信息包括配置设备的身份标识信息时,配置设备根据身份标识信息生成加密密钥,并根据生成的加密密钥对加密后的设备信息进行解密。For example, when the verification information of the configuration device includes the identity identification information of the configuration device, the configuration device generates an encryption key based on the identity identification information, and decrypts the encrypted device information based on the generated encryption key.
或者,配置设备可以根据预先设置的加密密钥,对加密后的设备信息进行解密,获得目标设备的设备信息。Alternatively, the configuration device can decrypt the encrypted device information according to the preset encryption key to obtain the device information of the target device.
其中,配置设备对加密后的设备信息进行解密的过程,与目标设备对设备信息加密的过程相对应,此处不再赘述。The process of decrypting the encrypted device information by the configuration device corresponds to the process of encrypting the device information by the target device, and will not be described again here.
步骤506,配置设备根据目标设备的设备信息,与目标设备建立配对连接;相应的,目标设备根据目标设备的设备信息,与配置设备建立配对连接。Step 506: The configuration device establishes a pairing connection with the target device based on the device information of the target device; correspondingly, the target device establishes a pairing connection with the configuration device based on the device information of the target device.
在一种可能的实现方式中,配置设备根据目标设备的设备信息,与目标设备建立配对连接,包括:In a possible implementation, the configuration device establishes a pairing connection with the target device based on the device information of the target device, including:
根据目标设备的设备信息中的口令码,与目标设备建立基于UWB的配对连接;相应的,目标设备根据目标设备的设备信息中的口令码,与配置设备建立基于UWB的配对连接。According to the password in the device information of the target device, a UWB-based pairing connection is established with the target device; correspondingly, the target device establishes a UWB-based pairing connection with the configuration device according to the password in the device information of the target device.
在另一种可能的实现方式中,配置设备根据目标设备的设备信息,与目标设备建立配对连接,包括:In another possible implementation, the configuration device establishes a pairing connection with the target device based on the device information of the target device, including:
根据目标设备的设备信息,与目标设备建立基于物联网协议(比如Matter协议)的配对连接。According to the device information of the target device, a pairing connection based on the Internet of Things protocol (such as Matter protocol) is established with the target device.
其中,配置设备与目标设备建立配对连接之后,即表示配对成功,此时可以对目标设备进行配置。Among them, after the configuration device and the target device establish a pairing connection, the pairing is successful, and the target device can be configured at this time.
在本申请实施例中,上述配对是指建立配置前的安全通信通道:包括安全信道的建立和设备认证,上述配置可以包括:配对安全通道建立完成后的互操作证书的配置、设备基本信息的配置、时钟同步配置、位置信息配置、以及访问控制权限配置等等。In the embodiment of this application, the above-mentioned pairing refers to the secure communication channel before establishing the configuration: including the establishment of the secure channel and device authentication. The above-mentioned configuration may include: the configuration of the interoperability certificate after the pairing secure channel is established, and the basic information of the device. Configuration, clock synchronization configuration, location information configuration, access control permission configuration, etc.
在一种可能的实现方式中,上述配置设备对目标设备配置完成后,可以建立UWB标识信息与目标设备的设备标识信息之间的关联关系。In a possible implementation manner, after the above configuration device completes configuring the target device, an association relationship between the UWB identification information and the device identification information of the target device can be established.
其中,上述设备标识信息,可以是配置设备对目标设备进行配置过程中获取到的,该目标设备的节点标识(Node ID)。The above device identification information may be the node ID (Node ID) of the target device obtained by the configuration device during the configuration of the target device.
在本申请实施例中,配置设备与目标设备之间配对完成后,配置设备可以在本地建立并存储UWB标识信息与目标设备的设备标识信息之间的关联关系,从而在后续再次通过UWB方式获取到UWB标识信息时,能够快捷的判断出配置设备与目标设备之间已经完成了配对,避免重新执行设备发现和配对过程。In the embodiment of this application, after the pairing between the configuration device and the target device is completed, the configuration device can locally establish and store the association between the UWB identification information and the device identification information of the target device, so that it can be obtained through UWB again later. When the UWB identification information is received, it can be quickly determined that the pairing between the configuration device and the target device has been completed, avoiding the need to re-execute the device discovery and pairing process.
在一种可能的实现方式中,配置设备还可以根据第二UWB标识信息与目标设备的设备标识信息之间的关联关系,对目标设备进行控制。In a possible implementation, the configuration device can also control the target device based on the association between the second UWB identification information and the device identification information of the target device.
在一种可能的实现方式中,建立第二UWB标识信息与目标设备的设备标识信息之间的关联关系之后,根据第二UWB标识信息与目标设备的设备标识信息之间的关联关系,对目标设备进行控制的过程可以包括:In a possible implementation, after establishing an association between the second UWB identification information and the device identification information of the target device, based on the association between the second UWB identification information and the device identification information of the target device, the target device is The process of device control can include:
当接收到第二操作时,通过超宽带UWB方式获取目标设备的第二UWB标识信息;When receiving the second operation, obtain the second UWB identification information of the target device through ultra-wideband UWB;
查询与第二UWB标识信息关联的设备标识信息,以及与触发操作关联的第一操作命令;Query the device identification information associated with the second UWB identification information and the first operation command associated with the triggering operation;
根据设备标识信息,向目标设备发送第一操作命令。Send a first operation command to the target device according to the device identification information.
在一种可能的实现方式中,建立第二UWB标识信息与目标设备的设备标识信息之间的关联关系之后,根据第二UWB标识信息与目标设备的设备标识信息之间的关联关系,对目标设备进行控制的方式可以包括:In a possible implementation, after establishing an association between the second UWB identification information and the device identification information of the target device, based on the association between the second UWB identification information and the device identification information of the target device, the target device is Device control methods can include:
通过超宽带UWB方式获取第二UWB标识信息,以及配置设备与目标设备之间的第四距离信息;Obtain the second UWB identification information through the ultra-wideband UWB method, and the fourth distance information between the configuration device and the target device;
查询与第二UWB标识信息关联的设备标识信息,以及与第四距离信息指示的距离关联的第二操作命令;Query the device identification information associated with the second UWB identification information, and the second operation command associated with the distance indicated by the fourth distance information;
根据设备标识信息,向目标设备发送第二操作命令。Send a second operation command to the target device according to the device identification information.
请参考图6,其示出了本申请实施例涉及的一种设备发现和配对时序示意图。如图6所示,以配置设备是手机中的配置器(APP),目标设备是智能家居设备(以下简称为设备),UWB标识信息为UWB标签ID为为例,该设备发现和配对过程可以如下:Please refer to FIG. 6 , which shows a schematic diagram of device discovery and pairing sequence according to an embodiment of the present application. As shown in Figure 6, taking the configuration device as the configurator (APP) in the mobile phone, the target device as a smart home device (hereinafter referred to as the device), and the UWB identification information as the UWB tag ID as an example, the device discovery and pairing process can as follows:
配置器设备内置UWB通信组件,其UWB标签ID构成为:身份ID(身份标识信息)以及Role(角色信息),身份ID用于UWB通信身份识别使用,Role可以为bitmask,表示角色,举例说明:当Role=0x01时,表示设备角色为设备,为0x02时表示为配置器设备,为0x04时为控制设备,为0x06时为配置+控制设备;The configurator device has a built-in UWB communication component, and its UWB tag ID consists of: identity ID (identification information) and Role (role information). The identity ID is used for UWB communication identification. Role can be a bitmask, indicating a role. For example: When Role=0x01, it means that the device role is a device, when it is 0x02, it means a configurator device, when it is 0x04, it is a control device, and when it is 0x06, it is a configuration + control device;
设备内置UWB通信组件,其UWB标签ID构成为:身份ID以及Role,身份ID用于UWB通信身份识别使用,Role可以为bitmask,表示角色,说明同步骤1;设备将VendorID、ProductID、Discriminator、Discovery Bitmask、Passcode等信息(即上述设备信息)存储至安全存储区域中。The device has a built-in UWB communication component, and its UWB tag ID consists of: identity ID and Role. The identity ID is used for UWB communication identification. Role can be bitmask, indicating the role. The instructions are the same as step 1; the device will VendorID, ProductID, Discriminator, Discovery Bitmask, Passcode and other information (i.e. the above device information) are stored in the secure storage area.
