CN110809269A - Network access method based on ZigBee private network access commission system - Google Patents
Network access method based on ZigBee private network access commission system Download PDFInfo
- Publication number
- CN110809269A CN110809269A CN201911081857.XA CN201911081857A CN110809269A CN 110809269 A CN110809269 A CN 110809269A CN 201911081857 A CN201911081857 A CN 201911081857A CN 110809269 A CN110809269 A CN 110809269A
- Authority
- CN
- China
- Prior art keywords
- network access
- peripheral
- node
- network
- nodes
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention discloses a network access method based on a ZigBee private network access authorized system, which realizes a network access authentication process and a configuration process through an authorized system, wherein the authorized system comprises a central node, peripheral nodes and UI (user interface) application, the peripheral nodes are one or more, and the network access authentication process is as follows: adding peripheral nodes and setting parameters in UI application, triggering the peripheral nodes to allow network access through the UI application, triggering the delegation process of the peripheral nodes, and performing feature authentication on the peripheral nodes by the central node; the configuration process is as follows: the peripheral nodes enter a to-be-configured state after being authenticated by the central node, the central node sends a peripheral node message, the validity of the verification of the peripheral nodes is good, and the peripheral nodes are set.
Description
Technical Field
The invention relates to the technical field of private network access, in particular to a network access method based on a ZigBee private network access commission.
Background
ZigBee is a wireless communication protocol, and commission (commission) generally comprises two functions of authentication and configuration, wherein the authentication solves the problem that only authorized equipment can access the network, and the configuration solves the problem that the authorized equipment needs to be initialized necessarily before use.
At present, two kinds of communion systems, namely ez-mode and touchlink, are provided by standard ZigBee, ez-mode is suitable for HA network, and is established on the basis of endpoint binding, and the processes of network guiding, searching and binding are divided, wherein the network guiding refers to finding an open network, the searching and binding refers to checking whether a device application HAs a cluster capable of being bound to an endpoint, and if so, the device application is bound; touchlink is applicable to ZLL networks, a connection mode in which two devices are connected to each other when they are close to each other, and binding and configuration operations are performed using this connection mode.
Because of the definition of the standard, ez-mode must be built on the basis of supporting ZDO, and private networks generally do not need to support complex ZDO; touchlink is also a standard which needs to support ZLL definition, has higher requirements on distance, and has difficulty in application to equipment which is difficult to reach the installation position, so that in a ZigBee private network, a network access authentication protocol which can give consideration to both the convenience of operation and guarantee certain network privacy is designed, and the protocol is applied to a ZigBee network system.
Disclosure of Invention
The invention aims to provide a network access method based on a ZigBee private network access commission system, which has the advantages of flexible network access authentication process and convenient operation, and can realize single-node network access, multi-node simultaneous network access and multi-node sequential network access.
In order to achieve the purpose, the invention adopts the technical scheme that: a network access method based on a ZigBee private network access authorized system realizes a network access authentication process and a configuration process through an authorized system, the authorized system comprises a central node, a peripheral node and UI application, and the network access authentication process comprises the following steps: adding peripheral nodes and setting parameters in UI application, triggering the peripheral nodes to allow network access through the UI application, triggering the delegation process of the peripheral nodes, and performing feature authentication on the peripheral nodes by the central node; the configuration process comprises the following steps: after the authentication of the peripheral node by the central node is passed, the peripheral node enters a state to be configured, the central node sends a peripheral node message, the verification validity of the peripheral node is good, and the peripheral node is set.
As a further optimization, the central node is a ZigBee network coordinator.
As a further optimization, the central node is a bridge node of ZigBee-WLAN or ZigBee-Ethernet.
As a further optimization, the peripheral nodes comprise ZigBee network routing nodes and terminal nodes.
As further optimization, the peripheral node comprises three characteristic character strings of a manufacturer name, a product name and a product serial number, wherein the product serial number is a physical address using ZigBee equipment and has 16 characters in total, namely MAC; manufacturer name and product name the term "manufacturer name: the format of the product name is combined into another characteristic character string, which is a product character string, PS for short.
As a further optimization, the UI application is a web application or an APP application.
As a further optimization, the peripheral nodes are single or multiple.
As a further optimization, the authentication and network access process of a single peripheral node is as follows: and selecting a peripheral node to be accessed to the network in the UI application, triggering the network access permission in the UI application, triggering the commission process of the peripheral node to be accessed to the network, and allowing the network access when the central node detects that the peripheral node conforms to the previous selection, or else, removing the network.
As a further optimization, the one-time authentication network access process of the plurality of peripheral nodes is as follows: selecting each peripheral node to be selected to be accessed to the network in UI application, inputting the MAC of the peripheral nodes to distinguish each other, finishing the addition of all the peripheral nodes, triggering the allowed network access in the UI application, triggering the commission process of all the peripheral nodes to be accessed to the network, detecting that the PS and MAC combination of the peripheral nodes accords with any previous record by the central node, allowing the network access, otherwise, rejecting the network.
As a further optimization, the sequential authentication and network access process of the plurality of peripheral nodes is as follows: and triggering network access permission in UI application, scanning bar codes or two-dimensional codes on the shells of the peripheral nodes through cameras or code scanning guns connected with the UI application, triggering a delegation process of the peripheral nodes to be accessed to the network, detecting that PS and MAC of the peripheral nodes are consistent with information input by code scanning by a central node, allowing the network access, otherwise, rejecting the network, repeatedly scanning the codes and triggering the operation of the delegation process of the peripheral nodes until all the peripheral nodes are completely accessed to the network.
Compared with the prior art, the invention has the following beneficial effects: the network access authentication process is flexible, single-node network access, multi-node simultaneous network access and multi-node sequential network access can be realized, the multi-node simultaneous network access process can separate project configuration and field debugging of system integration, the project configuration is completed before installation, and the field debugging only needs to trigger a commission process; the multi-node network access process can be combined with code scanning equipment to quickly complete network access of multiple devices.
Detailed Description
The following are specific examples of the present invention and further describe the technical solutions of the present invention, but the present invention is not limited to these examples.
Example one
A network access method based on a ZigBee private network access authorized system realizes a network access authentication process and a configuration process through an authorized system, the authorized system comprises a central node, peripheral nodes and UI application, one peripheral node is provided, and the network access authentication process is as follows: adding peripheral nodes and setting parameters in UI application, triggering the peripheral nodes to allow network access through the UI application, triggering the delegation process of the peripheral nodes, and performing feature authentication on the peripheral nodes by the central node; the configuration process is as follows: after the authentication of the peripheral node by the central node is passed, the peripheral node enters a state to be configured, the central node sends a peripheral node message, the verification validity of the peripheral node is good, and the peripheral node is set.
The central node is a ZigBee network coordinator; the central node is a bridge node of ZigBee-WLAN or ZigBee-Ethernet.
The peripheral nodes comprise ZigBee network routing nodes and terminal nodes; the peripheral node comprises three characteristic character strings of a manufacturer name, a product name and a product serial number.
The UI application is a web application or an APP application.
Specifically, the authentication and network access process of a single peripheral node is as follows: and selecting a peripheral node to be accessed to the network in the UI application, triggering the network access permission in the UI application, triggering the commission process of the peripheral node to be accessed to the network, and allowing the network access when the central node detects that the peripheral node conforms to the previous selection, or else, removing the network.
Example two
A network access method based on a ZigBee private network access authorized system realizes a network access authentication process and a configuration process through an authorized system, the authorized system comprises a central node, a plurality of peripheral nodes and UI (user interface) applications, and the network access authentication process comprises the following steps: adding peripheral nodes and setting parameters in UI application, triggering the peripheral nodes to allow network access through the UI application, triggering the delegation process of the peripheral nodes, and performing feature authentication on the peripheral nodes by the central node; the configuration process is as follows: after the authentication of the peripheral node by the central node is passed, the peripheral node enters a state to be configured, the central node sends a peripheral node message, the verification validity of the peripheral node is good, and the peripheral node is set.
The central node is a ZigBee network coordinator; the central node is a bridge node of ZigBee-WLAN or ZigBee-Ethernet.
The peripheral nodes comprise ZigBee network routing nodes and terminal nodes; the peripheral node comprises three characteristic character strings of a manufacturer name, a product name and a product serial number.
The UI application is a web application or an APP application.
Specifically, the one-time authentication network access process of the plurality of peripheral nodes is as follows: selecting each peripheral node to be selected to be accessed to the network in UI application, inputting the MAC of the peripheral nodes to distinguish each other, finishing the addition of all the peripheral nodes, triggering the allowed network access in the UI application, triggering the commission process of all the peripheral nodes to be accessed to the network, detecting that the PS and MAC combination of the peripheral nodes accords with any previous record by the central node, allowing the network access, otherwise, rejecting the network.
EXAMPLE III
A network access method based on a ZigBee private network access authorized system realizes a network access authentication process and a configuration process through an authorized system, the authorized system comprises a central node, a plurality of peripheral nodes and UI (user interface) applications, and the network access authentication process comprises the following steps: adding peripheral nodes and setting parameters in UI application, triggering the peripheral nodes to allow network access through the UI application, triggering the delegation process of the peripheral nodes, and performing feature authentication on the peripheral nodes by the central node; the configuration process is as follows: after the authentication of the peripheral node by the central node is passed, the peripheral node enters a state to be configured, the central node sends a peripheral node message, the verification validity of the peripheral node is good, and the peripheral node is set.
The central node is a ZigBee network coordinator; the central node is a bridge node of ZigBee-WLAN or ZigBee-Ethernet.
The peripheral nodes comprise ZigBee network routing nodes and terminal nodes; the peripheral node comprises three characteristic character strings of a manufacturer name, a product name and a product serial number.
The UI application is a web application or an APP application.
Specifically, the process of sequentially authenticating and accessing the network by the plurality of peripheral nodes is as follows: and triggering network access permission in UI application, scanning bar codes or two-dimensional codes on the shells of the peripheral nodes through cameras or code scanning guns connected with the UI application, triggering a delegation process of the peripheral nodes to be accessed to the network, detecting that PS and MAC of the peripheral nodes are consistent with information input by code scanning by a central node, allowing the network access, otherwise, rejecting the network, repeatedly scanning the codes and triggering the operation of the delegation process of the peripheral nodes until all the peripheral nodes are completely accessed to the network.
The specific embodiments described herein are merely illustrative of the spirit of the invention. Various modifications or additions may be made to the described embodiments or alternatives may be employed by those skilled in the art without departing from the spirit or ambit of the invention as defined in the appended claims.
Claims (10)
1. A network access method based on a ZigBee private network access authorized system is characterized in that a network access authentication process and a configuration process are realized through an authorized system, the authorized system comprises a central node, a peripheral node and a UI application, and the network access authentication process comprises the following steps: adding peripheral nodes and setting parameters in UI application, triggering the peripheral nodes to allow network access through the UI application, triggering the delegation process of the peripheral nodes, and performing feature authentication on the peripheral nodes by the central node; the configuration process comprises the following steps: after the authentication of the peripheral node by the central node is passed, the peripheral node enters a state to be configured, the central node sends a peripheral node message, the verification validity of the peripheral node is good, and the peripheral node is set.
2. The network access method based on the ZigBee private network access commission family of claim 1, wherein the central node is a ZigBee network coordinator.
3. The network access method based on the ZigBee private network access commission family of claim 2, wherein the central node is a bridge node of ZigBee-WLAN or ZigBee-Ethernet.
4. The network access method based on the ZigBee private network access commission family of claim 1, wherein the peripheral nodes comprise ZigBee network routing nodes and terminal nodes.
5. The network entry method based on the ZigBee private network entry commission system of claim 4, wherein the peripheral node comprises three characteristic character strings of a manufacturer name, a product name and a product serial number.
6. The network accessing method based on the ZigBee private network accessing principal according to claim 1, wherein the UI application is a web application or an APP application.
7. The network accessing method based on the ZigBee private network access commission family of claim 1, wherein the peripheral nodes are single or multiple.
8. The network access method based on the ZigBee private network access commission system of claim 7, wherein the single peripheral node authentication network access process is as follows: and selecting a peripheral node to be accessed to the network in the UI application, triggering the network access permission in the UI application, triggering the commission process of the peripheral node to be accessed to the network, and allowing the network access when the central node detects that the peripheral node conforms to the previous selection, or else, removing the network.
9. The network access method based on the ZigBee private network access commission system of claim 7, wherein the one-time authentication network access process of a plurality of peripheral nodes is as follows: selecting each peripheral node to be selected to be accessed to the network in UI application, inputting the MAC of the peripheral nodes to distinguish each other, finishing the addition of all the peripheral nodes, triggering the allowed network access in the UI application, triggering the commission process of all the peripheral nodes to be accessed to the network, detecting that the PS and MAC combination of the peripheral nodes accords with any previous record by the central node, allowing the network access, otherwise, rejecting the network.
10. The network access method based on the ZigBee private network access delegation system of claim 7, wherein the sequential authentication and network access process of a plurality of peripheral nodes is as follows: and triggering network access permission in UI application, scanning bar codes or two-dimensional codes on the shells of the peripheral nodes through cameras or code scanning guns connected with the UI application, triggering a delegation process of the peripheral nodes to be accessed to the network, detecting that PS and MAC of the peripheral nodes are consistent with information input by code scanning by a central node, allowing the network access, otherwise, rejecting the network, repeatedly scanning the codes and triggering the operation of the delegation process of the peripheral nodes until all the peripheral nodes are completely accessed to the network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911081857.XA CN110809269A (en) | 2019-11-07 | 2019-11-07 | Network access method based on ZigBee private network access commission system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911081857.XA CN110809269A (en) | 2019-11-07 | 2019-11-07 | Network access method based on ZigBee private network access commission system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110809269A true CN110809269A (en) | 2020-02-18 |
Family
ID=69501499
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911081857.XA Pending CN110809269A (en) | 2019-11-07 | 2019-11-07 | Network access method based on ZigBee private network access commission system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110809269A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102752753A (en) * | 2012-06-21 | 2012-10-24 | 中兴通讯股份有限公司 | Method for controlling ZigBee network and wireless mobile terminal |
CN104469986A (en) * | 2014-11-28 | 2015-03-25 | 四川长虹电器股份有限公司 | ZIGBEE equipment networking method |
CN107333265A (en) * | 2017-08-24 | 2017-11-07 | 四川长虹电器股份有限公司 | A kind of zigbee equipment method of network entry |
CN109819427A (en) * | 2019-03-06 | 2019-05-28 | 乐鑫信息科技(上海)股份有限公司 | Method for the starting configuration of bluetooth Mesh network |
-
2019
- 2019-11-07 CN CN201911081857.XA patent/CN110809269A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102752753A (en) * | 2012-06-21 | 2012-10-24 | 中兴通讯股份有限公司 | Method for controlling ZigBee network and wireless mobile terminal |
CN104469986A (en) * | 2014-11-28 | 2015-03-25 | 四川长虹电器股份有限公司 | ZIGBEE equipment networking method |
CN107333265A (en) * | 2017-08-24 | 2017-11-07 | 四川长虹电器股份有限公司 | A kind of zigbee equipment method of network entry |
CN109819427A (en) * | 2019-03-06 | 2019-05-28 | 乐鑫信息科技(上海)股份有限公司 | Method for the starting configuration of bluetooth Mesh network |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108111375A (en) | Equipment method of network entry, device, are waited to network and log equipment intelligent terminal | |
Han et al. | Automotive cybersecurity for in-vehicle communication | |
CN104796969A (en) | Network accessing method and system for equipment of internet of things on basis of recognition codes of internet of things | |
CN103281752A (en) | WIFI (wireless fidelity) network access method and device, electronic equipment and communication system | |
US10581849B2 (en) | Data packet transmission method, data packet authentication method, and server thereof | |
CN103281759A (en) | WIFI (wireless fidelity) network access method and device, electronic equipment and communication system | |
CN105636161B (en) | Access method, apparatus, communication terminal and the wireless network access point of wireless network | |
KR20120072557A (en) | Mobile terminal, server and information providing method using the same | |
CN106488453A (en) | A kind of method and system of portal certification | |
CN103369529A (en) | Identity authentication method, access point (AP) and access controller (AC) | |
CN103906055B (en) | Business datum shunt method and system | |
CN104394533A (en) | WiFi (wireless fidelity) connection method, server and terminal | |
CN104219626B (en) | A kind of identity authentication method and device | |
CN105050086A (en) | Method for terminal to log in Wifi hotspot | |
CN104869121A (en) | 802.1x-based authentication method and device | |
CN101697550A (en) | Method and system for controlling access authority of double-protocol-stack network | |
CN104640112A (en) | Authentication method, device and system | |
CN105992162A (en) | Method for communication through multicast frame embedded data under unrelated WIFI environment | |
CN103441842A (en) | System and method for controlling internet of things terminal M2M access | |
CN110809269A (en) | Network access method based on ZigBee private network access commission system | |
CN104168564A (en) | Authentication method and device based on GPRS network and integrated identification network | |
CN108540974B (en) | Communication method and device based on physical address | |
CN106535189B (en) | Network access control information configuration method and device and exit gateway | |
WO2022161203A1 (en) | Network access method and apparatus for intelligent device, and intelligent device | |
WO2019015660A1 (en) | Method and device for generating and injecting simlock password |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200218 |
|
RJ01 | Rejection of invention patent application after publication |