CN119201246A - Wireless communication terminal management method, system, electronic device and storage medium - Google Patents
Wireless communication terminal management method, system, electronic device and storage medium Download PDFInfo
- Publication number
- CN119201246A CN119201246A CN202411275271.8A CN202411275271A CN119201246A CN 119201246 A CN119201246 A CN 119201246A CN 202411275271 A CN202411275271 A CN 202411275271A CN 119201246 A CN119201246 A CN 119201246A
- Authority
- CN
- China
- Prior art keywords
- information
- wireless communication
- communication terminal
- integrity check
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4411—Configuring for operating with peripheral devices; Loading of device drivers
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application provides a management method, a management system, electronic equipment and a storage medium of a wireless communication terminal. The method is used for managing a plurality of wireless communication terminals, each wireless communication terminal in the plurality of wireless communication terminals is provided with a background management system, the background management system is used for determining an operating system of the corresponding wireless communication terminal and calling a library function corresponding to the operating system according to the determined operating system so as to be compatible with the operating system, the method comprises the steps of sending request information to a target wireless communication terminal in the plurality of wireless communication terminals, using the target background management system to execute operation corresponding to the request information on the target wireless communication terminal, wherein the target background management system is the background management system configured by the target wireless communication terminal, receiving feedback information from the target wireless communication terminal, and displaying at least part of information in the feedback information. The method is helpful for improving the management efficiency of a plurality of wireless communication terminals.
Description
Technical Field
The present application relates to the field of device management technologies, and in particular, to a method and a system for managing a wireless communication terminal, an electronic device, and a storage medium.
Background
With the rapid development of wireless communication technology, wireless communication terminals are widely visible, such as household wireless routers, roadside wireless street lamps, vehicle-mounted wireless communication terminals, wireless gateways for companies and units, wireless cameras and various industrial wireless routers, 5G/4G/3G high-speed cellular mobile communication equipment, CAT1/NB-IOT low-speed Internet of things terminal equipment and the like.
In the related art, each wireless communication terminal is self-organized and has a respective management system, so that when a user manages the wireless communication terminals, the user usually needs to operate by using the respective management system, the operation is complex, the operation efficiency of managing a plurality of wireless communication terminals by the user is greatly influenced, and the use experience of the user is reduced.
Disclosure of Invention
The present application has been made in view of the above-described problems. According to one aspect of the application, a management method of a wireless communication terminal is provided, and is used for managing a plurality of wireless communication terminals, each wireless communication terminal in the plurality of wireless communication terminals is provided with a background management system, the background management system is used for determining an operating system of the corresponding wireless communication terminal and calling a library function corresponding to the operating system according to the determined operating system so as to be compatible with the operating system, the method comprises the steps of sending request information to a target wireless communication terminal in the plurality of wireless communication terminals to execute operation corresponding to the request information on the target wireless communication terminal by utilizing a target background management system, wherein the target background management system is a background management system configured by the target wireless communication terminal, receiving feedback information from the target wireless communication terminal, and displaying at least part of the feedback information.
The method for sending the request information to the target wireless communication terminal in the plurality of wireless communication terminals comprises the steps of sending the request information to the target wireless communication terminal to obtain equipment information of the target wireless communication terminal by using a target background management system, wherein at least part of the information is the equipment information.
The method includes the steps of sending configuration request information to a target wireless communication terminal to configure parameters of the target wireless communication terminal by using a target background management system, wherein the target background management system configures the parameters of the target wireless communication terminal based on the configuration request information, and the at least part of information is configuration state information or device information of the target wireless communication terminal after configuration is completed.
The method further comprises the steps of responding to instructions of a user, generating initial instruction information, carrying out integrity check on the initial instruction information to generate first integrity check information, packaging the initial instruction information and the first integrity check information by using a first preset message head, and carrying out encryption processing on the packaged information to generate the request information.
The method further comprises the steps of decrypting the feedback information to obtain decrypted feedback information, judging whether the message header of the decrypted feedback information is a second preset message header or not, and carrying out integrity check on the feedback information to obtain an integrity check result, wherein at least part of information in the feedback information is displayed when the message header of the decrypted feedback information is the second preset message header, and the integrity check result is executed when the feedback information is complete, and the at least part of information comprises the return information.
Illustratively, the step of performing integrity check on the returned information to obtain an integrity check result is performed when the message header of the decrypted feedback information is the second preset message header.
The decrypted feedback information further comprises second integrity check information, the integrity check of the return information is carried out to obtain an integrity check result, the integrity check of the return information is carried out to generate third integrity check information, the third integrity check information is compared with the second integrity check information to obtain the integrity check result, and when the third integrity check information is the same as the second integrity check information, the integrity check result is that the return information is complete, otherwise, the integrity check result is that the return information is incomplete.
According to another aspect of the present application, there is provided a management system for a wireless communication terminal, including a control terminal and a plurality of wireless communication terminals, where the control terminal is connected to the plurality of wireless communication terminals by way of wireless communication, respectively, and the control terminal is configured to execute the method of any one of the foregoing embodiments.