其中,手机APP与设备间可以建立UWB通信,通过UWB标识信息(其中标签ID由身份ID和Role组成)识别对方身份和角色。Among them, UWB communication can be established between the mobile APP and the device, and the identity and role of the other party can be identified through UWB identification information (the tag ID consists of the identity ID and Role).
S61,用户手持手机在一定距离内指向设备。S61, the user holds the mobile phone and points to the device within a certain distance.
S62,配置器通过UWB实时检测设备UWB组件的标识信息。S62: The configurator detects the identification information of the UWB component of the device through UWB in real time.
S63,设备返回其UWB标签ID,和与配置器间UWB的距离信息、角度、信号强度等信息。S63, the device returns its UWB tag ID, and UWB distance information, angle, signal strength and other information from the configurator.
S64,配置器获取的UWB角度信息,当角度在一定范围时,锁定设备,即确定定位到设备。S64. When the UWB angle information obtained by the configurator is within a certain range, the device is locked, that is, the device is determined to be positioned.
S65,设备通过UWB实时检测配置器UWB组件的标识信息。S65: The device detects the identification information of the UWB component of the configurator in real time through UWB.
S66,配置器返回UWB标签ID,和与设备间UWB的距离信息、角度、信号强度等信息。S66, the configurator returns the UWB tag ID, and UWB distance information, angle, signal strength and other information to the device.
S67,设备通过获取的UWB角度信息,判定当角度在一定范围时,锁定配置器。S67: The device determines through the obtained UWB angle information that when the angle is within a certain range, it locks the configurator.
S68,设备通过获取的UWB标识信息中Role信息确定锁定的设备是配置器设备。S68: The device determines that the locked device is the configurator device through the Role information in the obtained UWB identification information.
S69,设备获取的UWB的距离信息,当距离足够小或者在设备规定可以返回配对信息的距离范围时,从安全存储区读取VendorID、ProductID、Discriminator、Discovery Bitmask、Passcode信息。S69, the device obtains the UWB distance information. When the distance is small enough or the device specifies the distance range within which pairing information can be returned, VendorID, ProductID, Discriminator, Discovery Bitmask, and Passcode information are read from the secure storage area.
S610,设备根据配置器的身份ID生成密钥k,使用k对VendorID、ProductID、Discriminator、Discovery Bitmask、Passcode信息加密。S610: The device generates a key k based on the identity ID of the configurator, and uses k to encrypt VendorID, ProductID, Discriminator, Discovery Bitmask, and Passcode information.
S611,设备通过UWB信道向身份ID且角色是配置器的手机APP(角色不是配置器的设备不能发送)发送加密数据。S611: The device sends encrypted data through the UWB channel to the mobile APP whose identity ID is the configurator (devices whose role is not the configurator cannot send).
S612,配置器使用密钥k解密数据,得到VendorID、ProductID、Discriminator、Discovery Bitmask、Passcode信息。S612, the configurator uses key k to decrypt the data and obtains VendorID, ProductID, Discriminator, Discovery Bitmask, and Passcode information.
S613,配置器通过获取的passcode基于UWB信道建立配对,或者,基于Matter标准的信道建立配对。S613: The configurator establishes pairing based on the UWB channel through the obtained passcode, or establishes pairing based on the Matter standard channel.
请参考图7,其示出了本申请实施例涉及的另一种设备发现和配对时序示意图。如图7所示,以配置设备是手机中的配置器(APP),目标设备是智能家居设备(以下简称为设备),UWB标识信息为UWB标签ID为例,该设备发现和配对过程可以如下:Please refer to FIG. 7 , which shows another device discovery and pairing sequence diagram related to an embodiment of the present application. As shown in Figure 7, taking the configuration device as the configurator (APP) in the mobile phone, the target device as a smart home device (hereinafter referred to as the device), and the UWB identification information as the UWB tag ID as an example, the device discovery and pairing process can be as follows :
配置器设备内置UWB通信组件,其UWB标签ID构成为:身份ID以及Role,身份ID用于UWB通信身份识别使用,Role可以为bitmask,表示角色,举例说明:当Role=0x01时,表示设备角色为设备,为0x02时表示为配置器设备,为0x04时为控制设备,为0x06时为配置+控制设备;The configurator device has a built-in UWB communication component, and its UWB tag ID consists of: identity ID and role. The identity ID is used for UWB communication identification. Role can be bitmask, indicating the role. For example: when Role=0x01, it represents the device role. It is a device. When it is 0x02, it is a configurator device. When it is 0x04, it is a control device. When it is 0x06, it is a configuration + control device;
设备内置UWB通信组件,其UWB标签ID构成为:身份ID以及Role,身份ID用于UWB通信身份识别使用,Role可以为bitmask,表示角色,说明同步骤1;设备将VendorID、ProductID、Discriminator、Discovery Bitmask、Passcode等信息(即上述设备信息)存储至器安全存储区域中。The device has a built-in UWB communication component, and its UWB tag ID consists of: identity ID and Role. The identity ID is used for UWB communication identification. Role can be bitmask, indicating the role. The instructions are the same as step 1; the device will VendorID, ProductID, Discriminator, Discovery Bitmask, Passcode and other information (that is, the above device information) are stored in the device's secure storage area.
其中,手机APP与设备间可以建立UWB通信,通过UWB标识信息(其中标签ID由身份ID和Role组成)识别对方身份和角色。Among them, UWB communication can be established between the mobile APP and the device, and the identity and role of the other party can be identified through UWB identification information (the tag ID consists of the identity ID and Role).
S71,用户手持手机在一定距离内指向设备。S71, the user holds the mobile phone and points to the device within a certain distance.
S72,设备通过UWB实时检测手机APP UWB组件的标识信息。S72, the device detects the identification information of the UWB component of the mobile phone APP in real time through UWB.
S73,配置器返回UWB标签ID,和与设备间UWB的距离信息、角度、信号强度等信息。S73, the configurator returns the UWB tag ID, and UWB distance information, angle, signal strength and other information to the device.
S74,设备通过获取的UWB角度信息,判定当角度在一定范围时,锁定配置器。S74. The device determines, through the obtained UWB angle information, that when the angle is within a certain range, it locks the configurator.
S75,设备通过获取的UWB标识信息中Role信息知道锁定的设备是配置器设备。S75: The device knows that the locked device is the configurator device through the Role information in the obtained UWB identification information.
S76,设备通过获取的UWB的距离信息,当距离足够小或者在设备规定可以返回配对信息的距离范围时,从安全存储区读取VendorID、ProductID、Discriminator、Discovery Bitmask、Passcode信息。S76, the device reads the VendorID, ProductID, Discriminator, Discovery Bitmask, and Passcode information from the secure storage area through the obtained UWB distance information. When the distance is small enough or when the device specifies the distance range within which pairing information can be returned.
S77,设备根据配置器的身份ID生成密钥k,使用k对VendorID、ProductID、Discriminator、Discovery Bitmask、Passcode加密。S77, the device generates key k based on the identity ID of the configurator, and uses k to encrypt VendorID, ProductID, Discriminator, Discovery Bitmask, and Passcode.
S78,设备通过UWB信道向身份ID且角色是配置器的手机(角色不是配置器的设备不能发送)发送加密数据。S78: The device sends encrypted data through the UWB channel to the mobile phone whose identity ID and role is the configurator (devices whose role is not the configurator cannot send).
S79,配置器使用密钥k解密数据,得到VendorID、ProductID、Discriminator、Discovery Bitmask、Passcode。S79, the configurator uses key k to decrypt the data and obtains VendorID, ProductID, Discriminator, Discovery Bitmask, and Passcode.
S710,配置器通过获取的Passcode基于UWB信道建立配对,或者,基于Matter标准的信道建立配 对。S710: The configurator establishes pairing based on the UWB channel through the obtained Passcode, or establishes pairing based on the Matter standard channel.
通过本申请实施例所示的方案,由设备通过UWB判定配置器与设备间的距离,决定是否向配置器发送其配对所需的信息,距离足够小的情况可以有效的防止其他非法用户通过UWB远距离对设备进行配置;设备使用配置器的身份ID对配对设备所需的信息进行加密发送给配置器,使配对所需数据的传输更加安全。Through the solution shown in the embodiment of this application, the device determines the distance between the configurator and the device through UWB, and decides whether to send the information required for pairing to the configurator. When the distance is small enough, it can effectively prevent other illegal users from using UWB. Configure the device remotely; the device uses the identity ID of the configurator to encrypt the information required for pairing the device and sends it to the configurator, making the transmission of data required for pairing more secure.
综上所述,在本申请实施例所示的方案,配置设备的验证信息可以编码映射为配置设备的UWB标识信息,在设备发现过程中,配置设备通过UWB方式向目标设备发送第一UWB标识信息,以便目标设备解析第一UWB标识信息得到验证信息,然后根据验证信息对目标设备的设备信息进行加密后,通过UWB方式发送给配置设备;相应的,配置设备可以根据验证信息解密得到上述设备信息;在上述方案中,用户不需要使用配置设备进行二维码扫描、输入或者控制配置设备贴近目标设备等繁琐操作,从而简化了物联网场景中的设备发现流程,提高了设备发现效率,同时保证了设备信息传递的安全性。To sum up, in the solution shown in the embodiment of this application, the verification information of the configuration device can be encoded and mapped to the UWB identification information of the configuration device. During the device discovery process, the configuration device sends the first UWB identification to the target device through UWB. information, so that the target device can parse the first UWB identification information to obtain the verification information, and then encrypt the device information of the target device according to the verification information, and then send it to the configuration device through UWB; accordingly, the configuration device can decrypt according to the verification information to obtain the above device information; in the above solution, users do not need to use the configuration device to perform QR code scanning, input, or control the configuration device to close to the target device, etc., thus simplifying the device discovery process in the Internet of Things scenario and improving device discovery efficiency. The security of device information transmission is ensured.
请参考图8,其示出了本申请一个实施例提供的设备发现装置的框图。该设备发现装置800具有实现上述图2或图5所示的方法中,由配置设备执行的功能。如图8所示,该设备发现装置800可以包括:Please refer to FIG. 8 , which shows a block diagram of a device discovery device provided by an embodiment of the present application. The device discovery device 800 has the function of implementing the configuration device in the method shown in FIG. 2 or FIG. 5 . As shown in Figure 8, the device discovery device 800 may include:
接收模块801,用于通过超宽带UWB方式获取配置设备的第一UWB标识信息;The receiving module 801 is used to obtain the first UWB identification information of the configuration device through the ultra-wideband UWB method;
解析模块802,用于对所述第一UWB标识信息进行解析,获得所述配置设备的验证信息;Parsing module 802 is used to parse the first UWB identification information and obtain verification information of the configuration device;
加密模块803,用于根据所述验证信息,对所述目标设备的设备信息进行加密; Encryption module 803, configured to encrypt the device information of the target device according to the verification information;
发送模块804,用于通过UWB方式向所述配置设备发送加密后的所述设备信息。The sending module 804 is configured to send the encrypted device information to the configuration device through UWB.
在一种可能的实现方式中,所述验证信息包括身份标识信息。In a possible implementation, the verification information includes identity identification information.
在一种可能的实现方式中,所述加密模块803,用于,In a possible implementation, the encryption module 803 is used to:
根据所述配置设备的身份标识信息生成加密密钥;Generate an encryption key according to the identity identification information of the configuration device;
根据所述加密密钥,对所述目标设备的设备信息进行加密。Device information of the target device is encrypted according to the encryption key.
在一种可能的实现方式中,上述验证信息还包括角色信息;In a possible implementation, the above verification information also includes role information;
所述加密模块803,用于当所述配置设备的角色信息指示所述配置设备的角色为配置器时,根据所述验证信息,对所述目标设备的设备信息进行加密。The encryption module 803 is configured to encrypt the device information of the target device according to the verification information when the role information of the configuration device indicates that the role of the configuration device is a configurator.
在一种可能的实现方式中,所述加密模块803,用于,In a possible implementation, the encryption module 803 is used to:
获取与所述配置设备之间的第一UWB测量信息;Obtain first UWB measurement information with the configuration device;
当所述第一UWB测量信息满足第一条件时,根据所述验证信息,对所述目标设备的设备信息进行加密。When the first UWB measurement information meets the first condition, the device information of the target device is encrypted according to the verification information.
在一种可能的实现方式中,所述第一UWB测量信息包括第一角度信息、第一距离信息以及第一信号强度信息中的至少一种。In a possible implementation, the first UWB measurement information includes at least one of first angle information, first distance information, and first signal strength information.
在一种可能的实现方式中,所述第一条件包括以下条件中的至少一项:In a possible implementation, the first condition includes at least one of the following conditions:
当所述第一UWB测量信息包括所述第一角度信息时,所述第一角度信息指示的角度处于第一角度区间内;When the first UWB measurement information includes the first angle information, the angle indicated by the first angle information is within the first angle interval;
当所述第一UWB测量信息包括所述第一距离信息时,所述第一距离信息指示的距离处于第一距离区间内;When the first UWB measurement information includes the first distance information, the distance indicated by the first distance information is within a first distance interval;
当所述第一UWB测量信息包括所述第一信号强度信息时,所述第一信号强度信息指示的信号强度处于第一信号强度区间内。When the first UWB measurement information includes the first signal strength information, the signal strength indicated by the first signal strength information is within a first signal strength interval.
在一种可能的实现方式中,所述装置还包括:In a possible implementation, the device further includes:
测量信息获取模块,用于在所述接收模块通过超宽带UWB方式获取配置设备的第一UWB标识信息之前,获取与所述配置设备之间的第二UWB测量信息;A measurement information acquisition module, configured to acquire the second UWB measurement information with the configuration device before the receiving module acquires the first UWB identification information of the configuration device through ultra-wideband UWB;
定位模块,用于当所述第二UWB测量信息满足第二条件时,确定定位到所述配置设备。A positioning module, configured to determine to locate the configuration device when the second UWB measurement information satisfies the second condition.
在一种可能的实现方式中,所述第二UWB测量信息包括第二角度信息、第二距离信息以及第二信号强度信息中的至少一种。In a possible implementation, the second UWB measurement information includes at least one of second angle information, second distance information, and second signal strength information.
在一种可能的实现方式中,所述第二条件包括以下条件中的至少一项:In a possible implementation, the second condition includes at least one of the following conditions:
当所述第二UWB测量信息包括所述第二角度信息时,所述第二角度信息指示的角度处于第二角度区间内;When the second UWB measurement information includes the second angle information, the angle indicated by the second angle information is within the second angle interval;
当所述第二UWB测量信息包括所述第二距离信息时,所述第二距离信息指示的距离处于第二距离区间内;When the second UWB measurement information includes the second distance information, the distance indicated by the second distance information is within the second distance interval;
当所述第二UWB测量信息包括所述第二信号强度信息时,所述第二信号强度信息指示的信号强度处于第二信号强度区间内。When the second UWB measurement information includes the second signal strength information, the signal strength indicated by the second signal strength information is within a second signal strength interval.
在一种可能的实现方式中,所述装置还包括:In a possible implementation, the device further includes:
标签生成模块,用于根据所述目标设备的验证信息,生成所述目标设备的第二UWB标识信息。A label generation module, configured to generate second UWB identification information of the target device according to the verification information of the target device.
在一种可能的实现方式中,所述装置还包括:In a possible implementation, the device further includes:
配对模块,用于根据所述目标设备的设备信息,与所述配置设备建立配对连接。A pairing module, configured to establish a pairing connection with the configuration device according to the device information of the target device.
在一种可能的实现方式中,所述配对模块,用于根据所述目标设备的设备信息中的口令码,与所述配置设备建立基于UWB的配对连接。In a possible implementation, the pairing module is configured to establish a UWB-based pairing connection with the configuration device according to the password in the device information of the target device.
请参考图9,其示出了本申请一个实施例提供的设备发现装置的框图。该设备发现装置900具有实现上述图3或图5所示的方法中,由目标设备执行的功能。如图9所示,该设备发现装置900可以包括:Please refer to Figure 9, which shows a block diagram of a device discovery device provided by an embodiment of the present application. The device discovery device 900 has the function of being executed by the target device in implementing the method shown in FIG. 3 or FIG. 5 . As shown in Figure 9, the device discovery device 900 may include:
发送模块901,用于通过超宽带UWB方式向目标设备发送第一UWB标识信息,以便所述目标设备对所述第一UWB标识信息进行解析,获得所述配置设备的验证信息,根据所述验证信息,对所述目标设备的设备信息进行加密;The sending module 901 is configured to send the first UWB identification information to the target device in the ultra-wideband UWB mode, so that the target device can parse the first UWB identification information and obtain the verification information of the configuration device. According to the verification Information, encrypt the device information of the target device;
接收模块902,用于通过UWB方式接收所述目标设备发送的加密后的所述设备信息;The receiving module 902 is configured to receive the encrypted device information sent by the target device through UWB;
解密模块903,用于对加密后的所述设备信息进行解密,获得所述目标设备的设备信息。The decryption module 903 is used to decrypt the encrypted device information to obtain the device information of the target device.
在一种可能的实现方式中,所述装置还包括:In a possible implementation, the device further includes:
配对模块,用于根据所述目标设备的设备信息,与所述目标设备建立配对连接。A pairing module, configured to establish a pairing connection with the target device according to the device information of the target device.
在一种可能的实现方式中,所述配对模块,用于根据所述目标设备的设备信息中的口令码,与所述目标设备建立基于UWB的配对连接。In a possible implementation, the pairing module is configured to establish a UWB-based pairing connection with the target device according to the password in the device information of the target device.
在一种可能的实现方式中,所述装置还包括:In a possible implementation, the device further includes:
测量信息获取模块,用于在所述发送模块通过超宽带UWB方式向目标设备发送第一UWB标识信息之前,获取与所述目标设备之间的第三UWB测量信息;A measurement information acquisition module, configured to acquire third UWB measurement information with the target device before the sending module sends the first UWB identification information to the target device in an ultra-wideband UWB manner;
定位模块,用于当所述第三UWB测量信息满足第三条件时,确定定位到所述目标设备。A positioning module, configured to determine to locate the target device when the third UWB measurement information satisfies a third condition.
在一种可能的实现方式中,所述第三UWB测量信息包括第三角度信息、第三距离信息以及第三信号强度信息中的至少一种。In a possible implementation, the third UWB measurement information includes at least one of third angle information, third distance information, and third signal strength information.
在一种可能的实现方式中,所述第三条件包括以下条件中的至少一项:In a possible implementation, the third condition includes at least one of the following conditions:
当所述第三UWB测量信息包括所述第三角度信息时,所述第三角度信息指示的角度处于第三角度区间内;When the third UWB measurement information includes the third angle information, the angle indicated by the third angle information is within a third angle interval;
当所述第三UWB测量信息包括所述第三距离信息时,所述第三距离信息指示的距离处于第三距离区间内;When the third UWB measurement information includes the third distance information, the distance indicated by the third distance information is within a third distance interval;
当所述第三UWB测量信息包括所述第三信号强度信息时,所述第三信号强度信息指示的信号强度处于第三信号强度区间内。When the third UWB measurement information includes the third signal strength information, the signal strength indicated by the third signal strength information is within a third signal strength interval.
在一种可能的实现方式中,所述接收模块902,还用于在通过UWB方式接收所述目标设备发送的加密后的所述设备信息之前,通过UWB方式获取所述目标设备的第二UWB标识信息;In a possible implementation, the receiving module 902 is further configured to obtain the second UWB of the target device through UWB before receiving the encrypted device information sent by the target device through UWB. identification information;
所述装置还包括:解析模块,用于对所述第二UWB标识信息进行解析,获得所述目标设备的验证信息;所述验证信息包括角色信息;The device further includes: a parsing module for parsing the second UWB identification information to obtain verification information of the target device; the verification information includes role information;
所述接收模块902,用于当所述目标设备的角色信息指示所述目标设备的角色为物联网设备时,通过UWB方式接收所述目标设备发送的加密后的所述设备信息。The receiving module 902 is configured to receive the encrypted device information sent by the target device in a UWB manner when the role information of the target device indicates that the role of the target device is an Internet of Things device.
请参考图10,其示出了本申请一个实施例提供的计算机设备1000的结构示意图。该计算机设备1000可以包括:处理器1001、接收器1002、发射器1003、存储器1004和总线1005。Please refer to FIG. 10 , which shows a schematic structural diagram of a computer device 1000 provided by an embodiment of the present application. The computer device 1000 may include a processor 1001, a receiver 1002, a transmitter 1003, a memory 1004, and a bus 1005.
处理器1001包括一个或者一个以上处理核心,处理器1001通过运行软件程序以及模块,从而执行各种功能应用以及信息处理。The processor 1001 includes one or more processing cores. The processor 1001 executes various functional applications and information processing by running software programs and modules.
接收器1002和发射器1003可以实现为一个通信组件,该通信组件可以是一块通信芯片。该通信芯片也可以称为收发器。The receiver 1002 and the transmitter 1003 can be implemented as a communication component, and the communication component can be a communication chip. This communication chip can also be called a transceiver.
存储器1004通过总线1005与处理器1001相连。The memory 1004 is connected to the processor 1001 through a bus 1005.
存储器1004可用于存储计算机程序,处理器1001用于执行该计算机程序,以实现上述方法实施例中的各个步骤。The memory 1004 can be used to store a computer program, and the processor 1001 is used to execute the computer program to implement various steps in the above method embodiments.
此外,存储器1004可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,易失性或非易失性存储设备包括但不限于:磁盘或光盘,电可擦除可编程只读存储器,可擦除可编程只读存储器,静态随时存取存储器,只读存储器,磁存储器,快闪存储器,可编程只读存储器。Additionally, memory 1004 may be implemented by any type of volatile or non-volatile storage device, or combination thereof, including but not limited to: magnetic or optical disks, electrically erasable programmable Read-only memory, erasable programmable read-only memory, static ready-access memory, read-only memory, magnetic memory, flash memory, programmable read-only memory.
在一个示例性的方案中,当计算机设备1000实现为配置设备时,所述收发器,用于通过超宽带UWB方式向目标设备发送第一UWB标识信息,以便所述目标设备对所述第一UWB标识信息进行解析,获得所述配置设备的验证信息,根据所述验证信息,对所述目标设备的设备信息进行加密;通过 UWB方式接收所述目标设备发送的加密后的所述设备信息;所述处理器,用于对加密后的所述设备信息进行解密,获得所述目标设备的设备信息。In an exemplary solution, when the computer device 1000 is implemented as a configuration device, the transceiver is configured to send the first UWB identification information to the target device in an ultra-wideband UWB manner, so that the target device can identify the first UWB identification information. Parse the UWB identification information to obtain the verification information of the configuration device, encrypt the device information of the target device according to the verification information; receive the encrypted device information sent by the target device through UWB; The processor is configured to decrypt the encrypted device information to obtain the device information of the target device.
其中,上述计算机设备1000中的处理器和/或收发器执行的过程可以参考上述图3或图5任一所示的方法中,由配置设备执行的各个步骤。The process performed by the processor and/or transceiver in the computer device 1000 may refer to the various steps performed by the configuration device in the method shown in either of the above-mentioned FIG. 3 or FIG. 5 .
在另一个示例性的方案中,当计算机设备1000实现为目标设备时,所述收发器,用于通过超宽带UWB方式获取配置设备的第一UWB标识信息;所述处理器,用于对所述第一UWB标识信息进行解析,获得所述配置设备的验证信息;根据所述验证信息,对所述目标设备的设备信息进行加密;所述收发器,用于通过UWB方式向所述配置设备发送加密后的所述设备信息。In another exemplary solution, when the computer device 1000 is implemented as a target device, the transceiver is configured to obtain the first UWB identification information of the configuration device through ultra-wideband UWB; and the processor is configured to configure the device. The first UWB identification information is parsed to obtain the verification information of the configuration device; the device information of the target device is encrypted according to the verification information; the transceiver is used to send the configuration device to the configuration device in a UWB manner. Send the encrypted device information.
其中,上述计算机设备1000中的处理器和/或收发器执行的过程可以参考上述图2或图5任一所示的方法中,由目标设备执行的各个步骤。The process performed by the processor and/or transceiver in the computer device 1000 may refer to the various steps performed by the target device in the method shown in either of the above-mentioned FIG. 2 or FIG. 5 .
本申请实施例还提供了一种计算机可读存储介质,所述存储介质中存储有计算机程序,所述计算机程序由处理器加载并执行以实现上述图2、图3或者图5所示的方法中,由配置设备或者目标设备执行的全部或者部分步骤。Embodiments of the present application also provide a computer-readable storage medium. A computer program is stored in the storage medium. The computer program is loaded and executed by a processor to implement the method shown in Figure 2, Figure 3 or Figure 5. , all or part of the steps performed by the configuration device or the target device.
本申请还提供了一种芯片,该芯片用于在计算机设备中运行,以使得计算机设备执行上述图2、图3或者图5所示的方法中,由配置设备或者目标设备执行的全部或者部分步骤。This application also provides a chip, which is used to run in a computer device, so that the computer device executes all or part of the methods shown in Figure 2, Figure 3 or Figure 5, which are executed by the configuration device or the target device. step.
本申请还提供了一种计算机程序产品,该计算机程序产品或计算机程序包括计算机指令,该计算机指令存储在计算机可读存储介质中。计算机设备的处理器从计算机可读存储介质读取该计算机指令,处理器执行该计算机指令,使得计算机设备执行上述图2、图3或者图5所示的方法中,由配置设备或者目标设备执行的全部或者部分步骤。The application also provides a computer program product, which computer program product or computer program includes computer instructions, and the computer instructions are stored in a computer-readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device executes the method shown in Figure 2, Figure 3 or Figure 5, which is executed by the configuration device or the target device. all or part of the steps.
本申请还提供了一种计算机程序,该计算机程序由计算机设备的处理器执行,以实现上述图2、图3或者图5所示的方法中,由配置设备或者目标设备执行的全部或者部分步骤。This application also provides a computer program, which is executed by the processor of the computer device to implement all or part of the steps executed by the configuration device or the target device in the method shown in Figure 2, Figure 3 or Figure 5. .

Claims (45)

  1. 一种设备发现方法,其特征在于,所述方法由目标设备执行,所述方法包括:A device discovery method, characterized in that the method is executed by a target device, and the method includes:
    通过超宽带UWB方式获取配置设备的第一UWB标识信息;Obtain the first UWB identification information of the configured device through ultra-wideband UWB;
    对所述第一UWB标识信息进行解析,获得所述配置设备的验证信息;Parse the first UWB identification information to obtain verification information of the configuration device;
    根据所述验证信息,对所述目标设备的设备信息进行加密;Encrypt the device information of the target device according to the verification information;
    通过UWB方式向所述配置设备发送加密后的所述设备信息。Send the encrypted device information to the configuration device in a UWB manner.
  2. 根据权利要求1所述的方法,其特征在于,所述验证信息包括身份标识信息。The method according to claim 1, characterized in that the verification information includes identity identification information.
  3. 根据权利要求2所述的方法,其特征在于,所述根据所述验证信息,对所述目标设备的设备信息进行加密,包括:The method of claim 2, wherein encrypting the device information of the target device according to the verification information includes:
    根据所述配置设备的身份标识信息生成加密密钥;Generate an encryption key according to the identity identification information of the configuration device;
    根据所述加密密钥,对所述目标设备的设备信息进行加密。Device information of the target device is encrypted according to the encryption key.
  4. 根据权利要求1至3任一所述的方法,其特征在于,所述验证信息包括角色信息;The method according to any one of claims 1 to 3, characterized in that the verification information includes role information;
    所述根据所述验证信息,对所述目标设备的设备信息进行加密,包括:Encrypting device information of the target device according to the verification information includes:
    当所述配置设备的角色信息指示所述配置设备的角色为配置器时,对所述目标设备的设备信息进行加密。When the role information of the configuration device indicates that the role of the configuration device is a configurator, the device information of the target device is encrypted.
  5. 根据权利要求1至4任一所述的方法,其特征在于,所述根据所述验证信息,对所述目标设备的设备信息进行加密,包括:The method according to any one of claims 1 to 4, wherein encrypting the device information of the target device according to the verification information includes:
    获取与所述配置设备之间的第一UWB测量信息;Obtain first UWB measurement information with the configuration device;
    当所述第一UWB测量信息满足第一条件时,根据所述验证信息,对所述目标设备的设备信息进行加密。When the first UWB measurement information meets the first condition, the device information of the target device is encrypted according to the verification information.
  6. 根据权利要求5所述的方法,其特征在于,所述第一UWB测量信息包括第一角度信息、第一距离信息以及第一信号强度信息中的至少一种。The method of claim 5, wherein the first UWB measurement information includes at least one of first angle information, first distance information, and first signal strength information.
  7. 根据权利要求6所述的方法,其特征在于,所述第一条件包括以下条件中的至少一项:The method of claim 6, wherein the first condition includes at least one of the following conditions:
    当所述第一UWB测量信息包括所述第一角度信息时,所述第一角度信息指示的角度处于第一角度区间内;When the first UWB measurement information includes the first angle information, the angle indicated by the first angle information is within the first angle interval;
    当所述第一UWB测量信息包括所述第一距离信息时,所述第一距离信息指示的距离处于第一距离区间内;When the first UWB measurement information includes the first distance information, the distance indicated by the first distance information is within a first distance interval;
    当所述第一UWB测量信息包括所述第一信号强度信息时,所述第一信号强度信息指示的信号强度处于第一信号强度区间内。When the first UWB measurement information includes the first signal strength information, the signal strength indicated by the first signal strength information is within a first signal strength interval.
  8. 根据权利要求1至7任一所述的方法,其特征在于,所述通过超宽带UWB方式获取配置设备的第一UWB标识信息之前,还包括:The method according to any one of claims 1 to 7, characterized in that before obtaining the first UWB identification information of the configuration device through ultra-wideband UWB, it further includes:
    获取与所述配置设备之间的第二UWB测量信息;Obtain second UWB measurement information with the configuration device;
    当所述第二UWB测量信息满足第二条件时,确定定位到所述配置设备。When the second UWB measurement information satisfies the second condition, it is determined that the configuration device is located.
  9. 根据权利要求8所述的方法,其特征在于,所述第二UWB测量信息包括第二角度信息、第二距离信息以及第二信号强度信息中的至少一种。The method of claim 8, wherein the second UWB measurement information includes at least one of second angle information, second distance information, and second signal strength information.
  10. 根据权利要求9所述的方法,其特征在于,所述第二条件包括以下条件中的至少一项:The method of claim 9, wherein the second condition includes at least one of the following conditions:
    当所述第二UWB测量信息包括所述第二角度信息时,所述第二角度信息指示的角度处于第二角度区间内;When the second UWB measurement information includes the second angle information, the angle indicated by the second angle information is within the second angle interval;
    当所述第二UWB测量信息包括所述第二距离信息时,所述第二距离信息指示的距离处于第二距离区间内;When the second UWB measurement information includes the second distance information, the distance indicated by the second distance information is within the second distance interval;
    当所述第二UWB测量信息包括所述第二信号强度信息时,所述第二信号强度信息指示的信号强度处于第二信号强度区间内。When the second UWB measurement information includes the second signal strength information, the signal strength indicated by the second signal strength information is within a second signal strength interval.
  11. 根据权利要求1至10任一所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 10, characterized in that the method further includes:
    根据所述目标设备的验证信息,生成所述目标设备的第二UWB标识信息。Generate second UWB identification information of the target device according to the verification information of the target device.
  12. 根据权利要求1至11任一所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 11, characterized in that, the method further includes:
    根据所述目标设备的设备信息,与所述配置设备建立配对连接。Establish a pairing connection with the configuration device according to the device information of the target device.
  13. 根据权利要求12所述的方法,其特征在于,所述根据所述目标设备的设备信息,与所述配置设备建立配对连接,包括:The method according to claim 12, wherein establishing a pairing connection with the configuration device according to the device information of the target device includes:
    根据所述目标设备的设备信息中的口令码,与所述配置设备建立基于UWB的配对连接。Establish a UWB-based pairing connection with the configuration device according to the password in the device information of the target device.
  14. 一种设备发现方法,其特征在于,所述方法由配置设备执行,所述方法包括:A device discovery method, characterized in that the method is executed by a configuration device, and the method includes:
    通过超宽带UWB方式向目标设备发送第一UWB标识信息,以便所述目标设备对所述第一UWB标识信息进行解析,获得所述配置设备的验证信息,根据所述验证信息,对所述目标设备的设备信息进行加密;Send the first UWB identification information to the target device in the ultra-wideband UWB mode, so that the target device parses the first UWB identification information, obtains the verification information of the configuration device, and performs verification on the target device based on the verification information. The device information of the device is encrypted;
    通过UWB方式接收所述目标设备发送的加密后的所述设备信息;Receive the encrypted device information sent by the target device through UWB;
    对加密后的所述设备信息进行解密,获得所述目标设备的设备信息。Decrypt the encrypted device information to obtain the device information of the target device.
  15. 根据权利要求14所述的方法,其特征在于,所述方法还包括:The method of claim 14, further comprising:
    根据所述目标设备的设备信息,与所述目标设备建立配对连接。Establish a pairing connection with the target device according to the device information of the target device.
  16. 根据权利要求15所述的方法,其特征在于,所述根据所述目标设备的设备信息,与所述目标设备建立配对连接,包括:The method according to claim 15, wherein establishing a pairing connection with the target device according to the device information of the target device includes:
    根据所述目标设备的设备信息中的口令码,与所述目标设备建立基于UWB的配对连接。Establish a UWB-based pairing connection with the target device according to the password in the device information of the target device.
  17. 根据权利要求14至16任一所述的方法,其特征在于,所述通过超宽带UWB方式向目标设备发送第一UWB标识信息之前,还包括:The method according to any one of claims 14 to 16, characterized in that before sending the first UWB identification information to the target device through ultra-wideband UWB, it further includes:
    获取与所述目标设备之间的第三UWB测量信息;Obtain third UWB measurement information with the target device;
    当所述第三UWB测量信息满足第三条件时,确定定位到所述目标设备。When the third UWB measurement information satisfies the third condition, it is determined that the target device is located.
  18. 根据权利要求17所述的方法,其特征在于,所述第三UWB测量信息包括第三角度信息、第三距离信息以及第三信号强度信息中的至少一种。The method of claim 17, wherein the third UWB measurement information includes at least one of third angle information, third distance information, and third signal strength information.
  19. 根据权利要求18所述的方法,其特征在于,所述第三条件包括以下条件中的至少一项:The method of claim 18, wherein the third condition includes at least one of the following conditions:
    当所述第三UWB测量信息包括所述第三角度信息时,所述第三角度信息指示的角度处于第三角度区间内;When the third UWB measurement information includes the third angle information, the angle indicated by the third angle information is within a third angle interval;
    当所述第三UWB测量信息包括所述第三距离信息时,所述第三距离信息指示的距离处于第三距离区间内;When the third UWB measurement information includes the third distance information, the distance indicated by the third distance information is within a third distance interval;
    当所述第三UWB测量信息包括所述第三信号强度信息时,所述第三信号强度信息指示的信号强度处于第三信号强度区间内。When the third UWB measurement information includes the third signal strength information, the signal strength indicated by the third signal strength information is within a third signal strength interval.
  20. 根据权利要求14至19任一所述的方法,其特征在于,所述通过UWB方式接收所述目标设备发送的加密后的所述设备信息之前,还包括:The method according to any one of claims 14 to 19, characterized in that before receiving the encrypted device information sent by the target device through UWB, it further includes:
    通过UWB方式获取所述目标设备的第二UWB标识信息;Obtain the second UWB identification information of the target device through UWB mode;
    对所述第二UWB标识信息进行解析,获得所述目标设备的验证信息;所述验证信息中包含角色信息;Parse the second UWB identification information to obtain verification information of the target device; the verification information includes role information;
    所述通过UWB方式接收所述目标设备发送的加密后的所述设备信息,包括:The receiving the encrypted device information sent by the target device through UWB means includes:
    当所述目标设备的角色信息指示所述目标设备的角色为物联网设备时,通过UWB方式接收所述目标设备发送的加密后的所述设备信息。When the role information of the target device indicates that the role of the target device is an Internet of Things device, the encrypted device information sent by the target device is received in a UWB manner.
  21. 一种设备发现装置,其特征在于,所述装置包括:A device discovery device, characterized in that the device includes:
    接收模块,用于通过超宽带UWB方式获取配置设备的第一UWB标识信息;A receiving module, configured to obtain the first UWB identification information of the configured device through ultra-wideband UWB;
    解析模块,用于对所述第一UWB标识信息进行解析,获得所述配置设备的验证信息;A parsing module, configured to parse the first UWB identification information and obtain verification information of the configuration device;
    加密模块,用于根据所述验证信息,对所述目标设备的设备信息进行加密;An encryption module, configured to encrypt the device information of the target device according to the verification information;
    发送模块,用于通过UWB方式向所述配置设备发送加密后的所述设备信息。A sending module, configured to send the encrypted device information to the configuration device through UWB.
  22. 根据权利要求21所述的装置,其特征在于,所述验证信息包括身份标识信息。The device according to claim 21, wherein the verification information includes identity identification information.
  23. 根据权利要求22所述的装置,其特征在于,所述加密模块,用于,The device according to claim 22, characterized in that the encryption module is used to:
    根据所述配置设备的身份标识信息生成加密密钥;Generate an encryption key according to the identity identification information of the configuration device;
    根据所述加密密钥,对所述目标设备的设备信息进行加密。Device information of the target device is encrypted according to the encryption key.
  24. 根据权利要求21至23任一所述的装置,其特征在于,所述验证信息还包括角色信息;The device according to any one of claims 21 to 23, wherein the verification information further includes role information;
    所述加密模块,用于当所述配置设备的角色信息指示所述配置设备的角色为配置器时,根据所述验证信息,对所述目标设备的设备信息进行加密。The encryption module is configured to encrypt the device information of the target device according to the verification information when the role information of the configuration device indicates that the role of the configuration device is a configurator.
  25. 根据权利要求21至24任一所述的装置,其特征在于,所述加密模块,用于,The device according to any one of claims 21 to 24, characterized in that the encryption module is used to:
    获取与所述配置设备之间的第一UWB测量信息;Obtain first UWB measurement information with the configuration device;
    当所述第一UWB测量信息满足第一条件时,根据所述验证信息,对所述目标设备的设备信息进行加密。When the first UWB measurement information meets the first condition, the device information of the target device is encrypted according to the verification information.
  26. 根据权利要求25所述的装置,其特征在于,所述第一UWB测量信息包括第一角度信息、第一距离信息以及第一信号强度信息中的至少一种。The device according to claim 25, wherein the first UWB measurement information includes at least one of first angle information, first distance information and first signal strength information.
  27. 根据权利要求26所述的装置,其特征在于,所述第一条件包括以下条件中的至少一项:The device according to claim 26, wherein the first condition includes at least one of the following conditions:
    当所述第一UWB测量信息包括所述第一角度信息时,所述第一角度信息指示的角度处于第一角度区间内;When the first UWB measurement information includes the first angle information, the angle indicated by the first angle information is within the first angle interval;
    当所述第一UWB测量信息包括所述第一距离信息时,所述第一距离信息指示的距离处于第一距离区间内;When the first UWB measurement information includes the first distance information, the distance indicated by the first distance information is within a first distance interval;
    当所述第一UWB测量信息包括所述第一信号强度信息时,所述第一信号强度信息指示的信号强度处于第一信号强度区间内。When the first UWB measurement information includes the first signal strength information, the signal strength indicated by the first signal strength information is within a first signal strength interval.
  28. 根据权利要求21至27任一所述的装置,其特征在于,所述装置还包括:The device according to any one of claims 21 to 27, characterized in that the device further includes:
    测量信息获取模块,用于在所述接收模块通过超宽带UWB方式获取配置设备的第一UWB标识信息之前,获取与所述配置设备之间的第二UWB测量信息;A measurement information acquisition module, configured to acquire the second UWB measurement information with the configuration device before the receiving module acquires the first UWB identification information of the configuration device through ultra-wideband UWB;
    定位模块,用于当所述第二UWB测量信息满足第二条件时,确定定位到所述配置设备。A positioning module, configured to determine to locate the configuration device when the second UWB measurement information satisfies the second condition.
  29. 根据权利要求28所述的装置,其特征在于,所述第二UWB测量信息包括第二角度信息、第二距离信息以及第二信号强度信息中的至少一种。The device of claim 28, wherein the second UWB measurement information includes at least one of second angle information, second distance information, and second signal strength information.
  30. 根据权利要求29所述的装置,其特征在于,所述第二条件包括以下条件中的至少一项:The device according to claim 29, wherein the second condition includes at least one of the following conditions:
    当所述第二UWB测量信息包括所述第二角度信息时,所述第二角度信息指示的角度处于第二角度区间内;When the second UWB measurement information includes the second angle information, the angle indicated by the second angle information is within the second angle interval;
    当所述第二UWB测量信息包括所述第二距离信息时,所述第二距离信息指示的距离处于第二距离区间内;When the second UWB measurement information includes the second distance information, the distance indicated by the second distance information is within the second distance interval;
    当所述第二UWB测量信息包括所述第二信号强度信息时,所述第二信号强度信息指示的信号强度处于第二信号强度区间内。When the second UWB measurement information includes the second signal strength information, the signal strength indicated by the second signal strength information is within a second signal strength interval.
  31. 根据权利要求21至30任一所述的装置,其特征在于,所述装置还包括:The device according to any one of claims 21 to 30, characterized in that the device further includes:
    标签生成模块,用于根据所述目标设备的验证信息,生成所述目标设备的第二UWB标识信息。A label generation module, configured to generate second UWB identification information of the target device according to the verification information of the target device.
  32. 根据权利要求21至31任一所述的装置,其特征在于,所述装置还包括:The device according to any one of claims 21 to 31, characterized in that the device further includes:
    配对模块,用于根据所述目标设备的设备信息,与所述配置设备建立配对连接。A pairing module, configured to establish a pairing connection with the configuration device according to the device information of the target device.
  33. 根据权利要求32所述的装置,其特征在于,所述配对模块,用于根据所述目标设备的设备信息中的口令码,与所述配置设备建立基于UWB的配对连接。The device according to claim 32, wherein the pairing module is configured to establish a UWB-based pairing connection with the configuration device according to the password in the device information of the target device.
  34. 一种设备发现装置,其特征在于,所述装置包括:A device discovery device, characterized in that the device includes:
    发送模块,用于通过超宽带UWB方式向目标设备发送第一UWB标识信息,以便所述目标设备对所述第一UWB标识信息进行解析,获得所述配置设备的验证信息,根据所述验证信息,对所述目标设备的设备信息进行加密;A sending module configured to send the first UWB identification information to the target device in an ultra-wideband UWB manner, so that the target device can parse the first UWB identification information and obtain verification information of the configuration device. According to the verification information , encrypt the device information of the target device;
    接收模块,用于通过UWB方式接收所述目标设备发送的加密后的所述设备信息;A receiving module, configured to receive the encrypted device information sent by the target device through UWB;
    解密模块,用于对加密后的所述设备信息进行解密,获得所述目标设备的设备信息。A decryption module, configured to decrypt the encrypted device information and obtain the device information of the target device.
  35. 根据权利要求34所述的装置,其特征在于,所述装置还包括:The device of claim 34, further comprising:
    配对模块,用于根据所述目标设备的设备信息,与所述目标设备建立配对连接。A pairing module, configured to establish a pairing connection with the target device according to the device information of the target device.
  36. 根据权利要求35所述的装置,其特征在于,所述配对模块,用于根据所述目标设备的设备信息中的口令码,与所述目标设备建立基于UWB的配对连接。The device according to claim 35, wherein the pairing module is configured to establish a UWB-based pairing connection with the target device according to the password in the device information of the target device.
  37. 根据权利要求34至36任一所述的装置,其特征在于,所述装置还包括:The device according to any one of claims 34 to 36, characterized in that the device further includes:
    测量信息获取模块,用于在所述发送模块通过超宽带UWB方式向目标设备发送第一UWB标识信息之前,获取与所述目标设备之间的第三UWB测量信息;A measurement information acquisition module, configured to acquire third UWB measurement information with the target device before the sending module sends the first UWB identification information to the target device in an ultra-wideband UWB manner;
    定位模块,用于当所述第三UWB测量信息满足第三条件时,确定定位到所述目标设备。A positioning module, configured to determine to locate the target device when the third UWB measurement information satisfies a third condition.
  38. 根据权利要求37所述的装置,其特征在于,所述第三UWB测量信息包括第三角度信息、第三距离信息以及第三信号强度信息中的至少一种。The device of claim 37, wherein the third UWB measurement information includes at least one of third angle information, third distance information, and third signal strength information.
  39. 根据权利要求38所述的装置,其特征在于,所述第三条件包括以下条件中的至少一项:The device according to claim 38, characterized in that the third condition includes at least one of the following conditions:
    当所述第三UWB测量信息包括所述第三角度信息时,所述第三角度信息指示的角度处于第三角度区间内;When the third UWB measurement information includes the third angle information, the angle indicated by the third angle information is within a third angle interval;
    当所述第三UWB测量信息包括所述第三距离信息时,所述第三距离信息指示的距离处于第三距离区间内;When the third UWB measurement information includes the third distance information, the distance indicated by the third distance information is within a third distance interval;
    当所述第三UWB测量信息包括所述第三信号强度信息时,所述第三信号强度信息指示的信号强度处于第三信号强度区间内。When the third UWB measurement information includes the third signal strength information, the signal strength indicated by the third signal strength information is within a third signal strength interval.
  40. 根据权利要求34至39任一所述的装置,其特征在于,The device according to any one of claims 34 to 39, characterized in that,
    所述接收模块,还用于在通过UWB方式接收所述目标设备发送的加密后的所述设备信息之前,通过UWB方式获取所述目标设备的第二UWB标识信息;The receiving module is further configured to obtain the second UWB identification information of the target device through UWB before receiving the encrypted device information sent by the target device through UWB;
    所述装置还包括:The device also includes:
    解析模块,用于对所述第二UWB标识信息进行解析,获得所述目标设备的验证信息;所述验证信息中包括角色信息;A parsing module, configured to parse the second UWB identification information and obtain verification information of the target device; the verification information includes role information;
    所述接收模块,用于当所述目标设备的角色信息指示所述目标设备的角色为物联网设备时,通过UWB方式接收所述目标设备发送的加密后的所述设备信息。The receiving module is configured to receive the encrypted device information sent by the target device in a UWB manner when the role information of the target device indicates that the role of the target device is an Internet of Things device.
  41. 一种计算机设备,其特征在于,所述计算机设备包括处理器、存储器和收发器;A computer device, characterized in that the computer device includes a processor, a memory and a transceiver;
    所述存储器中存储有计算机程序,所述处理器执行所述计算机程序,以使得所述计算机设备实现如上述权利要求1至20任一所示的设备发现方法。A computer program is stored in the memory, and the processor executes the computer program, so that the computer device implements the device discovery method as shown in any one of the above claims 1 to 20.
  42. 一种计算机可读存储介质,其特征在于,所述存储介质中存储有计算机程序,所述计算机程序用于被处理器执行,以实现如权利要求1至20任一所示的设备发现方法。A computer-readable storage medium, characterized in that a computer program is stored in the storage medium, and the computer program is used to be executed by a processor to implement the device discovery method as shown in any one of claims 1 to 20.
  43. 一种芯片,其特征在于,所述芯片用于在计算机设备中运行,以使得所述计算机设备执行如权利要求1至20任一所示的设备发现方法。A chip, characterized in that the chip is used to run in a computer device, so that the computer device executes the device discovery method shown in any one of claims 1 to 20.
  44. 一种计算机程序产品,其特征在于,所述计算机程序产品包括计算机指令,所述计算机指令存储在计算机可读存储介质中;计算机设备的处理器从所述计算机可读存储介质读取所述计算机指令,并执行所述计算机指令,使得所述计算机设备执行如权利要求1至20任一所示的设备发现方法。A computer program product, characterized in that the computer program product includes computer instructions, and the computer instructions are stored in a computer-readable storage medium; and a processor of a computer device reads the computer instructions from the computer-readable storage medium. instructions, and execute the computer instructions, so that the computer device executes the device discovery method as shown in any one of claims 1 to 20.
  45. 一种计算机程序,其特征在于,所述计算机程序由计算机设备的处理器执行,以实现如权利要求1至20任一所示的设备发现方法。A computer program, characterized in that the computer program is executed by a processor of a computer device to implement the device discovery method as shown in any one of claims 1 to 20.
PCT/CN2022/081467 2022-03-17 2022-03-17 Device discovery method and apparatus, device, storage medium, and program product WO2023173365A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/081467 WO2023173365A1 (en) 2022-03-17 2022-03-17 Device discovery method and apparatus, device, storage medium, and program product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/081467 WO2023173365A1 (en) 2022-03-17 2022-03-17 Device discovery method and apparatus, device, storage medium, and program product

Publications (1)

Publication Number Publication Date
WO2023173365A1 true WO2023173365A1 (en) 2023-09-21

Family

ID=88021939

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/081467 WO2023173365A1 (en) 2022-03-17 2022-03-17 Device discovery method and apparatus, device, storage medium, and program product

Country Status (1)

Country Link
WO (1) WO2023173365A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104735813A (en) * 2015-03-10 2015-06-24 小米科技有限责任公司 Network connection establishment method and device
CN105046126A (en) * 2015-05-21 2015-11-11 努比亚技术有限公司 Encryption method and electronic apparatus
US20160269185A1 (en) * 2015-03-13 2016-09-15 Intel IP Corporation Systems, methods, and devices for secure device-to-device discovery and communication
CN110708170A (en) * 2019-12-13 2020-01-17 腾讯科技(深圳)有限公司 Data processing method and device and computer readable storage medium
US20210014848A1 (en) * 2019-10-04 2021-01-14 Alexei Davydov Ue configured for joint activation of tci states and spatial relation info on multiple component carriers

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104735813A (en) * 2015-03-10 2015-06-24 小米科技有限责任公司 Network connection establishment method and device
US20160269185A1 (en) * 2015-03-13 2016-09-15 Intel IP Corporation Systems, methods, and devices for secure device-to-device discovery and communication
CN105046126A (en) * 2015-05-21 2015-11-11 努比亚技术有限公司 Encryption method and electronic apparatus
US20210014848A1 (en) * 2019-10-04 2021-01-14 Alexei Davydov Ue configured for joint activation of tci states and spatial relation info on multiple component carriers
CN110708170A (en) * 2019-12-13 2020-01-17 腾讯科技(深圳)有限公司 Data processing method and device and computer readable storage medium

Similar Documents

Publication Publication Date Title
US11626974B2 (en) System and method for securely configuring a new device with network credentials
US10721208B2 (en) System and method for automatic wireless network authentication in an internet of things (IOT) system
US20240155531A1 (en) Method and apparatus for registering wireless device in wireless communication system
US11855839B2 (en) System and method for pre-enrollment and network pre-configuration of internet of things (IoT) devices
CN110235456B (en) Intelligent device network access method, mobile terminal, cloud server, device and system
US9596603B2 (en) Distributed bulk onboarding process
US9521642B2 (en) Configuration of a new enrollee device for use in a communication network
KR102524542B1 (en) Systems and methods for automatic wireless network authentication
KR102537363B1 (en) Systems and methods for secure Internet of Things (IoT) device provisioning
US10951592B2 (en) Secure wireless communication between controllers and accessories
US10779296B2 (en) System and method for intelligent communication channel selection for an internet of things (IoT) device
CN107483715A (en) The method and system of terminal and equipment communication, terminal, storage medium
WO2015143847A1 (en) Authentication and authorization method and apparatus for wireless network and program
US20230362642A1 (en) Device provisioning
WO2023173365A1 (en) Device discovery method and apparatus, device, storage medium, and program product
WO2023225233A1 (en) System and method for iot device identification and initialization using bluetooth advertising channels
WO2023224766A1 (en) System and method for machine learning (ml)-based iot device provisioning
McPherson et al. Using smartphones to enable low-cost secure consumer IoT devices
WO2023173366A1 (en) Device discovery method and apparatus, and device, storage medium and program product
US20230283994A1 (en) Automatic Control Method, Electronic Device, and Computer-Readable Storage Medium
WO2022042170A1 (en) Iot device and authorization method therefor
WO2021208027A1 (en) Bidirectional authentication method and device for network access
US11606199B2 (en) Management of groups of connected objects using wireless communication protocols
WO2023184560A1 (en) Device sharing method and apparatus, device, storage medium, and program product
Ise et al. Design and implementation of home network protocol for appliance control based on IEEE 802.15. 4

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22931400

Country of ref document: EP

Kind code of ref document: A1