Nothing Special   »   [go: up one dir, main page]

CN112866193A - Equipment deployment method, device, equipment and storage medium - Google Patents

Equipment deployment method, device, equipment and storage medium Download PDF

Info

Publication number
CN112866193A
CN112866193A CN202011615927.8A CN202011615927A CN112866193A CN 112866193 A CN112866193 A CN 112866193A CN 202011615927 A CN202011615927 A CN 202011615927A CN 112866193 A CN112866193 A CN 112866193A
Authority
CN
China
Prior art keywords
equipment
configuration
deployed
information
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011615927.8A
Other languages
Chinese (zh)
Inventor
田静伟
姚竞聪
郭宇飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Original Assignee
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Topsec Technology Co Ltd, Beijing Topsec Network Security Technology Co Ltd, Beijing Topsec Software Co Ltd filed Critical Beijing Topsec Technology Co Ltd
Priority to CN202011615927.8A priority Critical patent/CN112866193A/en
Publication of CN112866193A publication Critical patent/CN112866193A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1073Registration or de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the application provides a device deployment method, a device and a storage medium, wherein the device deployment method comprises the following steps: acquiring configuration information of equipment to be deployed; generating a URL link based on the configuration information, and sending the URL link to second equipment so that the second equipment sends a configuration request to the equipment to be deployed when receiving a preset operation instruction; receiving a registration request of the equipment to be deployed; and verifying and registering the equipment to be deployed based on the registration request. The method and the device improve the efficiency and accuracy of equipment deployment and reduce the deployment cost.

Description

Equipment deployment method, device, equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a device deployment method, apparatus, device, and storage medium.
Background
Under the large environment of the information age, network technology has been rapidly developed and has affected various industries. The huge network scale and the complex structure thereof also make the complexity of the connection equipment higher and higher, which directly promotes the difficulty of carrying out large-batch configuration, online and maintenance on the equipment. In the prior art, the opening deployment of the equipment can be completed by personnel with professional knowledge through complicated manual configuration and operation. Therefore, when the number of the devices to be deployed is large, the manual configuration efficiency is low, the labor cost is high, the error rate of the manual configuration is high, and the later maintenance is more a test and cost consumption for maintenance personnel.
Disclosure of Invention
An object of the embodiments of the present application is to provide a device deployment method, apparatus, device, and storage medium, so as to improve device deployment efficiency and accuracy, and reduce deployment cost.
A first aspect of an embodiment of the present application provides an apparatus deployment method, which is applied to a first apparatus, and includes: acquiring configuration information of equipment to be deployed; generating a URL link based on the configuration information, and sending the URL link to second equipment so that the second equipment sends a configuration request to the equipment to be deployed when receiving a preset operation instruction; receiving a registration request of the equipment to be deployed; and verifying and registering the equipment to be deployed based on the registration request.
In an embodiment, the generating a URL link based on the configuration information and sending the URL link to the second device includes: encrypting the configuration information by using a preset encryption algorithm to obtain encrypted information; generating a URL link to the encrypted information; and sending the URL link to the second device through a mail.
In an embodiment, the registering request includes device information, and the verifying and registering the device to be deployed based on the registering request includes: judging whether the equipment information is the same as the configuration information; when the equipment information is the same as the configuration information, judging whether the number of the current registered equipment is smaller than a preset threshold value; if the number of the current registered devices is smaller than a preset threshold value, registering the devices to be deployed; and if the number of the current registered equipment is not less than the preset threshold value, outputting a registration failure prompt.
A second aspect provides an apparatus deployment method, applied to an apparatus to be deployed, including: receiving a configuration request issued by the second equipment according to a preset operation instruction; acquiring configuration information for automatic configuration based on the configuration request; a registration request is sent to the first device.
In an embodiment, the configuration request includes encrypted information, and the obtaining configuration information for performing automatic configuration based on the configuration request includes: decrypting the encrypted information by using a preset decryption algorithm corresponding to a preset encryption algorithm to obtain configuration information; and calling a preset interface to import the configuration information.
In an embodiment, the receiving the configuration request issued by the second device according to the preset operation instruction includes: and storing the encrypted information to a preset file address.
In an embodiment, the obtaining configuration information for automatic configuration based on the configuration request includes: monitoring the preset file address; when the encrypted information is monitored to be stored in the preset file address, decrypting the encrypted information by using a preset decryption algorithm corresponding to the preset encryption algorithm to obtain configuration information; and calling a preset interface to import the configuration information.
In an embodiment, after the obtaining configuration information for automatic configuration based on the configuration request, the method further includes: and sending a configuration success prompt to the second equipment.
A third aspect of the embodiments of the present application provides an apparatus for deploying equipment, including: the acquisition module is used for acquiring the configuration information of the equipment to be deployed; the generating module is used for generating a URL link based on the configuration information and sending the URL link to the second equipment so that the second equipment sends a configuration request to the equipment to be deployed when receiving a preset operation instruction; a first receiving module, configured to receive a registration request of the device to be deployed; and the registration module is used for verifying and registering the equipment to be deployed based on the registration request.
In an embodiment, the generating module is specifically configured to: encrypting the configuration information by using a preset encryption algorithm to obtain encrypted information; generating a URL link to the encrypted information; and sending the URL link to the second device through a mail.
In an embodiment, the registration request includes device information, and the registration module is specifically configured to: judging whether the equipment information is the same as the configuration information; when the equipment information is the same as the configuration information, judging whether the number of the current registered equipment is smaller than a preset threshold value; if the number of the current registered devices is smaller than a preset threshold value, registering the devices to be deployed; and if the number of the current registered equipment is not less than the preset threshold value, outputting a registration failure prompt.
A fourth aspect of the present embodiment provides an apparatus for deploying equipment, including: the second receiving module is used for receiving a configuration request issued by the second equipment according to a preset operation instruction; the configuration module is used for acquiring configuration information to perform automatic configuration based on the configuration request; a sending module, configured to send a registration request to the first device.
In an embodiment, the configuration request includes encryption information, and the configuration module is specifically configured to: decrypting the encrypted information by using a preset decryption algorithm corresponding to a preset encryption algorithm to obtain configuration information; and calling a preset interface to import the configuration information.
In an embodiment, the configuration request includes encryption information, and the second receiving module is specifically configured to: and storing the encrypted information to a preset file address.
In an embodiment, the configuration module is specifically configured to: monitoring the preset file address; when the encrypted information is monitored to be stored in the preset file address, decrypting the encrypted information by using a preset decryption algorithm corresponding to the preset encryption algorithm to obtain configuration information; and calling a preset interface to import the configuration information.
In one embodiment, the method further comprises: and the prompt module is used for sending a configuration success prompt to the second equipment.
A fifth aspect of an embodiment of the present application provides an electronic device, including: a memory to store a computer program; a processor configured to perform the method of the first aspect of the embodiments of the present application and any of the embodiments of the present application.
A sixth aspect of the embodiments of the present application provides an electronic device, including: a memory to store a computer program; a processor configured to perform the method of the second aspect of the embodiments of the present application and any of the embodiments of the present application.
A seventh aspect of embodiments of the present application provides a non-transitory electronic device-readable storage medium, including: a program which, when run by an electronic device, causes the electronic device to perform the method of the first aspect of an embodiment of the present application and any embodiment thereof.
An eighth aspect of embodiments of the present application provides a non-transitory electronic device-readable storage medium, including: a program which, when run by an electronic device, causes the electronic device to perform the method of the second aspect of embodiments of the present application and any of the embodiments thereof.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and that those skilled in the art can also obtain other related drawings based on the drawings without inventive efforts.
Fig. 1 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an apparatus deployment system according to an embodiment of the present application;
fig. 3 is a schematic flowchart of an apparatus deployment method according to an embodiment of the present application;
fig. 4 is a schematic flowchart of an apparatus deployment method according to an embodiment of the present application;
fig. 5 is a schematic flowchart of an apparatus deployment method according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an apparatus deployment device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an apparatus deployment device according to an embodiment of the present application.
Reference numerals:
100-electronic device, 110-bus, 120-processor, 130-memory, 200-device deployment system, 210-first device, 220-second device, 230-device to be deployed, 600-device deployment apparatus, 610-acquisition module, 620-generation module, 630-first receiving module, 640-registration module, 700-device deployment apparatus, 710-second receiving module, 720-configuration module, 730-sending module, 740-prompting module.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
In the description of the present application, the terms "first," "second," and the like are used for distinguishing between descriptions and do not denote an order of magnitude, nor are they to be construed as indicating or implying relative importance.
In the description of the present application, the terms "comprises," "comprising," and/or the like, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, elements, components, and/or groups thereof.
In the description of the present application, the terms "mounted," "disposed," "provided," "connected," and "configured" are to be construed broadly unless expressly stated or limited otherwise. For example, it may be a fixed connection, a removable connection, or a unitary construction; can be mechanically or electrically connected; either directly or indirectly through intervening media, or may be internal to two devices, elements or components. The specific meaning of the above terms in the present application can be understood by those of ordinary skill in the art as appropriate.
Please refer to fig. 1, which is a schematic structural diagram of an electronic device 100 according to an embodiment of the present application, and includes at least one processor 120 and a memory 130, where fig. 1 illustrates one processor as an example. The processors 120 and the memory 130 are coupled by a bus 110, and the memory 130 stores instructions executable by the at least one processor 120, the instructions being executable by the at least one processor 120 to cause the at least one processor 120 to perform a device deployment method as in the embodiments described below.
In one embodiment, the Processor 120 may be a general-purpose Processor, including but not limited to a Central Processing Unit (CPU), a Network Processor (NP), etc., a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. The general purpose processor may be a microprocessor or the processor may be any conventional processor or the like, and the processor 120 is the control center of the electronic device 100 and connects the various parts of the entire electronic device 100 using various interfaces and lines. The processor 120 may implement or perform the methods, steps, and logic blocks disclosed in the embodiments of the present application.
In one embodiment, the Memory 130 may be implemented by any type of volatile or non-volatile Memory device or combination thereof, including but not limited to Random Access Memory (RAM), Read Only Memory (ROM), Static Random Access Memory (SRAM), Programmable Read-Only Memory (PROM), Erasable Read-Only Memory (EPROM), electrically Erasable Read-Only Memory (EEPROM), and the like.
The structure of the electronic device 100 shown in fig. 1 is merely illustrative, and the electronic device 100 may also include more or fewer components than shown in fig. 1, or have a different configuration than shown in fig. 1. The components shown in fig. 1 may be implemented in hardware, software, or a combination thereof.
As shown in fig. 2, which is a schematic structural diagram of an apparatus deployment system 200 according to an embodiment of the present application, the apparatus deployment system 200 includes: a first device 210, a second device 220, and at least one device to be deployed 230, where one device to be deployed 230 is taken as an example in fig. 2. The first device 210, the second device 220, and the device to be deployed 230 may be connected to each other by wire or wirelessly, and may perform data communication.
In an embodiment, the first device 210 has a human-computer interface, a user of the first device 210 may input configuration information, such as a device name, a device model, a device IP address, and a mail address, of the device to be deployed 230 through the human-computer interface, and the first device 210 may encrypt the configuration information to generate a URL link and send the URL link to a mailbox corresponding to the device to be deployed 230. Where a URL (Uniform Resource Locator) is an identification method used to completely describe the addresses of web pages and other resources on the Internet, the URL may be http:// beginning, and may include detailed information such as the hypertext (with the extension of. html or. xml) name. Using the URL, a specified file on the Internet can be located accurately.
In an embodiment, the second device 220 may be, but is not limited to, a portable mobile terminal such as a smart phone, a tablet computer, a notebook computer, and the like, and the user may click a URL link in the second device 220, and while the second device 220 pops up a Web page, the second device 220 may send encrypted configuration information to a 443 port of the device to be deployed 230 in the form of a URL request, where the 443 port is a Web browsing port, which is mainly used for HTTPS (Hypertext Transfer Protocol over secure Protocol) service and is another HTTP (Hypertext Transfer Protocol) that provides encryption and is transmitted through a secure port.
In an embodiment, the device to be deployed 230 may store the received configuration information in a configuration file (register.info file), and the device agent built in the device to be deployed 230 monitors the register.info file, may decrypt the file content, stores the decrypted configuration information, and starts a WSC (wide area network security controller) account call interface to import the decrypted configuration information into the device to be deployed 230. The device to be deployed 230 may return a configuration success prompt to the second device 220.
In an embodiment, the device to be deployed 230 may send a registration request to the first device 210 through the device agent, where the registration request includes device information of the device to be deployed 230, and the device information includes, but is not limited to, a device identifier, a device type, a device model, a device version, and the like. The first device 210 may verify the device to be deployed 230 based on the registration request, if the device to be deployed 230 meets the preset condition, the verification passes, the device to be deployed 230 is registered, and if the device to be deployed 230 does not meet the preset condition, the verification fails, and the registration of the device to be deployed 230 is rejected. In an embodiment, the device to be deployed 230 may include, but is not limited to: CPE (Customer Premise Equipment), GW (Gateway).
The first device 210, the second device 220, and the device to be deployed 230 in fig. 2 may all be implemented by the electronic device 100 in fig. 1.
As shown in fig. 3, which is a flowchart illustrating a device deployment method according to an embodiment of the present application, the method may be executed by the first device 210 shown in fig. 2, so as to improve efficiency and accuracy of device deployment and reduce deployment cost. The method comprises the following steps:
step 310: and acquiring configuration information of the equipment to be deployed.
In the above steps, the configuration information includes, but is not limited to, a device name, a device model, a device IP address, a mail address, and the like, and the user may configure a WAN (wide area network) through the human-computer interface of the first device 210, and directly input or select the device name, the device model, the device IP address, the mail address, and the like.
Step 320: and generating a URL link based on the configuration information, and sending the URL link to the second device.
In the above steps, the first device 210 generates a URL link, where the content of the URL link is configuration information, and sends the URL link to the second device 220, so that the second device 220 can send a configuration request to the device to be deployed 230 when receiving a preset operation instruction. In one embodiment, the predetermined operation command may be a user clicking a URL link.
In an embodiment, generating the URL link based on the configuration information and sending the URL link to the second device may include: encrypting the configuration information by using a preset encryption algorithm to obtain encrypted information; generating a URL link for the encrypted information; the URL link is sent to the second device by mail.
In the above step, the encryption information may be a cipher text in JSON format.
In an embodiment, the first device 210 may send the URL link to the second device 220 by email, or send the URL link to the second device 220 by short message or other instant messaging tools.
Step 330: a registration request of a device to be deployed is received.
In the above steps, the registration request carries the device information of the device to be deployed 230, including but not limited to the device identifier, the device type, the device model, the device version, and the like.
Step 340: and verifying and registering the equipment to be deployed based on the registration request.
In an embodiment, verifying and registering the device to be deployed based on the registration request may include: judging whether the equipment information is the same as the configuration information; when the equipment information is the same as the configuration information, judging whether the number of the current registered equipment is smaller than a preset threshold value; if the number of the current registered devices is smaller than a preset threshold value, registering the devices to be deployed; and if the number of the current registered equipment is not less than the preset threshold value, outputting a registration failure prompt.
As shown in fig. 4, which is a schematic flowchart of an apparatus deployment method according to an embodiment of the present application, the method may be executed by the apparatus to be deployed 230 shown in fig. 2, so as to improve efficiency and accuracy of apparatus deployment and reduce deployment cost. The method comprises the following steps:
step 410: and receiving a configuration request issued by the second equipment according to a preset operation instruction.
In the above steps, when receiving the preset operation instruction, the second device 220 may send a configuration request to the device to be deployed 230, where the configuration request includes encrypted information, and the encrypted information is configuration information encrypted by using a preset encryption algorithm. The 443 port of the device to be deployed receives the configuration request.
In an embodiment, the receiving the configuration request issued by the second device according to the preset operation instruction may include: and storing the encrypted information to a preset file address.
Step 420: and acquiring configuration information for automatic configuration based on the configuration request.
In an embodiment, obtaining the configuration information for automatic configuration based on the configuration request may include: decrypting the encrypted information by using a preset decryption algorithm corresponding to the preset encryption algorithm to obtain configuration information; and calling a preset interface to import the configuration information.
In an embodiment, obtaining the configuration information for automatic configuration based on the configuration request may include: monitoring a preset file address; when the preset file address is monitored to store the encrypted information, decrypting the encrypted information by using a preset decryption algorithm corresponding to the preset encryption algorithm to obtain configuration information; and calling a preset interface to import the configuration information.
In the above steps, the local address can be accessed through the POST request of HTTP/HTTPs, and the import of the configuration information is completed.
In an embodiment, after obtaining the configuration information for automatic configuration based on the configuration request, the method may further include: and sending a configuration success prompt to the second equipment.
In an embodiment, before obtaining the configuration information for automatic configuration based on the configuration request, the method may further include: and judging whether the equipment to be deployed is new equipment, and if not, initializing the equipment to be deployed according to an SSH (Secure Shell) protocol.
Step 430: a registration request is sent to the first device.
In the above steps, the registration request carries the device information of the device to be deployed 230, including but not limited to the device identifier, the device type, the device model, the device version, and the like.
As shown in fig. 5, which is a schematic flow diagram of an apparatus deployment method according to an embodiment of the present application, the method may be applied to the apparatus deployment system 200 shown in fig. 2 to improve efficiency and accuracy of apparatus deployment and reduce deployment cost. The method comprises the following steps:
step 501: the first device obtains configuration information of a device to be deployed.
Step 502: and the first equipment generates a URL link according to the configuration information and a preset encryption algorithm.
Step 503: the first device sends the URL link to the second device.
Step 504: and when the user clicks the URL connection, the second equipment pops up a Web page and sends a configuration request carrying the encrypted information to the equipment to be deployed.
Step 505: and the equipment to be deployed stores the encrypted information to a preset file address.
Step 506: and the equipment agent of the equipment to be deployed decrypts the encrypted information according to a preset decryption algorithm to obtain the configuration information.
Step 507: and the equipment agent calls a preset interface to import the configuration information.
Step 508: and the equipment to be deployed sends a configuration success prompt to the second equipment.
Step 509: and the equipment to be deployed sends a registration request to the first equipment through the equipment agent.
Step 510: and the first equipment carries out verification registration on the equipment to be deployed according to the registration request.
Compared with the existing ZTP (Zreo-Touch Provision) scheme, the method and the device simplify the deployment process, a user only needs to input configuration information in an interface of the first device, then uses the second device to click the URL link in the mailbox corresponding to the device to be deployed, a series of processes such as configuration information decryption, device configuration, device registration and the like can be automatically realized, the device deployment efficiency and accuracy are improved, the whole transmission process of the configuration information is encrypted, and the safety is guaranteed.
As shown in fig. 6, which is a schematic structural diagram of an apparatus deployment device 600 according to an embodiment of the present application, the apparatus is applicable to the first apparatus 210 shown in fig. 2, and includes: the device comprises an acquisition module 610, a generation module 620, a first receiving module 630 and a registration module 640. The principle relationship of the modules is as follows:
the obtaining module 610 is configured to obtain configuration information of a device to be deployed.
The generating module 620 is configured to generate a URL link based on the configuration information, and send the URL link to the second device, so that the second device sends a configuration request to the device to be deployed when receiving a preset operation instruction.
A first receiving module 630, configured to receive a registration request of a device to be deployed.
And the registration module 640 is configured to verify and register the device to be deployed based on the registration request.
In an embodiment, the generating module 620 is specifically configured to: encrypting the configuration information by using a preset encryption algorithm to obtain encrypted information; generating a URL link for the encrypted information; the URL link is sent to the second device by mail.
In an embodiment, the registration request includes device information, and the registration module 640 is specifically configured to: judging whether the equipment information is the same as the configuration information; when the equipment information is the same as the configuration information, judging whether the number of the current registered equipment is smaller than a preset threshold value; if the number of the current registered devices is smaller than a preset threshold value, registering the devices to be deployed; and if the number of the current registered equipment is not less than the preset threshold value, outputting a registration failure prompt.
For a detailed description of the device deployment apparatus 600, please refer to the description of the related method steps in the above embodiments.
As shown in fig. 7, which is a schematic structural diagram of an apparatus deployment device 700 according to an embodiment of the present application, the apparatus can be applied to the apparatus to be deployed 230 shown in fig. 2, and includes: a second receiving module 710, a configuration module 720, and a sending module 730. The principle relationship of the modules is as follows:
the second receiving module 710 is configured to receive a configuration request issued by the second device according to a preset operation instruction.
A configuration module 720, configured to obtain configuration information for automatic configuration based on the configuration request.
A sending module 730, configured to send a registration request to the first device.
In an embodiment, the configuration request includes encryption information, and the configuration module 720 is specifically configured to: decrypting the encrypted information by using a preset decryption algorithm corresponding to the preset encryption algorithm to obtain configuration information; and calling a preset interface to import the configuration information.
In an embodiment, the configuration request includes encryption information, and the second receiving module 710 is specifically configured to: and storing the encrypted information to a preset file address.
In one embodiment, the configuration module 720 is specifically configured to: monitoring a preset file address; when the preset file address is monitored to store the encrypted information, decrypting the encrypted information by using a preset decryption algorithm corresponding to the preset encryption algorithm to obtain configuration information; and calling a preset interface to import the configuration information.
In an embodiment, the device deployment apparatus 700 further comprises: and a prompt module 740, configured to send a configuration success prompt to the second device.
For a detailed description of the device deployment apparatus 700, please refer to the description of the related method steps in the above embodiments.
An embodiment of the present invention further provides a storage medium readable by an electronic device, including: a program that, when run on an electronic device, causes the electronic device to perform all or part of the procedures of the methods in the above-described embodiments. The storage medium may be a magnetic Disk, an optical Disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a Flash Memory (Flash Memory), a Hard Disk (Hard Disk Drive, abbreviated as HDD), a Solid State Drive (SSD), or the like. The storage medium may also comprise a combination of memories of the kind described above.
In the embodiments provided in the present application, the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. The above description is only a preferred embodiment of the present application, and is only for the purpose of illustrating the technical solutions of the present application, and not for the purpose of limiting the present application. Any modification, equivalent replacement, improvement or the like, which would be obvious to one of ordinary skill in the art and would be within the spirit and principle of the present application, should be included within the scope of the present application.

Claims (14)

1. A device deployment method applied to a first device, the method comprising:
acquiring configuration information of equipment to be deployed;
generating a URL link based on the configuration information, and sending the URL link to second equipment so that the second equipment sends a configuration request to the equipment to be deployed when receiving a preset operation instruction;
receiving a registration request of the equipment to be deployed;
and verifying and registering the equipment to be deployed based on the registration request.
2. The method of claim 1, wherein generating and sending the URL link to the second device based on the configuration information comprises:
encrypting the configuration information by using a preset encryption algorithm to obtain encrypted information;
generating a URL link to the encrypted information;
and sending the URL link to the second device through a mail.
3. The method of claim 1, wherein the registration request includes device information, and wherein verifying and registering the device to be deployed based on the registration request comprises:
judging whether the equipment information is the same as the configuration information;
when the equipment information is the same as the configuration information, judging whether the number of the current registered equipment is smaller than a preset threshold value;
if the number of the current registered devices is smaller than a preset threshold value, registering the devices to be deployed;
and if the number of the current registered equipment is not less than the preset threshold value, outputting a registration failure prompt.
4. A device deployment method is applied to a device to be deployed, and comprises the following steps:
receiving a configuration request issued by the second equipment according to a preset operation instruction;
acquiring configuration information for automatic configuration based on the configuration request;
a registration request is sent to the first device.
5. The method of claim 4, wherein the configuration request includes encrypted information, and wherein obtaining configuration information for automatic configuration based on the configuration request comprises:
decrypting the encrypted information by using a preset decryption algorithm corresponding to a preset encryption algorithm to obtain configuration information;
and calling a preset interface to import the configuration information.
6. The method according to claim 4, wherein the configuration request includes encrypted information, and the receiving the configuration request issued by the second device according to the preset operation instruction includes:
and storing the encrypted information to a preset file address.
7. The method of claim 6, wherein obtaining configuration information for automatic configuration based on the configuration request comprises:
monitoring the preset file address;
when the encrypted information is monitored to be stored in the preset file address, decrypting the encrypted information by using a preset decryption algorithm corresponding to the preset encryption algorithm to obtain configuration information;
and calling a preset interface to import the configuration information.
8. The method of claim 4, further comprising, after the obtaining configuration information for auto-configuration based on the configuration request:
and sending a configuration success prompt to the second equipment.
9. An equipment deployment apparatus, comprising:
the acquisition module is used for acquiring the configuration information of the equipment to be deployed;
the generating module is used for generating a URL link based on the configuration information and sending the URL link to the second equipment so that the second equipment sends a configuration request to the equipment to be deployed when receiving a preset operation instruction;
a first receiving module, configured to receive a registration request of the device to be deployed;
and the registration module is used for verifying and registering the equipment to be deployed based on the registration request.
10. An equipment deployment apparatus, comprising:
the second receiving module is used for receiving a configuration request issued by the second equipment according to a preset operation instruction;
the configuration module is used for acquiring configuration information to perform automatic configuration based on the configuration request;
a sending module, configured to send a registration request to the first device.
11. An electronic device, comprising:
a memory to store a computer program;
a processor to perform the method of any one of claims 1 to 3.
12. An electronic device, comprising:
a memory to store a computer program;
a processor to perform the method of any one of claims 4 to 8.
13. A non-transitory electronic device readable storage medium, comprising: program which, when run by an electronic device, causes the electronic device to perform the method of any one of claims 1 to 3.
14. A non-transitory electronic device readable storage medium, comprising: program which, when run by an electronic device, causes the electronic device to perform the method of any one of claims 4 to 8.
CN202011615927.8A 2020-12-30 2020-12-30 Equipment deployment method, device, equipment and storage medium Pending CN112866193A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011615927.8A CN112866193A (en) 2020-12-30 2020-12-30 Equipment deployment method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011615927.8A CN112866193A (en) 2020-12-30 2020-12-30 Equipment deployment method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112866193A true CN112866193A (en) 2021-05-28

Family

ID=75998752

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011615927.8A Pending CN112866193A (en) 2020-12-30 2020-12-30 Equipment deployment method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112866193A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113709224A (en) * 2021-08-18 2021-11-26 杭州海康消防科技有限公司 Equipment registration method, device, equipment, system and storage medium
CN114301774A (en) * 2021-12-30 2022-04-08 北京天融信网络安全技术有限公司 Equipment configuration method, system, device, electronic equipment and storage medium
CN114363163A (en) * 2021-12-09 2022-04-15 北京六方云信息技术有限公司 HTTPS-based equipment deployment method, system, equipment and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095495A (en) * 2013-01-06 2013-05-08 华为技术有限公司 Network implementation configuration method, device and system
CN106406948A (en) * 2016-09-13 2017-02-15 乐视控股(北京)有限公司 Configuration file downloading method and device
CN107465568A (en) * 2017-07-06 2017-12-12 长城计算机软件与系统有限公司 A kind of monitoring method and monitoring system for terminal
CN109451098A (en) * 2019-01-16 2019-03-08 郑州云海信息技术有限公司 FPGA accelerator card MAC Address configuration method, device and accelerator card
CN111526039A (en) * 2020-03-29 2020-08-11 杭州迪普科技股份有限公司 Electronic equipment opening method and device, electronic equipment and computer readable medium
CN111614476A (en) * 2019-02-22 2020-09-01 华为技术有限公司 Equipment configuration method, system and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103095495A (en) * 2013-01-06 2013-05-08 华为技术有限公司 Network implementation configuration method, device and system
CN106406948A (en) * 2016-09-13 2017-02-15 乐视控股(北京)有限公司 Configuration file downloading method and device
CN107465568A (en) * 2017-07-06 2017-12-12 长城计算机软件与系统有限公司 A kind of monitoring method and monitoring system for terminal
CN109451098A (en) * 2019-01-16 2019-03-08 郑州云海信息技术有限公司 FPGA accelerator card MAC Address configuration method, device and accelerator card
CN111614476A (en) * 2019-02-22 2020-09-01 华为技术有限公司 Equipment configuration method, system and device
CN111526039A (en) * 2020-03-29 2020-08-11 杭州迪普科技股份有限公司 Electronic equipment opening method and device, electronic equipment and computer readable medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113709224A (en) * 2021-08-18 2021-11-26 杭州海康消防科技有限公司 Equipment registration method, device, equipment, system and storage medium
CN113709224B (en) * 2021-08-18 2024-02-09 杭州海康消防科技有限公司 Equipment registration method, device, equipment, system and storage medium
CN114363163A (en) * 2021-12-09 2022-04-15 北京六方云信息技术有限公司 HTTPS-based equipment deployment method, system, equipment and medium
CN114301774A (en) * 2021-12-30 2022-04-08 北京天融信网络安全技术有限公司 Equipment configuration method, system, device, electronic equipment and storage medium
CN114301774B (en) * 2021-12-30 2024-03-12 北京天融信网络安全技术有限公司 Device configuration method, system, device, electronic device and storage medium

Similar Documents

Publication Publication Date Title
CN106937274B (en) Profile switching method and device based on EUICC
CN112866193A (en) Equipment deployment method, device, equipment and storage medium
CN109558261B (en) Method and system for acquiring abnormal log of wearable device
CN109586962B (en) Device and method for processing HTTPS (hypertext transfer protocol secure) outer chain problem of upgrading IPv4 to IPv6 and electronic equipment
CN110784450A (en) Single sign-on method and device based on browser
WO2018018697A1 (en) Method and system for identifying spam message from false base station
CN111857609B (en) Method and device for uploading cloud printing log and computer storage medium
CN115208951B (en) Request processing method, request processing device, electronic equipment and computer readable storage medium
CN108055238A (en) A kind of account verification method and system
CN109918211A (en) A kind of method, apparatus of Auto-writing identifying code
CN112615753A (en) Link abnormity tracking method, first node, second node and link
CN111954240A (en) Network fault processing method and device and electronic equipment
CN112783787A (en) Interface test method, device and system and electronic equipment
US20210158301A1 (en) Systems and methods for message transmission and retrieval using blockchain
CN114826692A (en) Information login system, method, electronic device and storage medium
CN112613933A (en) Invoice data processing method and device, storage medium and electronic equipment
CN102316076B (en) Method, device and system for recognizing cross-network system user
CN103326892B (en) The operating method and device of web interface
CN110913406B (en) Access configuration method and device of RCS test server
EP3171543A1 (en) Local information acquisition method, apparatus and system
CN108737350B (en) Information processing method and client
CN113472785B (en) Data processing method and device, electronic equipment and readable storage medium
Cisco Release Notes for Cisco Aironet Workgroup Bridges Running Firmware Release 8.80
CN104714760A (en) Method and device for read and write storage device
EP3038390B1 (en) Processing method and apparatus for signaling tracing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210528

RJ01 Rejection of invention patent application after publication