According to a further aspect of the application there is provided an electronic device comprising a processor and a memory, the memory having stored therein a computer program, the processor being adapted to execute the computer program to implement the method as described above.
According to a further aspect of the application there is provided a computer readable storage medium storing a computer program/instruction which when executed by a processor performs the above method.
According to the technical scheme, the request information can be sent to the target wireless communication terminal in the plurality of wireless communication terminals, so that the target background management system is utilized to execute the operation corresponding to the request information on the target wireless communication terminal, and therefore, a user can realize unified management on different wireless communication terminals by sending the corresponding request information to each wireless communication terminal. Meanwhile, the background management system can be compatible with different wireless communication terminals by calling library functions corresponding to the operation systems through the background management system according to the determined operation systems, and the mode does not need to develop the management systems for each operation system, so that cost is saved, and unified management of different wireless communication terminals is realized. In a word, the method can realize unified management of various wireless communication terminals, is beneficial to reducing operation difficulty, improves management efficiency of users on the plurality of wireless communication terminals, and is beneficial to improving use experience of the users.
The foregoing description is only an overview of the present application, and is intended to be implemented in accordance with the teachings of the present application in order that the same may be more clearly understood and to make the same and other objects, features and advantages of the present application more readily apparent.
Drawings
The above and other objects, features and advantages of the present application will become more apparent from the following more particular description of embodiments of the present application, as illustrated in the accompanying drawings. The accompanying drawings are included to provide a further understanding of embodiments of the application and are incorporated in and constitute a part of this specification, illustrate the application and together with the embodiments of the application, and not constitute a limitation to the application. In the drawings, like reference numerals generally refer to like parts or steps.
Fig. 1 shows a schematic flow chart of a management method of a wireless communication terminal according to an embodiment of the present application;
Fig. 2 shows a schematic block diagram of an electronic device according to an embodiment of the application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, exemplary embodiments according to the present application will be described in detail with reference to the accompanying drawings. It should be apparent that the described embodiments are only some embodiments of the present application and not all embodiments of the present application, and it should be understood that the present application is not limited by the example embodiments described herein. Based on the embodiments of the application described in the present application, all other embodiments that a person skilled in the art would have without inventive effort shall fall within the scope of the application.
As described above, each wireless communication terminal is presently self-organizing, typically with a respective management system including, but not limited to Linux, android, vxWorks, ucOS/ucLinux, winCE, RTOS, NO OS, etc. Different management systems are different in use mode and management interfaces, some management systems of the wireless communication terminals are based on Linux development and require users to manage through WebUI user management interfaces of HTTP/HTTPS, some management systems of the wireless communication terminals are based on Android development and require users to manage through special APP, some management systems of the wireless communication terminals are embedded RTOS systems and require users to manage through UART serial ports, and some management systems of the wireless communication terminals require users to manage through special command lines CLI. The complexity of operation is increased due to the different operation modes, and even professional management staff can be bothered by the various management modes, so that the operation efficiency of the user for managing the plurality of wireless communication terminals is seriously affected, and the use experience of the user is reduced. In view of the above, the present application provides a method, a system, an electronic device, and a storage medium for managing a wireless communication terminal, where the method can implement unified management on multiple wireless communication terminals, and is helpful for reducing operation difficulty, improving management efficiency of a user on multiple wireless communication terminals, and further is helpful for improving use experience of the user. The method, system, electronic device and storage medium are described in detail below.
According to an aspect of an embodiment of the present application, there is provided a management method of a wireless communication terminal for managing a plurality of wireless communication terminals, each of the plurality of wireless communication terminals being configured with a background management system for determining an operating system of the corresponding wireless communication terminal and calling a library function corresponding to the operating system according to the determined operating system to be compatible with the operating system.
Herein, the wireless communication terminals include, but are not limited to, home wireless routers, roadside wireless street lamps, vehicle-mounted wireless communication terminals, wireless gateways for companies and units, wireless cameras and various industrial-grade wireless routers, 5G/4G/3G high-speed cellular mobile communication devices, CAT1/NB-IOT low-speed internet of things terminal devices, and the like. At least some of the plurality of wireless communication terminals have different operating systems.
In this example scheme, each wireless communication terminal is configured with a background management system. Those skilled in the art can understand the specific manner of configuring the background management system to each wireless communication terminal, for example, the development suite of the background management system may be provided to the development engineer of each wireless communication terminal, and after the Feature function macro configuration and the global dat data configuration, executable files are compiled and embedded into the wireless communication terminal to run in the background. Of course, other configurations may be adopted, and will not be described in detail.
In the solution of this example, the background management system may perform the operations of determining an operating system corresponding to the wireless communication terminal, and calling a library function corresponding to the operating system according to the determined operating system to be compatible with the operating system, where the steps may be performed after the background management is started. In a specific embodiment, the background management system may automatically detect the operating system information of the terminal software after being started. For example, whether the current OS is an operating system can be judged by determining whether the software operating system OS of the wireless communication terminal supports the MAC OS, linux, X86, RTOS, 32-bit, 64-bit and the like, and library functions corresponding to different operating system OS types can be respectively called according to lib library functions of the background management system after the operating system OS type is judged. Thus, the background management system can be compatible with the operating systems of different wireless communication terminals.
Alternatively, the background management system may be an SDK suite developed in the C language so as to be compatible with a platform system such as Linux/RTOS and many different wireless communication terminals.
In some embodiments, the background management system may monitor request information sent to the wireless communication terminal through the communication interface. For example, the background management system may initiate a communication interface detection process, the communication interface creates an ssl+tcp Socket interface, and binds the port 8899 (i.e., the port used by the wireless communication terminal to receive information).
Fig. 1 shows a schematic flow chart of a management method of a wireless communication terminal according to an embodiment of the present application. As shown in fig. 1, the method 100 may include the following steps S110, S120, and S130.
In step S110, request information is transmitted to a target wireless communication terminal of the plurality of wireless communication terminals, so as to perform an operation corresponding to the request information on the target wireless communication terminal by using a target background management system, wherein the target background management system is a background management system configured by the target wireless communication terminal.
Optionally, before transmitting the request information to the target wireless communication terminal among the plurality of wireless communication terminals, the method may further include determining the target wireless communication terminal among the plurality of wireless communication terminals in response to a selection operation of the user at step S110. In some embodiments, the apparatus for performing the method 100 has a display screen on which a name and/or ID number of each of the plurality of wireless communication terminals may be displayed on an interface (which may be referred to as a display interface) on which a user may select a target wireless communication terminal by clicking.
In the scheme of the present example, the request information may be transmitted to the target wireless communication terminal. The request information includes, but is not limited to, inquiry request information for inquiring device information of the target wireless communication terminal, and configuration request information for modifying parameters of the target wireless communication terminal.
In the solution of the present example, the target background management system may perform an operation corresponding to the request information on the target wireless communication terminal after receiving the request information. For example, the target background management system may perform a query operation when the request information is a query request information, and may perform a configuration operation when the request information is a configuration request information.
In step S120, feedback information from the target wireless communication terminal is received.
After the target background management system performs the operation corresponding to the request information, feedback information may be sent, where the feedback information is at least used to indicate the execution result of the operation. For example, when the request information is query request information, the feedback information may include a query result, and when the request information is configuration request information, the feedback information may include information indicating a result of configuration execution.
At step S130, at least part of the feedback information is displayed.
It will be appreciated that the feedback information may be encapsulated and/or encrypted, at least some of which is information in the feedback information corresponding to the request information. For example, when the request information is query request information, at least part of the information may be a query result (for example, device information described below).
After receiving the feedback information, at least part of the feedback information can be displayed, so that a user can know the operation execution condition in time or obtain information required by the user. In embodiments where the apparatus for performing the method 100 has a display screen, at least a portion of the information may be displayed on the display interface for viewing by a user.
According to the technical scheme, the request information can be sent to the target wireless communication terminal in the plurality of wireless communication terminals, so that the target background management system is utilized to execute the operation corresponding to the request information on the target wireless communication terminal, and therefore, a user can realize unified management on different wireless communication terminals by sending the corresponding request information to each wireless communication terminal. Meanwhile, the background management system can be compatible with different wireless communication terminals by calling library functions corresponding to the operation systems through the background management system according to the determined operation systems, and the mode does not need to develop the management systems for each operation system, so that cost is saved, and unified management of different wireless communication terminals is realized. In a word, the method can realize unified management of various wireless communication terminals, is beneficial to reducing operation difficulty, improves management efficiency of users on the plurality of wireless communication terminals, and is beneficial to improving use experience of the users.
The step S110 of sending the request information to the target wireless communication terminal in the plurality of wireless communication terminals to execute the operation corresponding to the request information on the target wireless communication terminal by using the target background management system may specifically include the steps of sending the query request information to the target wireless communication terminal to acquire the device information of the target wireless communication terminal by using the target background management system, wherein at least part of the information is the device information.
It is understood that the device information may include overall information of the target wireless communication terminal and information and configuration parameters of the respective hardware modules therein. Specifically, the device information may include operating system information, model, unique MAC address, unique Serial Number information, IMEI information of the target communication terminal, and basic information of each module in the target communication terminal, and for example, the basic information of each module may include basic information of hardware such as CPU, FLASH memory (FLASH) chip, DDR memory, etc., and may include, for example, model of CPU, usage rate of CPU, total capacity of FLASH memory, total capacity of memory, remaining memory capacity, remaining FLASH memory, etc. The information can help the user to know the basic condition of the target wireless communication terminal, so that the user can manage the target wireless communication terminal according to the actual condition.
In some embodiments, the target background management system may obtain device information of the target wireless communication terminal by traversing and reading hardware device information and interfaces in the target wireless communication terminal, starting the read hardware modules, such as WIFI/BLE/Modem, one by one, and reading Model number, unique MAC address, unique Serial Number information and IMEI information of the target wireless communication terminal.
The manner in which the target background management system obtains the device information is described below by means of a specific embodiment, it is to be understood that this embodiment is only for illustration, the device information is not limited to the description below, and the specific obtaining method may also be implemented by using a conventional technical means in the prior art, and is not repeated.
In one particular embodiment, the target background management system may detect hardware base information by:
For the CPU, when the operating system of the target wireless communication terminal is Linux/Android OS, the SDK code reading cpuinfo can be used for acquiring information such as multi-core multithreading, CPU model, main frequency and the like, and the example is as follows:
system type: MediaTek MT7621 ver:1 eco:3
machine: ATEL-ER100
processor: 4
cpu model: MIPS 1004Kc V2.15
BogoMIPS: 584.90
when the operating system of the target wireless communication terminal is an RTOS system, the CPU ID of the CPU register is read by using the SDK code to acquire the CPU model.
When the operating system of the TARGET wireless communication terminal is a commonly used MCU chip RTOS such as STM/ESP, CPU information can be read through a HAL library function customized by a chip vendor, for example, CONFIG_IDF_TARGET reads to value which is esp32C2 to represent the SOC CPU of Le Xin ESP 32-C2.
For Flash, when the operating system of the target wireless communication terminal is a Linux/Android OS, the SDK code is used for reading MTD DEVICE to obtain relevant information of Flash, or the relevant information of Flash is obtained through a Flash bottom layer driver, such as SPI-NAND: W25N512GWxxR/T is found in table, and when the operating system of the target wireless communication terminal is an RTOS system, relevant information of Flash is read through a read register or a HAL library function of a chip manufacturer.
For DDR memory, when the operating system of the target wireless communication terminal is Linux/Android OS, the DDR memory information can be obtained by utilizing SDK code reading meminfo, and the example is as follows:
MemTotal:123456 kB
MemFree:13220 kB
MemAvailable:59196 kB
When the operating system of the target wireless communication terminal is an RTOS system, a chip library function, such as espget_free_head_size (), is called to acquire DDR memory information.
For the WiFi device, when the operating system of the target wireless communication terminal is Linux/Android OS, detecting the WiFi device and the connection state, transmitting TX/RX messages, setting WiFi SSID/password/Channel/encryption modes, and the like by the following methods, so as to obtain information of the WiFi device module:
i. The general mainstream WIFI chip manufacturers mainly have high-pass and MediaTek, broadcom, realtek, ASR and the like through ioctl to call WiFi driven functions and methods, and library function methods of several mainstream chip manufacturers are directly integrated;
iw dev looks at WIFI devices;
iwconfig checks the connection state such as the WIFI transmission message;
iv i wwpriv stat/status to obtain or configure
v./proc/wlan0/stats, /proc/wlan0/sta_info
vi./proc/net/wireless
When the operating system of the target wireless communication terminal is an RTOS system, the information of the WiFi equipment module is obtained through library functions provided by a chip factory, such as espwifi set MODE (WIFI MODE AP) or espwifi set config (WIFI IF AP and WiFi config).
For BLE equipment, when the operating system of the target wireless communication terminal is a Linux OS, bluetooth adapter information is checked through hwinfor, SDK codes acquire Bluetooth equipment detailed information through hci_requirement, and when the operating system of the target wireless communication terminal is an RTOS system, bluetooth information reading and configuration, such as bt_controller_init(&bt_cfg),bluedroid_init(),ble_gap_start_advertising(&heart_rate_adv_params) and the like, are realized through common library functions.
For a 5G/4G/3G high-speed communication module, a USB/PCIE hardware interface is used to interface to obtain/dev/ttyUSB/ttyUSB 1/ttyUSB2 or/dev/ttyACM 0, or AT commands such as ATI may obtain information related to the cellular module, for example:
QuectelRG500QEARevision: RG500QEAAAR01A01M4G
Manufacturer: Altair Semiconductor
Model: ALT38XX
Revision: HN_02_01_08_00_63_LO
Manufacturer: Fibocom Wireless Inc.
Model: FG360-EAU
Revision: 81108.7000.00.08.01.14
SVN: 14
IMEI: 868866050216485
According to the technical scheme, the target background management system can be used for acquiring the equipment information of the target wireless communication terminal, and the equipment information of the target wireless communication terminal can help a user to know the basic condition of the target wireless communication terminal, so that the user can manage the target wireless communication terminal according to the actual condition. Meanwhile, the scheme is simple to operate, can facilitate the user to inquire the equipment information of different wireless communication terminal equipment, and is beneficial to improving the use experience of the user.
The step S110 of sending the request information to the target wireless communication terminal in the plurality of wireless communication terminals to execute the operation corresponding to the request information by using the target background management system may specifically include the steps of sending the configuration request information to the target wireless communication terminal to configure the parameters of the target wireless communication terminal by using the target background management system, wherein the target background management system configures the parameters of the target wireless communication terminal based on the configuration request information, and at least part of the information is configuration state information or device information of the target wireless communication terminal after the configuration is completed.
In the solution of this example, at least part of the information is configuration status information or device information of the target wireless communication terminal after completion of the configuration. The configuration status information may be used to indicate whether the configuration was successful.
As described above, the parameters of the target wireless communication terminal can be configured with the target background management system. Specifically, the target background management system may receive and process the configuration request information to implement parameter configuration for the target wireless communication terminal.
According to the technical scheme, the target background management system can be utilized to configure the parameters of the target wireless communication terminal, the configuration mode is simple to operate, the parameters of different wireless communication terminal equipment can be conveniently adjusted by a user, the management efficiency of the user on the wireless communication terminal equipment can be improved, and the use experience of the user can be improved.
Illustratively, before transmitting the request information to the target wireless communication terminal of the plurality of wireless communication terminals in step S110, the method may further include generating initial instruction information in response to an instruction of a user, performing integrity check on the initial instruction information to generate first integrity check information, encapsulating the initial instruction information and the first integrity check information with a first preset message header, and performing encryption processing on the encapsulated information to generate the request information.
In some embodiments, the initial instruction information may be first generated according to an instruction of the user. The initial quality information may include a message ID (MsgID) and a message content (MsgContent). The length of the message and the MD5 Checksum (MD 5 Checksum) may then be calculated to generate the first integrity check information. The initial instruction information and the first integrity check information may then be encapsulated with a first preset message header, which may be set as desired, for example, may be 0X7E. After the encapsulation is completed, the encapsulated information is encrypted to generate the request information. The manner of encryption may include, but is not limited to, encryption using a custom communication protocol and encryption using a particular encryption feature code.
In a specific embodiment, AES 256-bit encryption based on a unique feature code of the terminal device (i.e., the target wireless communication terminal) may be used to perform Key, so as to ensure the security of the transmission process. For example, based on the code of the AES-256-CBC-CTS encryption algorithm, the complementary bit string of PKCS5Padding is modified into a special string, and the first two offset characters of each block of 128bits are modified to become a nonstandard algorithm or a custom algorithm for encryption and decryption of front-end APP and background management software. For another example, the modified custom algorithm may be used for encryption and decryption based on a unique 32-bit hardware feature code HWID.
In another specific embodiment, SSL+TCP 8899 Port Socket communication can be also based, and custom Header 7 bytes and tail 1 checksum byte are added. This helps to further improve data transmission security.
In the scheme of the example, the target background management system can further execute the following operations before executing the operation corresponding to the request information, namely receiving the request information, decrypting the request information, carrying out integrity check on initial instruction information in the decrypted request information to determine the integrity of the initial instruction information, judging whether a message header in the decrypted request information is a first preset message header or not, wherein when the message header in the decrypted request information is the first preset message header and the initial instruction information is complete, the target background management system executes the operation corresponding to the request information.
In a specific embodiment, the target background management system can monitor the read request information through the communication interface, analyze specific request Data through the JSON library function after the APP request information is read, then execute corresponding operations according to the analysis MsgID and MsgContent after the user request Data is checked, generate return information after the operation is executed, and perform integrity check, encapsulation and encryption on the return information to obtain the feedback information. The specific process is similar to the process of carrying out integrity check, encapsulation and encryption on the initial instruction information, and is not repeated. In a specific embodiment, length may be calculated for MsgID and MsgContent of the return information, MD5 CHECKSUM is performed for the Length field and MsgID, msgContent to fill in the tail of the message, and 0X7E field is added to the head of the message, and the return information is obtained after encryption.
In the related art, when a wireless communication terminal is managed, data is generally transmitted in a plaintext transmission manner, so that security is poor, and privacy of a user may be revealed. According to the technical scheme, the initial instruction information is processed in the modes of integrity checking, packaging and encryption processing, so that the integrity of transmitted data can be guaranteed, the data is prevented from being tampered, the safety of data transmission is improved, and privacy leakage of users can be effectively prevented.
Optionally, before generating the initial instruction information in response to an instruction of the user, the method may further include establishing a communication link with the target wireless communication terminal. In a specific embodiment, an ssl+tcp Socket interface may be created and connected to the 8899 port of the target wireless communication terminal. A message handling function interface may also be created that may be used for encapsulation and integrity check operations in subsequent steps.
In some embodiments, after the communication link is established, a hash algorithm of Key can be made based on the unique feature code of the target wireless communication terminal, and an Authentication bidirectional access Authentication can be made by combining an SSL certificate, and the method specifically comprises the following steps:
1) Reading a unique feature code of the equipment terminal, namely attempting to read CPU CHIPID hardware feature codes, attempting to read DDR CHIPID hardware feature codes, attempting to read HARDWARE ID hardware feature codes, attempting to read hardware serial numbers, automatically generating a complement 32-bit random number if the hardware serial numbers are not read or are less than 32 bits, and storing the complement 32-bit random number in a ROM FLASH to serve as a hardware unique feature code HWID to generate encryption SSLKEY;
2) Bidirectional authentication when using self-contained X.509 certificates for access;
3) Receiving SSLKEY sent by the target wireless communication terminal after the two-way authentication negotiation is passed;
4) Utilizing a self-defined decryption algorithm to unlock SSLKEY, reading a unique hardware feature code HWID of an accurate equipment end, and encrypting the HWID again by utilizing the self-defined encryption algorithm to generate SSLKEY to be sent to a target wireless communication terminal;
5) And the target wireless communication terminal is disassembled SSLKEY to be compared with the own 32-bit HWID, and is accepted to be accessed after being consistent, otherwise, the target wireless communication terminal refuses to be accessed.
The method further includes decrypting the feedback information to obtain decrypted feedback information, the decrypted feedback information including the feedback information and a message header, determining whether the message header of the decrypted feedback information is a second preset message header, and performing integrity check on the feedback information to obtain an integrity check result, wherein at least part of the feedback information is displayed when the message header of the decrypted feedback information is the second preset message header and the integrity check result is that the feedback information is complete, and at least part of the feedback information includes the feedback information.
As described above, the target background management system may generate the return information after the operation is performed, and perform integrity check, encapsulation, and encryption on the return information to obtain the feedback information. In some embodiments, the target background management system may perform the operations of integrity checking the return information to generate second integrity check information, encapsulating the return information and the second integrity check information with a second preset message header, and encrypting the encapsulated information to generate feedback information.
Optionally, the step of determining whether the message header of the decrypted feedback information is the second preset message header and the step of performing integrity check on the feedback information may be performed simultaneously or sequentially, which is not limited in this example.
The technical scheme can accurately judge the integrity and the safety of the data through decryption processing, verification of the message header and integrity verification, in other words, the scheme is beneficial to improving the safety of data transmission and protecting the privacy of users.
Illustratively, the step of integrity checking the returned information to obtain an integrity check result is performed when the message header of the decrypted feedback information is a second predetermined message header.
In this exemplary scenario, it may be first determined whether the message header of the decrypted feedback information is a second preset message header, and then the integrity check is performed on the feedback information to obtain an integrity check result. Thus, redundant operation can be avoided, the operation efficiency is improved, and the management efficiency of the wireless communication terminal is further improved.
The decrypted feedback information further comprises second integrity check information, integrity check is conducted on the return information to obtain an integrity check result, the integrity check is conducted on the return information to generate third integrity check information, the third integrity check information is compared with the second integrity check information to obtain the integrity check result, and when the third integrity check information is identical with the second integrity check information, the integrity check result is that the return information is complete, otherwise, the integrity check result is that the return information is incomplete.
In the solution of this example, the two pieces of verification information may be compared to obtain an integrity verification result. The manner in which the second integrity check information is obtained is described in detail above and is not described in detail.
According to the technical scheme, the integrity check is respectively carried out when the data are sent and received, and the check information is compared, so that the data can be prevented from being lost or tampered, the data integrity is ensured, and the requirement of a user can be ensured to be accurately executed.
According to another aspect of the embodiment of the present application, there is provided a management system for a wireless communication terminal, where the management system includes a control terminal and a plurality of wireless communication terminals, the control terminal is connected to the plurality of wireless communication terminals by way of wireless communication, respectively, and the control terminal is configured to perform the method in any one of the foregoing embodiments.
In the related art, different wireless communication terminals are often managed by adopting different hardware interfaces, for example, some wireless communication terminals are connected to a computer end through a network Cable, a browser or a specially installed management tool is opened by the computer end to perform configuration, some wireless communication terminals are connected with a UART/CONSOL serial port through a plug-in pin type or an RJ45 network port type, a UART serial port driver is required to be installed on the computer, a serial port is opened through a serial port tool, commands are input in a mode of various command lines to obtain various desired technical bottom output results, some wireless communication terminals are connected with a small box and a Cable line through a special tool installed on the computer to perform management, some wireless communication terminals are connected with a USB port through a special tool installed on each chip manufacturer to perform management configuration, and a third party tool also has a License limit on the service time. In the solution of this example, the control end connects to the plurality of wireless communication terminals respectively by means of wireless communication, including but not limited to bluetooth, local area network, cellular network, etc. Thus, the unified management of the control end to a plurality of wireless communication terminals can be facilitated.
Optionally, the control end may be any device such as a desktop computer, a notebook computer, a tablet computer, a mobile phone, etc., and the front end APP may be installed in the device so as to perform the above method. The front-end APP can be developed by adopting the Google open-source application development framework Flutter language, a set of code library can be used for constructing exquisite multi-platform compatible applications, mobile phones, tablets and computers are supported, development is quick, flexible and efficient, modification is easy, and various scene applications can be met by matching with diversified plug-ins.
Alternatively, the control side may provide multilingual library support for use by different users.
It will be appreciated that the control end may have a display interface to enable the input of commands and the display of results.
Optionally, the background management system may include a hardware device management module, a software function management module, a communication interface API library, an identity authentication data encryption module, a general public function module, and a bottom hardware detection module, where the hardware detection includes WiFi, BLE, lora, GNSS, zigbee, MCU, 5G/4G/3G/Cat1/NB Modem, RS232/RS485, LCD, 9-Axis Sensor, and other common communication terminals, and the hardware detection module feeds back device information and status to the hardware management module, and then the software function management module disables and applies the hardware devices.
According to the technical scheme, the control end is connected with the plurality of wireless communication terminals, each wireless communication terminal is managed by the management method of the wireless communication terminal in the embodiment, the purpose of managing the plurality of wireless communication terminals by one device can be achieved, a user only needs to operate at one control end, management difficulty can be simplified, management efficiency is improved, and user experience is improved.
The following describes the operation of the management system of the wireless communication terminal, taking the target wireless communication terminal as a cellular module RG500Q as an example:
1) After the background management system SDK is started, the cellular module tries to detect, and discovers USB equipment with vendor=2c7c ProdID=0801 through looking at/sys/kernel/debug/USB/devices;
2) The background software sniffs the AT port communication, and finds out/dev/ttyUSB 2 to send an AT command and then obtains the OK accurate return;
3) The background software tries to acquire module information, sends an ATI command, and returns as follows:
QuectelRG500QEARevision: RG500QEAAAR01A01M4G
4) The background software tries to acquire a network interface, and views a wwan data port through an ifconfig;
5) The background hardware management module registers and stores the hardware information of the cellular module as follows:
a)Cellular Module: RG500QEA
b)Cellular Manufacture: Quectel
c)Cellular FW Revision:RG500QEAAAR01A01M4G
d)Cellular AT Interface: /dev/ttyUSB2
e)Cellular Data Interface: wwan0
6) The software management module acquires hardware module information and feeds the hardware module information back to the front-end APP through the communication interface, and the APP can display module manufacturers, models and software version numbers;
7) The software management module acquires other information of the cellular module through AT INTERFACE, such as networking state, networking mode (5G/4G/3G), operator name (CMCC/CMNET China Mobile, etc.), networking IP address/DNS address, networking Cell ID, frequency point, signal parameter RSRP/RSRQ/SINR/RSSI, etc., and feeds back to the user side APP through the communication interface for display and viewing;
8) The user terminal APP not ONLY can check module information and networking parameters, but also can set networking modes as 5G ONLY, networking Band, specific cell ID and the like, and the networking modes are set to the software management module through the communication interface, and after the software management module receives the information, the software management module sends a corresponding command to be set to the cellular module so as to enable the cellular module to work according to the user set parameters.
According to still another aspect of the embodiment of the present application, there is also provided an electronic device. Fig. 2 shows a schematic block diagram of an electronic device according to an embodiment of the application. As shown in fig. 2, the electronic device 200 includes a processor 210 and a memory 220. The memory 220 stores a computer program therein, and the processor 210 is configured to execute the computer program to implement the above-described method.
According to yet another aspect of an embodiment of the present application, there is also provided a computer-readable storage medium. The storage medium has stored therein a computer program/instruction which, when executed by a processor, performs the method described above. The storage medium may include, for example, read-only memory (ROM), erasable programmable read-only memory (EPROM), portable compact disc read-only memory (CD-ROM), USB memory, or any combination of the preceding. The computer-readable storage medium may be any combination of one or more computer-readable storage media.
The implementation structure, operating principle and advantageous effects of the management system, the electronic device and the computer-readable storage medium are easily understood by those of ordinary skill in the art by reading the above management method. For brevity, the description is omitted here.
Although the illustrative embodiments have been described herein with reference to the accompanying drawings, it is to be understood that the above illustrative embodiments are merely illustrative and are not intended to limit the scope of the present application thereto. Various changes and modifications may be made therein by one of ordinary skill in the art without departing from the scope and spirit of the application. All such changes and modifications are intended to be included within the scope of the present application as set forth in the appended claims.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described device embodiments are merely illustrative, e.g., the division of elements is merely a logical function division, and there may be additional divisions of actual implementation, e.g., multiple elements or components may be combined or integrated into another device, or some features may be omitted, or not performed.
In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the application may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in order to streamline the application and aid in understanding one or more of the various application aspects, various features of the application are sometimes grouped together in a single embodiment, figure, or description thereof in the description of exemplary embodiments of the application. This method of disclosure, however, is not to be interpreted as reflecting an intention that the claimed application requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this application.
It will be understood by those skilled in the art that all of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or units of any method or apparatus so disclosed, may be combined in any combination, except combinations where the features are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings), may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features but not others included in other embodiments, combinations of features of different embodiments are meant to be within the scope of the application and form different embodiments. For example, in the claims, any of the claimed embodiments may be used in any combination.
Various component embodiments of the application may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functionality of some of the modules in a management system, electronic device, according to embodiments of the application. The present application can also be implemented as an apparatus program (e.g., a computer program and a computer program product) for performing a portion or all of the methods described herein. Such a program embodying the present application may be stored on a computer readable medium, or may have the form of one or more signals. Such signals may be downloaded from an internet website, provided on a carrier signal, or provided in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the application, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The application may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The use of the words first, second, third, etc. do not denote any order. These words may be interpreted as names.
The foregoing description is merely illustrative of specific embodiments of the present application and the scope of the present application is not limited thereto, and any person skilled in the art can easily think about variations or substitutions within the scope of the present application. The protection scope of the application is subject to the protection scope of the claims.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202411275271.8A CN119201246A (en) | 2024-09-12 | 2024-09-12 | Wireless communication terminal management method, system, electronic device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202411275271.8A CN119201246A (en) | 2024-09-12 | 2024-09-12 | Wireless communication terminal management method, system, electronic device and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN119201246A true CN119201246A (en) | 2024-12-27 |
Family
ID=94076827
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202411275271.8A Pending CN119201246A (en) | 2024-09-12 | 2024-09-12 | Wireless communication terminal management method, system, electronic device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN119201246A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101699905A (en) * | 2009-10-30 | 2010-04-28 | 中兴通讯股份有限公司 | Wireless intelligent terminal, webmaster platform and management method by webmaster platform |
US20100278119A1 (en) * | 2009-04-30 | 2010-11-04 | Miodrag Potkonjak | User profile-based wireless device system level management |
CN102156648A (en) * | 2011-01-30 | 2011-08-17 | 中兴通讯股份有限公司 | Wireless communication terminal starting method and device |
CN106033381A (en) * | 2015-03-16 | 2016-10-19 | 阿里巴巴集团控股有限公司 | Method, device, and system for managing wireless terminal based on Wi-Fi |
CN108289110A (en) * | 2017-01-09 | 2018-07-17 | 阿里巴巴集团控股有限公司 | Equipment correlating method, device, terminal device and operating system |
-
2024
- 2024-09-12 CN CN202411275271.8A patent/CN119201246A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100278119A1 (en) * | 2009-04-30 | 2010-11-04 | Miodrag Potkonjak | User profile-based wireless device system level management |
CN102450037A (en) * | 2009-04-30 | 2012-05-09 | 卡伦茨技术有限公司 | User profile-based wireless device system level management |
CN101699905A (en) * | 2009-10-30 | 2010-04-28 | 中兴通讯股份有限公司 | Wireless intelligent terminal, webmaster platform and management method by webmaster platform |
CN102156648A (en) * | 2011-01-30 | 2011-08-17 | 中兴通讯股份有限公司 | Wireless communication terminal starting method and device |
CN106033381A (en) * | 2015-03-16 | 2016-10-19 | 阿里巴巴集团控股有限公司 | Method, device, and system for managing wireless terminal based on Wi-Fi |
CN108289110A (en) * | 2017-01-09 | 2018-07-17 | 阿里巴巴集团控股有限公司 | Equipment correlating method, device, terminal device and operating system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9585088B2 (en) | Wireless device registration, such as automatic registration of a Wi-Fi enabled device | |
CN107231627B (en) | Bluetooth network and network distribution method | |
US9031050B2 (en) | Using a mobile device to enable another device to connect to a wireless network | |
WO2017041675A1 (en) | Method for sending and acquiring wifi networking information and corresponding apparatus | |
CN103945369B (en) | A kind of length by checking WIFI packets realizes the Internet-surfing configuration method of WIFI equipment | |
CN103458057B (en) | Resource acquiring method, device and server | |
US20060149858A1 (en) | Establishing wireless universal serial bus (WUSB) connection via a trusted medium | |
KR20140068240A (en) | Automatic configuration of a wireless device | |
CN109831775B (en) | Processor, baseband chip and SIM card information transmission method | |
WO2020054478A1 (en) | Communication device, communication device control method, and program | |
CN107948170A (en) | Interface requests parameter encryption method, device, equipment and readable storage medium storing program for executing | |
JP2005229605A (en) | Extensible wireless frame work | |
JP2005117458A (en) | Radio connection system, radio connection control method, access point device and communication equipment | |
CN119201246A (en) | Wireless communication terminal management method, system, electronic device and storage medium | |
JP4856700B2 (en) | Establishing a wireless universal serial bus (WUSB) connection via a trusted medium | |
CN117750371A (en) | Wireless network access method, system and terminal equipment | |
Kayayurt et al. | End-to-end security implementation for mobile devices using TLS protocol | |
CN111786932A (en) | Account login method and device, electronic equipment and computer storage medium | |
CN114727268A (en) | A Bluetooth air interface data transmission method and system | |
CN114095221A (en) | Security verification method, device, equipment and storage medium | |
JP2004297711A (en) | Radio terminal, communication control program, and communication control method | |
WO2021208027A1 (en) | Bidirectional authentication method and device for network access | |
Rönty | Embedded Communication System for Crane Data Access | |
CN111163462A (en) | Network distribution method and related product | |
CN113904969B (en) | Performance testing methods for IoT devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |