Network combination method
A network, network-defined technology, applied in network topology, connection management, electrical components, etc., can solve the problem of no BLEBeacon application scenarios, and achieve the effect of convenient use experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0034] Example one
[0035] figure 1 It is a schematic diagram of a system combining a BLE Beacon device and a SIG Mesh network preferred in an embodiment of the present invention, such as figure 1 As shown, the elliptical dashed frame is the SIG Mesh network 11. There are multiple SIG Mesh network nodes 12 in the SIG Mesh network 11. Each SIG Mesh network node 12 is connected to and communicates with its surrounding SIG Mesh network nodes in both directions, thereby forming SIG Mesh In the network, part of the SIG Mesh network nodes 12 are connected to the home gateway 14 and communicate with the network cloud 15 through the home gateway 14.
[0036] There are one or more BLE Beacon nodes 13 outside the SIG Mesh network 11. Under the current BLE GATT protocol, only the connection between the central node and the peripheral nodes in the BLE Beacon node 13 can be realized, while the BLEBeacon in the present invention The node 13 can be connected to the SIG Mesh network node 12 in th...
Example Embodiment
[0037] Example two
[0038] figure 2 It is a schematic diagram of a preferred method for combining a BLE Beacon device with a SIG Mesh network in an embodiment of the present invention, such as figure 2 As shown, the specific process of the method of combining BLE Beacon equipment and SIG Mesh network is as follows:
[0039] In step S21, the Beacon device broadcasts the MAC address of its own node, the encryption authentication mode ENC mode, and the static private key private key, so as to be received by the SIG Mesh node, which can act as a proxy node of the beacon device.
[0040] Step S22, the SIG Mesh proxy node encapsulates the received MAC address, encryption authentication method, and static private key of the Beacon device in SIG Mesh format, and sends it to the gateway via the SIG Mesh network; the gateway then sends the information to the network Cloud devices, realize the registration of Beacon devices in the network cloud.
[0041] Among them, the MAC address of the Bea...
Example Embodiment
[0048] Example three
[0049] image 3 It is a schematic diagram of a method for combining a BLE Beacon device with a SIG Mesh network including a confirmation process, which is preferred in an embodiment of the present invention, such as image 3 As shown, the specific process of the method of combining the BLE Beacon device and the SIG Mesh network including the confirmation process is as follows:
[0050] Step S31, the Beacon device broadcasts the MAC address of its own node, the encryption authentication mode ENC mode, and the static private key private key, so that it is received by the SIG Mesh node, and the SIG Mesh node can act as a proxy node of the beacon device.
[0051] Step S32, the SIG Mesh proxy node encapsulates the received MAC address, encryption authentication method, and static private key of the Beacon device in the SIG Mesh format, and sends it to the gateway via the SIG Mesh network; the gateway then sends the information to the network Cloud devices, realize t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap