หน้านี้ยังไม่พร้อมใช้งานในภาษาท้องถิ่นของคุณ เรากำลังพยายามอย่างหนักเพื่อเพิ่มเวอร์ชันภาษาอื่น ๆ เพิ่มเติม ขอบคุณสำหรับการสนับสนุนเสมอมา
- What's New
- Service Overview
- Getting Started
-
User Guide
- Management Platform
- Developer Center
-
Developer Guide
-
Product Development
- Obtaining Development Resources
- Creating a Project and Product
- Developing a Product Model
-
Developing a Codec
- Development Guide
- Offline Development
- Codec Development Examples
-
Reference
- Message Processing Flow
- decode API Description
- Description of encode API
- getManufacturerId Interface Description
- getModel Interface Description
- Precautions on Interface Implementation
- Input/Output Format of the Codec Plug-In
- Implementation Sample Interpretation
- Appendix: Encryption Algorithms Supported by the JDK
- Developing an Application
- Developing a Device
- Self-Service Testing
- Product Release
- Device Interconnection
- Application Interconnection
-
SDK Usage Guide on the Device Side
-
LiteOS SDK Integration Development Guide
- Overview
-
Processfor Connecting Devices to OceanConnect on the Device Side
- Preparations
- Entrypoint Function for LiteOS SDK Device-Cloud Interconnect Components
- Initializing LiteOS SDK Device-Cloud Interconnect Components
- Creating a Data Reporting Task
- Command Processing Function for LiteOS SDK Device-Cloud Interconnect Components
- Main Function Body for LiteOS SDK Device-Cloud Interconnect Components
- Data Structure
- Appendix 1 LWM2M
-
LiteOS SDK Integration Development Guide
-
SDK Usage Guide on the Application Side
-
Huawei IoT Platform Java SDK Usage Guide
- Before You Start
- Requirements for the Development Environment
- Downloading Related Development Resources
- Importing the Java SDK Demo
- Initializing and Configuring Certificates
- Calling Service APIs
- Implementing Callback APIs and Making, Exporting, and Uploading a Callback Certificate
- Service API Calling Process and Precautions
- Testing the SDK
-
Huawei IoT Platform Java SDK Usage Guide
-
Product Development
-
API Reference
-
Northbound API Reference
- Overview
- API Usage Statement
- Secure Application Access
- Device Management
- Data Collection
-
Subscription Management
- Subscribing to Service Data of the IoT Platform
- Subscribing to Management Data of the IoT Platform
- Querying a Subscription
- Querying Subscription in Batches
- Deleting a Subscription
- Deleting Subscriptions in Batches
-
Push Notification
- Pushing Device Registration Notifications
- Pushing Device Binding Notifications
- Pushing Device Information Change Notifications
- Pushing Device Data Change Notifications
- Pushing Batch Device Data Change Notifications
- Pushing Device Service Capability Change Notifications
- Pushing Device Service Capability Addition Notifications
- Pushing Device Service Capability Deletion Notifications
- Pushing Device Deletion Notifications
- Pushing Device Acknowledgment Notifications
- Pushing Device Command Response Notifications
- Pushing Command Status Change Notifications
- Pushing Rule Event Notifications
- Pushing Device Shadow Status Change Notifications
- Pushing Software Upgrade Status Change Notifications
- Pushing Software Upgrade Result Notifications
- Pushing Firmware Upgrade Status Change Notifications
- Pushing Firmware Upgrade Result Notifications
- Command Delivery
- Batch Processing
- Device Group Management
- Device Upgrade
-
Northbound Java SDK API Reference
- SDK Demo Architecture and Usage Guide
- SDK Initialization Configuration and Test
-
Service API List
- Secure Application Access
- Device Management
- Batch Processing
- Subscription Management
-
Message Push
- Pushing Device Registration Notifications
- Pushing Device Binding Notifications
- Pushing Device Information Change Notifications
- Pushing Device Data Change Notifications
- Pushing Batch Device Data Change Notifications
- Pushing Device Service Information Change Notifications
- Pushing Device Deletion Notifications
- Pushing Device Acknowledgment Notifications
- Pushing Device Command Response Notifications
- Pushing Device Event Notifications
- Pushing Device Model Addition Notifications
- Pushing Device Model Deletion Notifications
- Pushing Device Shadow Status Change Notifications
- Pushing Software Upgrade Status Change Notifications
- Pushing Software Upgrade Result Notifications
- Pushing Firmware Upgrade Status Change Notifications
- Pushing Firmware Upgrade Result Notifications
- Pushing NB-IoT Command Status Change Notifications
- Command Delivery (NB-IoT Commands)
- Command Delivery (Non-NB-IoT Commands)
- Data Collection
- Device Group Management
-
Device Upgrade
- Querying a Version Package List
- Querying a Specified Version Package
- Deleting a Specified Version Package
- Creating a Software Upgrade Task
- Creating a Firmware Upgrade Task
- Querying the Result of a Specified Upgrade Task
- Querying Details About Subtasks of a Specified Upgrade Task
- Querying an Upgrade Task List
-
Northbound PHP SDK API Reference
- SDK Demo Architecture and Usage Guide
- SDK Initialization Configuration and Test
-
Service API List
- Secure Application Access
- Device Management
- Batch Processing
- Subscription Management
-
Message Push
- Pushing Device Registration Notifications
- Pushing Device Binding Notifications
- Pushing Device Information Change Notifications
- Pushing Device Data Change Notifications
- Pushing Batch Device Data Change Notifications
- Pushing Device Service Information Change Notifications
- Pushing Device Deletion Notifications
- Pushing Device Acknowledgment Notifications
- Pushing Device Command Response Notifications
- Pushing Device Event Notifications
- Pushing Device Model Addition Notifications
- Pushing Device Model Deletion Notifications
- Pushing Device Shadow Status Change Notifications
- Pushing Software Upgrade Status Change Notifications
- Pushing Software Upgrade Result Notifications
- Pushing Firmware Upgrade Status Change Notifications
- Pushing Firmware Upgrade Result Notifications
- NB-IoT Device Command Status Change Notification
- Command Delivery (NB-IoT Commands)
- Command Delivery (Non-NB-IoT Commands)
- Data Collection
- Device Group Management
-
Device Upgrade
- Querying a Version Package List
- Querying a Specified Version Package
- Deleting a Specified Version Package
- Creating a Software Upgrade Task
- Creating a Firmware Upgrade Task
- Querying the Result of a Specified Upgrade Task
- Querying Details About Subtasks of a Specified Upgrade Task
- Querying an Upgrade Task List
-
Northbound Python SDK API Reference
- SDK Demo Architecture and Usage Guide
- SDK Initialization Configuration and Test
-
Service API List
- Secure Application Access
- Device Management
- Batch Processing
- Subscription Management
-
Message Push
- Pushing Device Registration Notifications
- Pushing Device Binding Notifications
- Pushing Device Information Change Notifications
- Pushing Device Data Change Notifications
- Pushing Batch Device Data Change Notifications
- Pushing Device Service Information Change Notifications
- Pushing Device Deletion Notifications
- Pushing Device Acknowledgment Notifications
- Pushing Device Command Response Notifications
- Pushing Device Event Notifications
- Pushing Device Model Addition Notifications
- Pushing Device Model Deletion Notifications
- Pushing Device Shadow Status Change Notifications
- Pushing Software Upgrade Status Change Notifications
- Pushing Software Upgrade Result Notifications
- Pushing Firmware Upgrade Status Change Notifications
- Pushing Firmware Upgrade Result Notifications
- NB-IoT Device Command Status Change Notification
- Command Delivery (NB-IoT Commands)
- Command Delivery (Non-NB-IoT Commands)
- Data Collection
- Device Group Management
-
Device Upgrade
- Querying a Version Package List
- Querying a Specified Version Package
- Deleting a Specified Version Package
- Creating a Software Upgrade Task
- Creating a Firmware Upgrade Task
- Querying the Result of a Specified Upgrade Task
- Querying Details About Subtasks of a Specified Upgrade Task
- Querying an Upgrade Task List
- AgentLite API Reference (Android)
-
AgentLite API Reference (C)
- Before You Start
- API Description
-
Common Data Structures
- ST_IOTA_DEVICE_INFO Structure
- IEs in EN_IOTA_BIND_IE_TYPE Messages
- Enumerated Values of the EN_IOTA_BIND_RESULT_TYPE Parameter
- IEs in EN_IOTA_LGN_IE_TYPE Messages
- Enumerated Values of the EN_IOTA_LGN_REASON_TYPE Parameter
- Enumerated Values of the EN_IOTA_CFG_TYPE Parameter
- IEs in EN_IOTA_HUB_IE_TYPE Messages
- Enumerated Values of the EN_IOTA_HUB_RESULT_TYPE Parameter
- IEs in EN_IOTA_DATATRANS_IE_TYPE Messages
- IEs in EN_IOTA_DEVUPDATE_IE_TYPE Messages
- Data Types
- AgentLite API Reference (Java)
- MQTT Interface Reference
-
Northbound API Reference
-
FAQs
- FAQs
- Specifications
- Product Use
-
Secondary Development
-
FAQs About Product Development
-
Profile Definition
- How to Develop a Profile
- Upload Is Unavailable When Uploading a Profile to the Developer Center
- Incorrect File Format Is Displayed When Uploading a Profile to the Developer Center
- Message Is Displayed Indicating That the Manufacturer ID and Device Model Exist When Uploading a Profile to the Developer Center
- How to Select a Data Type When Developing a Profile Online
- Profile Cannot Be Edited
-
Plug-In Development
- How to Develop Codecs
- Failed to Deploy a Plug-in That Is Developed Online
- What Is the Code Rule for Fields of the string and varstring Types
- What Is the Code Rule for Fields of the array and variant Types
- Whether Plug-Ins That Are Developed Online Support Transparent Transmission
- How to Use messageId During Online Codec Development
- How to Configure a Command Delivery Response During Online Codec Development
- Failed to Deploy a Plug-in That Is Developed Offline
- Failed to Upload a Plug-in That Is Developed Offline
- Plug-In Package Developed Offline Has Been Checked But Cannot Be Found When Uploading to the IoT Platform
- Codec Exception Occurs After a Plug-In Package Developed Offline That Has Been Checked Is Uploaded to the IoT Platform
- Offline Signature Fails
-
Device Development
- Registered Devices Cannot Connect to the IoT Platform
- Message 513 Is Reported When Devices Are Connected to the IoT Platform
- DTLS Encryption Algorithms Supported by the IoT Platform
- What Does CTNB Mean
- How to Select PSM, DRX, and eDRX
- Devices Cannot Receive Commands from the IoT Platform
- IoT Platform Does Not Receive Data Reported by Devices
- Historical Data Does Not Contain Data Reported By Devices While No Error Occurs
- Duration for Devices to Receive Commands
- Devices Fail to Receive Data Reporting Responses
- Data Reporting Is Successful at One Position But Fails at Another Position
- Command Status Is Not Changed to Successful After a Device Reports the Command Execution Result
- Whether the IoT Platform Can Switch Between the Big-Endian and Little-Endian
- Commands Fail to Be Delivered When a Device in DRX Mode Does Not Report Data in One to Two Days
-
Profile Definition
-
FAQs About Application Development
-
Calling APIs
- Authentication API of the IoT Platform Is Successfully Called Locally But Fails to Be Called on Application Servers
- Error Occurs When an NA Calls an API
- Online Application Simulator Fails to Deliver Commands
- Command Is Successfully Delivered Using the Simulator But Fails to Be Delivered by Calling the API
- Application Server Fails to Deliver Commands and Receives Error Code 403
- How Does an Application Server Deliver a Cache Command
- What Does an Expired Command Mean
- Does the IoT Platform Support Command Resending
- What Does a Timeout Command Mean
- Can the IoT Platform Deliver Commands in Batches
- Are the APIs of the IoT Platform Called Only Using Java
- What Are the Command States on the IoT Platform
- Failed to Call the Calling the Registering Directly Connected Devices API
- APIs Fail To Be Called After a Period of Time While Parameters Remain Unchanged
- Commands Fail to Be Sent After a Period of Time While the Previous Commands Are Successfully Sent
- Historical Data Is Not Returned When the Querying Historical Device Data API Is Called
- Devices Registered with the IoT Platform Are Deleted After a Period of Time
-
Subscription and Push
- Invalid Callback Address Occurs When Calling the Subscription API
- How to Obtain the subscriptionId When Calling the Querying Subscription in Batches API
- Application Server Fails to Receive Data Pushed by the IoT Platform
- How Do I Export the HTTPS Push Certificate
- Difference Between deviceDatachanged and deviceDataschanged
- How Does an Application Server Obtain the IMEI of Devices
- Application Server Receives Data But an Error Is Displayed on the IoT Platform
- Push Messages May Fail to Be Sent to Application Servers
- How Does an Application Servers Obtain The Address Used by the IoT Platform to Push Messages
- Does the IoT Platform Supports Re-push
- How Does an Application Server Receive a Command Status Change Notification
- Application Servers That Have Subscribed to Confirmation Notifications and Command Response Notifications Fail to Receive Push Messages
- Does the IoT Platform Support Only HTTPS Callback Addresses
- Can the IoT Platform Push Data Reported by Different Devices Under the Same Application to Two Servers
- Can a Subscription Address Be a Domain Name
- Can a Callback Address Be Changed
- How Do I Obtain the Callback URL When Calling the Subscription API
-
Calling APIs
-
FAQs About Software/Firmware Upgrade
- What Is Software/Firmware Upgrade
- Can IoT Platform Download Software/Firmware Packages From Third-party Servers
- Can the Target Version Be Earlier Than the Source Version?
- How Do I Obtain Software/Firmware Packages and Their Version Numbers
- Software/Firmware Upgrade Task Is Ended Immediately After Being Created
- What Is the Source Version Required for Uploading a Firmware Package on the Management Portal
- When Reporting Data, Devices Receive the Software/Firmware Version Query Command from the IoT Platform
- Are Services Interrupted During the Software/Firmware Upgrade
- What Are Common Software/Firmware Upgrade Errors
- Retry When Some Devices in the Group Failed to Be Upgraded
- Is Resumable Transmission Supported When the IoT Platform Sends Software/Firmware Packages to Devices
-
Others
- Does the IoT Platform Support Device Registration in Batches
- Does the IoT Platform Perform Flow Control on Applications and Devices
- How Does an Application Server Obtain Data Reported by Devices to the IoT Platform
- Is the Maximum Number of Applications and Devices Restricted on the IoT Platform
- Why Is an Online Device Changed to an Abnormal or Offline State After a Period of Time
- Are Command Delivery and Data Reporting Successful After a Device Becomes Abnormal or Offline
- How Long Does a Device Receive an Immediately-Delivered Command in eDRX Mode
- How Long Is Data Stored on the IoT Platform
- Can Multiple Devices Use One IMEI
-
FAQs About Product Development
- General Reference
Copied.
Implementing Callback APIs and Making, Exporting, and Uploading a Callback Certificate
Implementing Callback APIs
1 2 3 4 5 |
@Override public void handleDeviceAdded(NotifyDeviceAddedDTO body) { System.out.println("deviceAdded ==> " + body); //TODO deal with deviceAdded notification } |
- A message pushed by the IoT platform must be processed according to the service. However, complex calculations, I/O operations, and operations that will take a long time are not recommended. You can write data into the database, and access or refresh the corresponding page before obtaining data from the database.
- The callback path has been set in the SDK. Therefore, pay attention to the callback URL during subscription. For details, see APIs in the "Message Push" section in the Java SDK API Reference Document.
- The callback IP address is the same as that of the server. It must be a public IP address.
- The callback port of the Java SDK Demo is configured in the src\main\resource\application.properties directory.
1 2
#specify the port of the web application server.port=8099
Making a Callback Certificate
A self-signed certificate is used as an example. A commercial certificate must be applied from the CA.
- Open the Windows CLI, and enter where java to switch to the bin directory of the JDK.
1 2
where java Cd /d {bin directory of the JDK}
- Run the following command to generate the tomcat.keystore file:
1
keytool -genkey -v -alias tomcat -keyalg RSA -keystore tomcat.keystore -validity 36500
NOTICE:
- If the tomcat.keystore file exists in the bin directory of the JDK, move the file to another path.
- Enter the IP address or domain name of the application server under What is your first and last name?
- The password of <tomcat> must be the same as that of the keystore (press Enter in the last step). Remember the password of the keystore, as it will be used in subsequent configurations.
- Place the root certificate ca.pem provided by the IoT platform in the bin directory of the JDK and run the following command to add it to the trust certificate chain of the tomcat.keystore file:
1
keytool -import -v -file ca.pem -alias iotplatform_ca -keystore tomcat.keystore
Enter the keystore password. Check the imported certificate content and enter y.
NOTE:
- The test root certificate ca.pem of the IoT platform can be found in the cert directory of the Java SDK package.
- After the root certificate ca.pem provided by the IoT platform is added to the trust certificate chain of the tomcat.keystore file, the sub-certificate issued by ca.pem can obtain the trust of the application server.
- Place the tomcat.keystore file in the directory of the Java SDK Demo, for example, src\main\resources. Open the src\main\resource\application.properties file and add the following configuration, where server.ssl.key-store indicates the path where the tomcat.keystore file is stored and server.ssl.key-store-password indicates the password of the keystore:
#one-way authentication (server-auth) server.ssl.key-store=./src/main/resources/tomcat.keystore server.ssl.key-store-password=741852963.
- Right-click PushMessageReceiverTest and choose Run As > Java Application to run the PushMessageReceiverTest class in the Java SDK Demo. The command output is as follows:
NOTE:
Data is transferred to the corresponding callback function when it is pushed to the application server.
Exporting a Callback Certificate
- Use a browser to open the callback URL https://server:8099/v1.0.0/messageReceiver and view the certificate. Google Chrome is used as an example.
The IP address of the server is the same as that of the local host. 8099 is the port configured in the application.properties file.
- In the Certificate dialog box, click the Details tab. Click Copy to File.
- Click Next. In the Export File Format dialog box displayed, select Base-64 encoded X.509 (.CER), and click Next.
- Specify the path for saving the certificate.
- In the File to Export dialog box, click Browse. Select a path, enter the file name, and click Save to return to the Certificate Export Wizard dialog box. Then, click Next.
- Click Finish to export the certificate.
NOTICE:
If the application server is deployed on the cloud, multiple certificates may exist. You are advised to export the certificates one by one after the deployment is complete.
- In the File to Export dialog box, click Browse. Select a path, enter the file name, and click Save to return to the Certificate Export Wizard dialog box. Then, click Next.
- If multi-level certificates exist, export them one by one.
- In the Certificate dialog box, select a certificate path and click View Certificate.
- Click the Details tab and repeat the preceding steps to export every selected certificate.
- In the Certificate dialog box, select a certificate path and click View Certificate.
- Use the text editor to combine all the exported certificates sequentially into a PEM file. This file must be uploaded to the corresponding application on the IoT platform.
- The configuration in the Demo is one-way authentication. After the certificate is exported, change it to two-way authentication. Open the following configuration file (delete the comment and change the tomcat.keystore directory and password). The root certificate of the platform has been added to the tomcat.keystore trust certificate chain. Therefore, you do not need to modify the configuration file. Restart the server.
#two-way authentication (add client-auth) server.ssl.trust-store=./src/main/resources/tomcat.keystore server.ssl.trust-store-password=741852963. server.ssl.client-auth=need
- One-way authentication is less secure than two-way authentication. Therefore, two-way authentication is recommended.
Uploading the Callback Certificate
- Log in to the Developer Center and access a project.
- Choose Applications > Interconnection, and click Certificate Management.
- Click Add to upload the certificate.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot