CN105915416B - Information processing method and terminal equipment - Google Patents

Information processing method and terminal equipment Download PDF

Info

Publication number
CN105915416B
CN105915416B CN201610211138.5A CN201610211138A CN105915416B CN 105915416 B CN105915416 B CN 105915416B CN 201610211138 A CN201610211138 A CN 201610211138A CN 105915416 B CN105915416 B CN 105915416B
Authority
CN
China
Prior art keywords
data
network
equipment
connection
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610211138.5A
Other languages
Chinese (zh)
Other versions
CN105915416A (en
Inventor
张传雨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201610211138.5A priority Critical patent/CN105915416B/en
Publication of CN105915416A publication Critical patent/CN105915416A/en
Application granted granted Critical
Publication of CN105915416B publication Critical patent/CN105915416B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2807Exchanging configuration information on appliance services in a home automation network

Landscapes

  • Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses an information processing method and terminal equipment, wherein the method comprises the following steps: if the network equipment in the connection range meets the condition, controlling the terminal equipment to be in an acquisition state; acquiring data from the network device; and establishing connection with the network equipment according to the data. The method provided by the invention is used for solving the technical problems of complex operation and low efficiency when the network connection is established between the terminal equipment and the central control equipment in the prior art, ensures that the terminal equipment is quickly accessed to the network, and improves the technical effect of the network access efficiency of the terminal equipment.

Description

Information processing method and terminal equipment
Technical Field
The present invention relates to the field of electronic technologies, and in particular, to an information processing method and a terminal device.
Background
In the smart home system, the smart home device may be any electronic device in or around a house, such as an air conditioner, a refrigerator, a water heater, an electric cooker, an electric lamp, and the like. In the system, a user can check the working state of the intelligent household equipment through the mobile terminal and also can remotely control the intelligent household equipment.
In order to realize information sharing among the smart home devices, it is often necessary to connect the devices to a network. In the prior art, a user often manually controls an intelligent home device to be networked to enter a to-be-networked state, and then manually operates a central control device to realize the networked connection between the intelligent home device and the central control device.
In the process of inventing the technical scheme in the embodiment of the present application, the inventor of the present application finds that the above prior art has at least the following technical problems:
therefore, when network connection is established between the terminal device and the central control device in the prior art, the technical problems of complex operation and low efficiency exist.
Disclosure of Invention
The embodiment of the invention provides an information processing method and terminal equipment, which are used for solving the technical problems of complex operation and low efficiency when network connection is established between the terminal equipment and central control equipment in the prior art, ensuring that the terminal equipment is rapidly accessed to a network, and improving the technical effect of the network access efficiency of the terminal equipment.
In one aspect, an embodiment of the present application provides an information processing method, including the following steps:
if the network equipment in the connection range meets the condition, controlling the terminal equipment to be in an acquisition state;
acquiring data from the network device;
and establishing connection with the network equipment according to the data.
Optionally, a communication protocol on which the terminal device obtains the data is the same as a communication protocol used for establishing the connection.
Optionally, the if the network device in the connection range satisfies the condition, including:
and if the network equipment exists in the connection range of the terminal equipment and the data path is not established between the terminal equipment and the network equipment, determining that the network equipment meets the condition.
Optionally, if a network device exists in the connection range of the terminal device and a data path is never established between the terminal device and the network device, the method includes:
if the connection range is within the connection range, obtaining identification data from another electronic device;
determining, based on the identification data, that the other electronic device is the network device that can be used to enable the terminal device to access a network;
and if the terminal equipment needs cipher data to establish connection with the network equipment and the terminal equipment does not store the configuration data of the network equipment, determining that a data path is never established between the terminal equipment and the network equipment.
Optionally, the acquiring data from the network device specifically includes:
obtaining the data from the network device at a current time; or the like, or, alternatively,
the method comprises the steps of obtaining password data from the network equipment at the current moment, obtaining identification data from the network equipment at a first moment before the current moment, and obtaining data at least comprising the password data and the identification data based on the password data and the identification data.
Optionally, before the acquiring the data from the network device, the method specifically includes:
collecting data packets which are sent by the network equipment and do not take the terminal equipment as a destination address, wherein the data packets at least comprise data used for determining to send the data to the network equipment so as to establish connection;
processing the data packet to obtain request data;
and sending the request data to the network equipment so as to enable the terminal equipment to be in a state to be fed back. Optionally, after the sending the request data to the network device to enable the terminal device to be in a state to be fed back, the method further includes:
and receiving parameter data which is sent by the network equipment and used for establishing the connection and at least comprises the password data.
Optionally, the method further comprises:
detecting the access authority level corresponding to the terminal equipment;
when the access authority level represents that the terminal equipment has the authority to access the network equipment, executing the following steps: and receiving parameter data which is sent by the network equipment and used for establishing the connection and at least comprises the password data.
Optionally, the method further comprises:
receiving the parameter data including at least the password data, wherein the parameter data is obtained by the terminal device after the network device responds to a confirmation operation. Optionally, the establishing a connection with the network device according to the data includes:
obtaining a selection operation for determining the network device from a plurality of candidate network devices in the detection state;
determining the network device from the plurality of candidate network devices in response to the selection operation;
establishing the connection with the network device in accordance with the at least one parameter information.
On the other hand, an embodiment of the present application further provides a terminal device, including:
wireless communication means for detecting whether a network device within a connection range satisfies a condition;
the processing device is used for controlling the terminal equipment to be in an acquisition state if the network equipment in the connection range meets the condition; acquiring data from the network device; and establishing connection with the network equipment according to the data.
Optionally, the processing device is further configured to:
collecting data packets which are sent by the network equipment and do not take the terminal equipment as a destination address, wherein the data packets at least comprise data used for determining to send the data to the network equipment so as to establish connection;
processing the data packet to obtain request data;
and sending the request data to the network equipment so as to enable the terminal equipment to be in a state to be fed back.
On the other hand, an embodiment of the present application further provides a terminal device, including:
the first control unit is used for controlling the terminal equipment to be in an acquisition state if the network equipment in the connection range meets the condition;
a first acquisition unit configured to acquire data from the network device;
and the first establishing unit is used for establishing connection with the network equipment according to the data.
One or more technical solutions in the embodiments of the present application have at least one or more of the following technical effects:
in the technical scheme of the embodiment of the application, if the network equipment in the connection range meets the condition, the terminal equipment is controlled to be in an acquisition state; acquiring data from the network device; and establishing connection with the network equipment according to the data. That is, once the network device in the connection range of the terminal device satisfies the condition, the terminal device is controlled to be in the acquisition state, and then the data from the network device can be acquired, and further, the network connection with the network device is established according to the data. Therefore, the terminal equipment is ensured to be rapidly accessed to the network, and the technical effect of the network access efficiency of the terminal equipment is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments will be briefly introduced, and it is obvious that the drawings in the following description are only some embodiments of the present invention.
Fig. 1 is a flowchart of an information processing method according to an embodiment of the present application;
fig. 2 is a flowchart illustrating steps of an information processing method according to an embodiment of the present application to determine that the network device satisfies the condition;
fig. 3 is a flowchart illustrating steps before step S102 in an information processing method according to an embodiment of the present application;
fig. 4 is a flowchart illustrating a first implementation manner of step S103 in an information processing method according to an embodiment of the present application;
fig. 5 is a flowchart illustrating a third implementation manner of step S103 in an information processing method according to an embodiment of the present application;
fig. 6 is a block diagram of an electronic device according to a second embodiment of the present application;
fig. 7 is a block diagram of an electronic device according to a third embodiment of the present application.
Detailed Description
The embodiment of the invention provides an information processing method and terminal equipment, which are used for solving the technical problems of complex operation and low efficiency when network connection is established between the terminal equipment and central control equipment in the prior art, ensuring that the terminal equipment is rapidly accessed to a network, and improving the technical effect of the network access efficiency of the terminal equipment.
In order to solve the technical problems, the general idea of the embodiment of the present application is as follows:
if the network equipment in the connection range meets the condition, controlling the terminal equipment to be in an acquisition state;
acquiring data from the network device;
and establishing connection with the network equipment according to the data.
In the technical scheme of the embodiment of the application, if the network equipment in the connection range meets the condition, the terminal equipment is controlled to be in an acquisition state; acquiring data from the network device; and establishing connection with the network equipment according to the data. That is, once the network device in the connection range of the terminal device satisfies the condition, the terminal device is controlled to be in the acquisition state, and then the data from the network device can be acquired, and further, the network connection with the network device is established according to the data. Therefore, the terminal equipment is ensured to be rapidly accessed to the network, and the technical effect of the network access efficiency of the terminal equipment is improved.
In order to better understand the technical solutions, the technical solutions of the present invention are described in detail below with reference to the drawings and specific embodiments, and it should be understood that the specific features in the embodiments and examples of the present invention are detailed descriptions of the technical solutions of the present invention, and are not limitations of the technical solutions of the present invention, and the technical features in the embodiments and examples of the present invention may be combined with each other without conflict.
In the embodiment provided based on the technical scheme of the application, the terminal device may be a smart phone, a tablet computer, a smart watch, an air conditioner, a refrigerator, and the like, which are not examples.
Example one
Referring to fig. 1, an embodiment of the present application provides an information processing method, including:
s101: if the network equipment in the connection range meets the condition, controlling the terminal equipment to be in an acquisition state;
s102: acquiring data from the network device;
s103: and establishing connection with the network equipment according to the data.
In the specific implementation process, the specific implementation process from step S101 to step S103 is as follows:
in the embodiment of the application, if the network equipment in the connection range meets the condition, the terminal equipment is controlled to be in the acquisition state. The network device is specifically a device that can be used to enable the terminal device to access a network, for example, a router device, a hub device, and the like that are integrated with a wifi module. As a specific example, the device integrated with the wifi module may be an electronic device such as a refrigerator, a washing machine, an air conditioner, etc. integrated with the wifi module. Specifically, when the network device in the connection range is not connected by the terminal device, or the network device does not store the configuration data for connection with the terminal device, the terminal device is controlled to be in the acquisition state. For example, after the terminal device is powered on for the first time, the terminal device is controlled to be in the acquiring state. For example, the terminal device will enter a real-time listening state.
Further, the terminal device acquires data from the network device. For example, data such as a wireless network name and a wifi password corresponding to the network device is detected. Then, a connection is established with the network device in accordance with the data. For example, after the terminal device obtains the wifi password corresponding to the wireless access point of the router a, the network connection with the access point can be established based on the password. Further, the terminal device will obtain the information needed by the user based on the connection.
In the embodiment of the application, a communication protocol on which the terminal device acquires the data is the same as a communication protocol used for establishing the connection. For example, the terminal device relies on a wifi communication protocol to obtain password data to be accessed to the network device, and then establishes network connection with the network device according to the password data under the wifi communication protocol.
In addition, in a specific implementation process, even when a data path connection is established between the terminal device and the network device within a connection range through another communication protocol, a communication protocol on which the terminal device obtains the data is the same as a communication protocol used for establishing the connection, specifically: the terminal equipment and the network equipment establish a first connection through a first communication protocol, and a first data configuration obtained by the first connection is not used for configuring a second communication protocol different from the first communication protocol. As a specific example, device B is located within the connection range of device a, and a first data connection is established between device B and device a via the bluetooth communication protocol. Although device a can obtain the second connection established by device a and device B via the wifi communication protocol via the bluetooth communication protocol. However, in the embodiment of the present application, the wifi communication protocol is not established through the bluetooth communication protocol. That is to say, in the embodiment of the present application, the terminal device can establish wifi connection between the terminal device and the network device without depending on other communication protocols under the condition that wifi communication protocol connection is not established between the terminal device and the network device.
In addition, in the embodiment of the present application, in order to quickly determine whether the network device in the connection range meets the condition, a person skilled in the art may set the specific range size of the connection range according to the actual needs of the user, and may also adjust the range size of the connection range at any time according to needs. As a specific example, the connection range is three rooms of three houses; for another example, the connection range is specifically the whole floor of 7 stories where three houses are located; of course, the connection range may also be other numerical ranges, which are not described herein.
In this embodiment of the present application, if the network device in the connection range meets the condition, the method specifically includes: and if the network equipment exists in the connection range of the terminal equipment and the data path is not established between the terminal equipment and the network equipment, determining that the network equipment meets the condition. For example, after the smart phone is powered on, when it is detected that the router device to be accessed exists in a connection range of the smart phone, and no history connection record exists between the smart phone and the router device by searching for a local connection history of the smart phone, that is, a data path is never established between the smart phone and the router device, it is determined that the router device satisfies the condition. That is, when the terminal device has no history data connection record with the network device, it is determined that the network device satisfies the condition. Further, in the embodiment of the present application, even in a case where the terminal device and the network device never have historical data connection, data connection with the network device can still be actively achieved.
In a specific implementation process, in order to determine that the network device satisfies the condition, referring to fig. 2, if a network device exists in a connection range of the terminal device and a data path is never established between the terminal device and the network device, the method includes:
s201: if the connection range is within the connection range, obtaining identification data from another electronic device;
s202: determining, based on the identification data, that the other electronic device is the network device that can be used to enable the terminal device to access a network;
s203: and if the terminal equipment needs cipher data to establish connection with the network equipment and the terminal equipment does not store the configuration data of the network equipment, determining that a data path is never established between the terminal equipment and the network equipment.
In the specific implementation process, the specific implementation process of step S201 to step S203 is as follows:
first, in the connection range of the terminal device, identification data from another electronic device is obtained. For example, a wireless router identifies a network using a Service Set Identifier (SSID), which may be up to 32 characters. Then, based on the identification data, it is determined that the other electronic device is the network device that can be used to enable the terminal device to access the network. That is, to determine that the network device satisfies the condition, it is first determined that the network device exists within the connection range. Then, the terminal device needs to establish connection with the network device by using the password data, that is, the terminal device needs to rely on a correct password data to join the current network of the network device. In a specific implementation process, besides that the terminal device needs password data to establish a connection with the network device, it needs to be satisfied that the terminal device does not store configuration data of the network device, such as data of a service set identifier, a device name, a password, and the like, so that it can be determined that a data path is never established between the terminal device and the network device. That is, it is determined that the terminal device needs cryptographic data to access the network device, and there is never a history of connection between the terminal device and the network device. In addition, in the implementation process, when the network device can be accessed to the terminal device without the aid of a password, the terminal device automatically establishes connection with the network device. For example, when the user a is in a leisure area in the cafe, the cafe is provided with a wireless hotspot for enabling the terminal device in the surrounding environment to join the network without password access, and based on the terminal device in the embodiment of the present application, the connection with the wireless hotspot can be automatically established without executing step S103 accordingly. Of course, it is obvious to those skilled in the art that other ways may also be adopted to determine that the network device satisfies the condition, which is not described herein again.
In this embodiment of the application, the terminal device may specifically have the following two forms for acquiring the data from the network device, but is not limited to the following two forms.
In the first form, step S102: acquiring data from the network device, specifically: obtaining the data from the network device at a current time; for example, the data from the network device is temporarily collected by the terminal device. For example, the terminal device detects and obtains the password data from the network device in real time. Even if the terminal device has already acquired a part of the data from the network device in the process of executing step S101, the terminal device needs to acquire the data again when executing step S102. As a specific example, when there are a plurality of network devices currently meeting the condition, in order to ensure that the terminal device can successfully join one of the plurality of network devices, in the process of the terminal device executing step S102, even if the part is the identification data, the terminal device will still temporarily obtain data contents such as the identification data and the corresponding password data, so that the terminal device can determine the device to be connected to the network from the plurality of network devices. In addition, in the specific implementation process, when there is only one network device that satisfies the condition in the connection range of the terminal device, the terminal device only needs to temporarily obtain the password data from the network device to ensure the network connection between the terminal device and the network device in the process of executing step S102.
In the second form, step S102: acquiring data from the network device, specifically: at the current moment, detecting password data from the network equipment, obtaining identification data from the network equipment at a first moment before the current moment, and obtaining the data at least comprising the password data and the identification data based on the password data and the identification data; for example, a part of the data, such as password data, from the network device is obtained after the terminal device is in the obtaining state; another part of the data, such as identification data, from the network device is obtained in the course of the terminal device determining that the network device within connection range fulfils a condition. Further, the data composed of the two parts of data from the network device is obtained based on the two parts of data obtained successively. As a specific example, in the process that the terminal device determines that the network device exists in the connection range of the terminal device, the service set identifier from the network device is already obtained. In the process of executing step S102, the service set identifier obtained previously and other data besides the service set identifier temporarily obtained by the terminal device at the current time, such as password data required for ensuring that the terminal device can successfully access the network device with the password setting, can be directly used as the basis. Of course, for those skilled in the art, in the implementation process, the data composed of different contents may also be obtained through step S102 according to the actual situation, which is not necessarily exemplified herein. Moreover, it will be apparent to those skilled in the art that other approaches may be devised to obtain the data from the network device, which are not described herein in detail.
In the embodiment of the present application, please refer to fig. 3, in step S102: before acquiring the data from the network device, the method specifically includes:
s301: collecting data packets which are sent by the network equipment and do not take the terminal equipment as a destination address, wherein the data packets at least comprise data used for determining to send the data to the network equipment so as to establish connection;
s302: processing the data packet to obtain request data;
s303: and sending the request data to the network equipment so as to enable the terminal equipment to be in a state to be fed back.
In the specific implementation process, the specific implementation process of steps S301 to S303 is as follows:
first, in the implementation process, step S301 is executed: the terminal device collects the data packets sent by the network device and obtained from the data packets not using the terminal device as the destination address, and there are at least the following two obtaining ways, but not limited to the following two obtaining ways, and those skilled in the art can design specific obtaining ways according to specific needs. Wherein, the first obtaining way specifically comprises: if the data packet is within the connection range, obtaining at least one data packet from other electronic equipment; processing the at least one data packet to determine a data packet at least comprising identification data from another electronic device in the other electronic devices; storing the data packet in a first storage space of the terminal equipment; determining, based on the data packet, that the other electronic device existing within the connection range is a network device that enables the terminal device to access a network; and after the terminal equipment and the network equipment do not establish a data path and the terminal equipment is controlled to be in the acquisition state, the terminal equipment acquires the data packet from the first storage space.
Specifically, the terminal device captures all data packets within the connection range, which are mainly from a plurality of electronic devices in the surrounding environment. Then, the terminal equipment screens the acquired data packets to determine a data packet at least comprising identification data of another electronic equipment; and storing the data packet in a first storage space of the terminal device, for example, storing the data packet in a local server corresponding to the terminal device or a specified directory of a cloud server. Further, determining that the network device is present within the connection range based on the data packet. Further, when it is determined that the terminal device and the network device never establish a data path, that is, it is determined that the network device in the connection range satisfies a condition, the terminal device is controlled to be in an acquisition state; then, after the terminal device is in the obtaining state, the terminal device obtains the data packet from the first storage space, and further determines that the terminal device is in a state to be fed back based on the data packet. That is to say, the data packet acquired by the terminal device in step S301 is specifically acquired by the terminal device in the process that the terminal device determines that the network device in the connection range satisfies the condition.
The second obtaining approach is specifically that after controlling the terminal device to be in the obtaining state, the terminal device obtains a data packet sent by the network device at the current time. Specifically, in the implementation process, the network device broadcasts its corresponding data packet to the peripheral electronic devices in real time, and after the terminal device is in the acquiring state, the terminal device acquires the data packet sent by the network device in real time. That is to say, the data packet acquired by the terminal device in executing step S301 may specifically be a data packet temporarily acquired by the terminal device from the surrounding environment. For example, the terminal device monitors and obtains a wireless data packet sent by a router device in the surrounding environment through a wireless network, specifically, the wireless data packet mainly includes valid information and invalid information for the terminal device, where the valid information includes a name, a Media Access Control (MAC) address, a Service Set Identifier (SSID), signal strength information, and the like corresponding to the router device, and may also be other information, which is not listed here. In a specific implementation process, the network device sends a data packet out in a broadcast manner, where to ensure that the terminal device can determine which network device sends the data packet specifically when receiving the data packet, for example, the data packet at least includes a MAC address corresponding to the network device. In addition, invalid information such as packet information that other terminal devices other than the terminal device a still transmit through the router device is invalid information for the terminal device a.
And then, processing the data packet to obtain the request data. For example, the data packet is processed to obtain a MAC address for determining to which network device to send the request. Further, the terminal device packages the MAC address with the valid data of the network access request, and may package with other valid data, which is not exemplified here. Further, the MAC address is used as a destination address of a network access request sent by the terminal device, and the network access request is sent to the network device corresponding to the destination address, so that the terminal device is in a to-be-fed state, that is, the terminal device is determined to be in a to-be-configured state to establish network connection with the router device. In other words, the router device detects the presence of a device to be configured in the current environment.
In this embodiment of the present application, after the sending the request data to the network device to enable the terminal device to be in a state to be fed back, the method further includes: and receiving parameter data which is sent by the network equipment and used for establishing the connection and at least comprises the password data. In a specific implementation process, after the terminal device is in the to-be-fed state, that is, after the terminal device is determined to be a to-be-accessed device waiting for access connection, once the network device determines that the to-be-configured device exists in the surrounding environment, the network device may actively enter the intelligent configuration state, or may passively enter the intelligent configuration state. Further, after the network device enters the intelligent configuration state, the terminal device monitors and obtains parameter data, which is broadcasted by the network device and used for establishing network connection, including at least password data, where the at least one parameter information is, for example, a service set identifier, a wifi password, and the like corresponding to the network device.
In this embodiment, in addition to the terminal device establishing the connection through the parameter data at least including the password data actively sent by the network device, in order to ensure the security of the network access connection of the terminal device, in a specific implementation process, the network access connection between the terminal device and the network device may be implemented through the following five implementation manners, but is not limited to the following four implementation manners.
First implementation
Referring to fig. 4, in a first implementation manner, the method further includes:
s401: detecting the access authority level corresponding to the terminal equipment;
s402: when the access authority level represents that the terminal equipment has the authority to access the network equipment, executing the following steps: and receiving parameter data which is sent by the network equipment and used for establishing the connection and at least comprises the password data.
In the specific implementation process, the specific implementation process from step S401 to step S402 is as follows:
firstly, detecting the access authority level corresponding to the terminal equipment. For example, the terminal device C belongs to a device under the smart home system a. The access permission level corresponding to the terminal device C is specifically that the terminal device C has permission to access all devices under the intelligent home system a, but has no permission to access devices under other intelligent home systems. As a specific example, an intelligent home system b is installed in three rooms where a D-user home is located, the E-user home is adjacent to the D-user home, and an intelligent home system c is installed in two rooms where the E-user home is located, where in order to ensure information security of each user, any device under the intelligent home system b does not have access to other electronic devices outside the device included in the intelligent home system b. For example, the user does not have access to any device in the smart home system c. Further, when the access permission level corresponding to the terminal device indicates that the terminal device has permission to access the network device, the terminal device may collect parameter data, which is sent by the network device and used for establishing the connection, and which at least includes the password data. Further, the terminal device successfully establishes a connection with the network device.
Second implementation
A second implementation manner is specifically to receive the parameter data at least including the password data, where the parameter data is obtained by the terminal device after the network device responds to a confirmation operation. Specifically, after the terminal device is in the state to be fed back, in order to ensure that the terminal device is safely connected to the network device, and further ensure the information security of the user, whether the network device allows the data to be sent or not can be manually controlled by the user. For example, in the implementation process, a physical key may be set on the network device, pressing the physical key triggers a condition whether to allow the network device to transmit the data, and when the router responds to an operation of pressing the physical key to allow the network device to transmit the data, the terminal device may receive the parameter data at least including the password data. Furthermore, a confirmation instruction for determining that the network device allows the transmission of the parameter data including at least the cipher data to the terminal device may be transmitted to the network device by another device, for example, another terminal device different from the terminal device. The other terminal device may be a device belonging to the same smart home system as the terminal device, such as a remote controller, a smart phone, a refrigerator, and the like, which are not necessarily exemplified herein. Of course, it is obvious to those skilled in the art that the terminal device may be controlled to receive the parameter data according to the actual use requirement of the user, which is not necessarily exemplified herein.
Third implementation
Referring to fig. 5, when the plurality of network devices in the connection range of the terminal device satisfy the condition, a third implementation manner specifically includes:
s501: obtaining a selection operation for determining the network device from a plurality of candidate network devices in the detection state;
s502: determining the network device from the plurality of candidate network devices in response to the selection operation;
s503: establishing the connection with the network device in accordance with the at least one parameter information.
In the specific implementation process, the specific implementation process of steps S501 to S503 is as follows:
first, a selection operation for determining the network device from a plurality of candidate network devices in the detection state is obtained. For example, when a plurality of candidate network devices satisfy the condition, a prompt message is generated to prompt a user which network devices currently satisfy the condition, for example, when the network devices satisfying the condition include a router F, a router G, a hub H, and a notebook computer I, the prompt message indicates that "the candidate network devices currently satisfying the condition include the router F, the router G, the hub H, and the notebook computer I, and please determine a device to establish a network connection from the candidate network devices |! ". Then, in response to the selecting operation, the network device is determined from the plurality of candidate network devices. That is, after receiving a selection operation of the user for the plurality of candidate network devices, the network device is determined. For example, after the user has selected the router G from the candidate network devices, it is determined that the network device is the router G. That is, when there are a plurality of network devices satisfying the condition, the network device determined to establish a network connection may be manually selected by the end user in order to increase the user's selectivity. Of course, for those skilled in the art, the selection operation for determining the network device from the multiple candidate network devices may also be designed according to the usage habit of the user, which is not described herein again. Then, the terminal device receives parameter data which is sent by the network device and used for establishing the connection and at least comprises password data; further, the terminal device will establish the connection with the network device according to the parameter data.
Fourth mode of implementation
In a specific implementation process, when the plurality of network devices in the connection range of the terminal device satisfy the condition, to ensure the communication quality of the network connection between the terminal device and the network device, specifically, the terminal device may be controlled to establish a connection with a network device having a strong hotspot signal strength based on the signal strengths of hotspots corresponding to the plurality of candidate network devices. Of course, for those skilled in the art, the terminal device may establish the connection with the network device by using the above four implementation manners, and may also establish the connection by using other implementation manners, which is not described herein again.
Example two
Referring to fig. 6, based on the same inventive concept as the embodiment of the present application, an embodiment of the present application further provides a terminal device, including:
a wireless communication apparatus 10 for detecting whether a network device within a connection range satisfies a condition;
the processing device 20 controls the terminal device to be in an acquisition state if the network device in the connection range meets the condition; acquiring data from the network device; and establishing connection with the network equipment according to the data.
In the embodiment of the present application, the wireless communication apparatus 10 may specifically be a communication module in the terminal device.
In the embodiment of the present application, the processing device 20 is further configured to:
obtaining the data from the network device at a current time; or the like, or, alternatively,
the method comprises the steps of obtaining password data from the network equipment at the current moment, obtaining identification data from the network equipment at a first moment before the current moment, and obtaining the data at least comprising the password data and the identification data based on the password data and the identification data.
In the embodiment of the present application, the processing device 20 is further configured to:
collecting data packets which are sent by the network equipment and do not take the terminal equipment as a destination address, wherein the data packets at least comprise data used for determining to send the data to the network equipment so as to establish connection;
processing the data packet to obtain request data;
and sending the request data to the network equipment so as to enable the terminal equipment to be in a state to be fed back.
In this embodiment of the application, after the request data is sent to the network device, so that the terminal device is in a state to be fed back, the processing device 20 is further configured to:
and receiving parameter data which is sent by the network equipment and used for establishing the connection and at least comprises the password data.
In the embodiment of the present application, the processing device 20 is further configured to:
detecting the access authority level corresponding to the terminal equipment;
when the access authority level represents that the terminal equipment has the authority to access the network equipment, executing the following steps: and receiving parameter data which is sent by the network equipment and used for establishing the connection and at least comprises the password data.
In the embodiment of the present application, the processing device 20 is further configured to:
receiving the parameter data including at least the password data, wherein the parameter data is obtained by the terminal device after the network device responds to a confirmation operation.
In the embodiment of the present application, the processing device 20 is further configured to:
obtaining a selection operation for determining the network device from a plurality of candidate network devices in the detection state;
determining the network device from the plurality of candidate network devices in response to the selection operation;
establishing the connection with the network device in accordance with the at least one parameter information.
EXAMPLE III
Referring to fig. 7, based on the same inventive concept as the embodiment of the present application, an embodiment of the present application further provides a terminal device, including:
a first control unit 30, configured to control the terminal device to be in an acquisition state if the network device in the connection range satisfies a condition;
a first acquiring unit 40 configured to acquire data from the network device;
a first establishing unit 50, configured to establish a connection with the network device according to the data.
In the embodiment of the application, a communication protocol on which the terminal device acquires the data is the same as a communication protocol used for establishing the connection.
In the embodiment of the present application, the first control unit 30 is specifically configured to: and if the network equipment exists in the connection range of the terminal equipment and the data path is not established between the terminal equipment and the network equipment, determining that the network equipment meets the condition.
In the embodiment of the present application, the first control unit 30 is specifically configured to:
if the connection range is within the connection range, obtaining identification data from another electronic device;
determining, based on the identification data, that the other electronic device is the network device that can be used to enable the terminal device to access a network;
and if the terminal equipment needs cipher data to establish connection with the network equipment and the terminal equipment does not store the configuration data of the network equipment, determining that a data path is never established between the terminal equipment and the network equipment.
In this embodiment of the present application, the first obtaining unit 40 is specifically configured to:
obtaining the data from the network device at a current time; or the like, or, alternatively,
the method comprises the steps of obtaining password data from the network equipment at the current moment, obtaining identification data from the network equipment at a first moment before the current moment, and obtaining the data at least comprising the password data and the identification data based on the password data and the identification data.
In this embodiment of the present application, before the acquiring data from the network device, the terminal device further includes:
a first collecting unit, configured to collect a data packet that is sent by the network device and does not use the terminal device as a destination address, where the data packet at least includes data used for determining to send to the network device in order to establish a connection;
a first obtaining unit, configured to process the data packet to obtain request data;
and the first sending unit is used for sending the request data to the network equipment so as to enable the terminal equipment to be in a state to be fed back.
In this embodiment of the present application, after sending the request data to the network device to enable the terminal device to be in a state to be fed back, the terminal device further includes:
a first receiving unit, configured to receive parameter data, which is sent by the network device and used for establishing the connection, where the parameter data includes at least password data.
In this embodiment, the terminal device further includes:
the second detection unit is used for detecting the access authority level corresponding to the terminal equipment;
a first processing unit, configured to, when the access permission level indicates that the terminal device has permission to access the network device, execute the following steps: and collecting at least one parameter message which is sent by the network equipment and used for establishing the connection.
In this embodiment, the terminal device further includes:
a second receiving unit that receives the parameter data including at least the cipher data, wherein the parameter data is obtained by the terminal device after the network device responds to a confirmation operation.
In the embodiment of the present application, the first establishing unit 50 includes:
a second obtaining unit that obtains a selection operation for determining the network device from among the plurality of candidate network devices in the detection state;
a second determining unit, configured to determine the network device from the plurality of candidate network devices in response to the selection operation;
a second establishing unit, configured to establish the connection with the network device according to the at least one parameter information.
Through one or more technical solutions in the embodiments of the present application, one or more of the following technical effects can be achieved:
in the technical scheme of the embodiment of the application, if the network equipment in the connection range meets the condition, the terminal equipment is controlled to be in an acquisition state; acquiring data from the network device; and establishing connection with the network equipment according to the data. That is, once the network device in the connection range of the terminal device satisfies the condition, the terminal device is controlled to be in the acquisition state, and then the data from the network device can be acquired, and further, the network connection with the network device can be established according to the data. Therefore, the terminal equipment is ensured to be rapidly accessed to the network, and the technical effect of the network access efficiency of the terminal equipment is improved.
In the technical scheme of the embodiment of the application, the access authority level corresponding to the terminal equipment is detected; when the access authority level represents that the terminal equipment has the authority to access the network equipment, executing the following steps: and receiving parameter data which is sent by the network equipment and used for establishing the connection and at least comprises the password data. Therefore, the connection can be further established with the network equipment only when the terminal equipment has the authority to access the network equipment, so that the network access connection safety of the terminal equipment is realized, and the information safety of a user is ensured.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Specifically, the computer program instructions corresponding to the information processing method in the embodiment of the present application may be stored on a storage medium such as an optical disc, a hard disc, a usb disk, or the like, and when the computer program instructions corresponding to the information processing method in the storage medium are read or executed by an electronic device, the method includes the following steps:
if the network equipment in the connection range meets the condition, controlling the terminal equipment to be in an acquisition state;
acquiring data from the network device;
and establishing connection with the network equipment according to the data.
Optionally, when the computer instructions stored in the storage medium and corresponding to the steps are executed, a communication protocol on which the terminal device obtains the data is the same as a communication protocol used for establishing the connection.
Optionally, the computer instructions stored in the storage medium, when executed, further include:
and if the network equipment exists in the connection range of the terminal equipment and the data path is not established between the terminal equipment and the network equipment, determining that the network equipment meets the condition.
Optionally, the step stored in the storage medium, where if a network device exists in the connection range of the terminal device and no data path is established between the terminal device and the network device, the corresponding computer instructions when executed, include:
if the connection range is within the connection range, obtaining identification data from another electronic device;
determining, based on the identification data, that the other electronic device is the network device that can be used to enable the terminal device to access a network;
and if the terminal equipment needs cipher data to establish connection with the network equipment and the terminal equipment does not store the configuration information of the network equipment, determining that a data path is never established between the terminal equipment and the network equipment. Optionally, the step stored in the storage medium, where the step of acquiring data from the network device corresponds to a computer instruction, when executed, specifically:
detecting the data from the network device at a current time; or the like, or, alternatively,
at the current moment, password data from the network equipment are detected, identification data from the network equipment are obtained at a first moment before the current moment, and data at least comprising the password data and the identification data are obtained based on the password data and the identification data.
Optionally, the steps stored in the storage medium, before the acquiring data from the network device, when executed, include:
collecting data packets which are sent by the network equipment and do not take the terminal equipment as a destination address, wherein the data packets at least comprise data used for determining to send the data to the network equipment so as to establish connection;
processing the data packet to obtain request data;
and sending the request data to the network equipment so as to enable the terminal equipment to be in a state to be fed back.
Optionally, after the step of sending the request data to the network device to enable the terminal device to be in the state to be fed back, the method further includes, when executed, corresponding computer instructions stored in the storage medium:
and receiving parameter data which is sent by the network equipment and used for establishing the connection and at least comprises the password data.
Optionally, the computer instructions stored in the storage medium corresponding to the steps, when executed, the method further comprises:
detecting the access authority level corresponding to the terminal equipment;
when the access authority level represents that the terminal equipment has the authority to access the network equipment, executing the following steps: and receiving parameter data which is sent by the network equipment and used for establishing the connection and at least comprises the password data.
Optionally, the computer instructions stored in the storage medium corresponding to the steps, when executed, the method further comprises:
receiving the parameter data including at least the password data, wherein the parameter data is obtained by the terminal device after the network device responds to a confirmation operation.
Optionally, the computer instructions stored in the storage medium, which establish a connection with the network device according to the data, when executed, include:
obtaining a selection operation for determining the network device from a plurality of candidate network devices in the detection state;
determining the network device from the plurality of candidate network devices in response to the selection operation;
establishing the connection with the network device in accordance with the at least one parameter information.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (11)

1. An information processing method is applied to a terminal device and comprises the following steps:
if the network equipment in the connection range meets the condition, controlling the terminal equipment to be in an acquisition state, wherein if the network equipment in the connection range meets the condition, the method comprises the following steps: if network equipment exists in the connection range of the terminal equipment and a data path is never established between the terminal equipment and the network equipment, determining that the network equipment meets the condition;
wherein, if there is a network device in the connection range of the terminal device and the network device never establish a data path, the method includes: if the connection range is within the connection range, obtaining identification data from another electronic device; determining, based on the identification data, that the other electronic device is the network device that can be used to enable the terminal device to access a network; if the terminal equipment needs cipher data to establish connection with the network equipment and the terminal equipment does not store configuration data of the network equipment, determining that a data path is never established between the terminal equipment and the network equipment;
acquiring data from the network device;
and establishing connection with the network equipment according to the data.
2. The method of claim 1,
the communication protocol on which the terminal device acquires the data is the same as the communication protocol used for establishing the connection.
3. The method according to claim 1, wherein the obtaining data from the network device specifically comprises:
obtaining the data from the network device at a current time; or the like, or, alternatively,
the method comprises the steps of obtaining password data from the network equipment at the current moment, obtaining identification data from the network equipment at a first moment before the current moment, and obtaining the data at least comprising the password data and the identification data based on the password data and the identification data.
4. The method according to claim 1, wherein prior to said obtaining data from said network device, specifically comprising:
collecting data packets which are sent by the network equipment and do not take the terminal equipment as a destination address, wherein the data packets at least comprise data used for determining to send the data to the network equipment so as to establish connection;
processing the data packet to obtain request data;
and sending the request data to the network equipment so as to enable the terminal equipment to be in a state to be fed back.
5. The method of claim 4, wherein after the sending the request data to the network device to place the terminal device in a state to be fed back, the method further comprises:
and receiving parameter data which is sent by the network equipment and used for establishing the connection and at least comprises the password data.
6. The method of claim 5, wherein the method further comprises:
detecting the access authority level corresponding to the terminal equipment;
when the access authority level represents that the terminal equipment has the authority to access the network equipment, executing the following steps: and receiving parameter data which is sent by the network equipment and used for establishing the connection and at least comprises the password data.
7. The method of claim 5, wherein the method further comprises:
receiving the parameter data including at least the password data, wherein the parameter data is obtained by the terminal device after the network device responds to a confirmation operation.
8. The method of claim 5, wherein said establishing a connection with said network device in accordance with said data comprises:
obtaining a selection operation for determining the network device from a plurality of candidate network devices in a detection state;
determining the network device from the plurality of candidate network devices in response to the selection operation;
establishing the connection with the network device according to the parameter data.
9. A terminal device, comprising:
wireless communication means for detecting whether a network device within a connection range satisfies a condition;
the processing device controls the terminal device to be in an acquisition state if the network device in the connection range meets a condition, wherein the process includes the following steps if the network device in the connection range meets the condition: if network equipment exists in the connection range of the terminal equipment and a data path is never established between the terminal equipment and the network equipment, determining that the network equipment meets the condition; acquiring data from the network device; establishing connection with the network equipment according to the data;
wherein, if there is a network device in the connection range of the terminal device and the network device never establish a data path, the method includes: if the connection range is within the connection range, obtaining identification data from another electronic device; determining, based on the identification data, that the other electronic device is the network device that can be used to enable the terminal device to access a network; and if the terminal equipment needs cipher data to establish connection with the network equipment and the terminal equipment does not store the configuration data of the network equipment, determining that a data path is never established between the terminal equipment and the network equipment.
10. The terminal device of claim 9, further characterized in that the processing means is further for:
collecting data packets which are sent by the network equipment and do not take the terminal equipment as a destination address, wherein the data packets at least comprise data used for determining to send the data to the network equipment so as to establish connection;
processing the data packet to obtain request data;
and sending the request data to the network equipment so as to enable the terminal equipment to be in a state to be fed back.
11. A terminal device, comprising:
a first control unit, configured to control the terminal device to be in an acquisition state if a network device in a connection range satisfies a condition, where the first control unit, if the network device in the connection range satisfies the condition, includes: if network equipment exists in the connection range of the terminal equipment and a data path is never established between the terminal equipment and the network equipment, determining that the network equipment meets the condition; wherein, if there is a network device in the connection range of the terminal device and the network device never establish a data path, the method includes: if the connection range is within the connection range, obtaining identification data from another electronic device; determining, based on the identification data, that the other electronic device is the network device that can be used to enable the terminal device to access a network; if the terminal equipment needs cipher data to establish connection with the network equipment and the terminal equipment does not store configuration data of the network equipment, determining that a data path is never established between the terminal equipment and the network equipment;
a first acquisition unit configured to acquire data from the network device;
and the first establishing unit is used for establishing connection with the network equipment according to the data.
CN201610211138.5A 2016-04-06 2016-04-06 Information processing method and terminal equipment Active CN105915416B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610211138.5A CN105915416B (en) 2016-04-06 2016-04-06 Information processing method and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610211138.5A CN105915416B (en) 2016-04-06 2016-04-06 Information processing method and terminal equipment

Publications (2)

Publication Number Publication Date
CN105915416A CN105915416A (en) 2016-08-31
CN105915416B true CN105915416B (en) 2020-03-24

Family

ID=56744735

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610211138.5A Active CN105915416B (en) 2016-04-06 2016-04-06 Information processing method and terminal equipment

Country Status (1)

Country Link
CN (1) CN105915416B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106161608B (en) * 2016-06-29 2019-09-24 联想(北京)有限公司 A kind of information processing method and electronic equipment
DE112016002340B4 (en) 2016-10-27 2024-04-04 Silicon Laboratories Inc. Using one network to bring a second network into operation
CN107483226B (en) * 2017-07-04 2022-02-22 联想(北京)有限公司 Information processing method and electronic equipment
CN110730114B (en) * 2019-09-02 2021-02-12 华为技术有限公司 Method and equipment for configuring network configuration information

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104375497A (en) * 2014-12-15 2015-02-25 广东美的厨房电器制造有限公司 Smart home, smart home control method, control system and electronic equipment
CN104506397A (en) * 2014-12-09 2015-04-08 深圳市共进电子股份有限公司 Method and system for intelligent equipment to be accessed into local area network
CN104754495A (en) * 2015-03-18 2015-07-01 联想(北京)有限公司 Smart household device connecting method and smart terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130214909A1 (en) * 2012-02-22 2013-08-22 Qualcomm Incorporated Airplane mode for wireless transmitter device and system using short-range wireless broadcasts
CN104902500B (en) * 2015-05-21 2019-11-22 南京创维信息技术研究院有限公司 The automatic connection method and system of Wireless Communication Equipment and radio reception device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506397A (en) * 2014-12-09 2015-04-08 深圳市共进电子股份有限公司 Method and system for intelligent equipment to be accessed into local area network
CN104375497A (en) * 2014-12-15 2015-02-25 广东美的厨房电器制造有限公司 Smart home, smart home control method, control system and electronic equipment
CN104754495A (en) * 2015-03-18 2015-07-01 联想(北京)有限公司 Smart household device connecting method and smart terminal

Also Published As

Publication number Publication date
CN105915416A (en) 2016-08-31

Similar Documents

Publication Publication Date Title
EP3484196B1 (en) Method and apparatus for registering wireless device in wireless communication system
US9801120B2 (en) Client-initiated tethering for electronic devices
KR102478098B1 (en) Method and apparatus for controlling visitor calling in home network system
US10063546B2 (en) Network access control method and apparatus
CN110740460B (en) Network access method and device of equipment, network equipment and storage medium
US9204470B2 (en) Method for a wireless target device to automatically connect to a target network, wireless network system with automatic network setting ability, and wireless target device thereof
US9572190B2 (en) Device and method for associating with WiFi networks
CN107113892B (en) Method and device for automatically networking gateway equipment
KR101328779B1 (en) Mobile terminal, server and information providing method using the same
JP6254747B2 (en) Information providing method, apparatus, program, and recording medium
KR102392472B1 (en) Method and apparatus for managing of a network hub in wireless communication system
CN105915416B (en) Information processing method and terminal equipment
CN110636483A (en) Network distribution method and system
EP2999250B1 (en) Method and apparatus for interconnection between terminal device and gateway device
CN105578470A (en) Method for accessing to network by device of internet of things, device and system
EP3869112B1 (en) Air-conditioning device control method and air-conditioning device
CN105392185B (en) A kind of networking method of smart machine, apparatus and system
CN112152853A (en) Equipment network distribution method and device, computer-readable storage medium and electronic device
EP3364690B1 (en) Electronic device and communication method of electronic device
EP3284310B1 (en) Method and apparatus for end device discovering another end device
CN111163469A (en) Network distribution method of intelligent household appliance, wireless module and intelligent household appliance
KR102214940B1 (en) Method and apparatus for registering wireless device in wireless communication system
JP2016096575A5 (en)
JP2016192706A (en) Information collection system, relay terminal, connection control method of relay terminal with center system, sensor terminal, connection control method of sensor terminal with center system
KR102301414B1 (en) Method and apparatus for transmitting and receing information between devices in a wireless communictaion system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant