CN112637853A - Networking and network distribution method and related device - Google Patents

Networking and network distribution method and related device Download PDF

Info

Publication number
CN112637853A
CN112637853A CN202011564906.8A CN202011564906A CN112637853A CN 112637853 A CN112637853 A CN 112637853A CN 202011564906 A CN202011564906 A CN 202011564906A CN 112637853 A CN112637853 A CN 112637853A
Authority
CN
China
Prior art keywords
private
authentication request
networking authentication
networking
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011564906.8A
Other languages
Chinese (zh)
Other versions
CN112637853B (en
Inventor
夏春江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Tuya Information Technology Co Ltd
Original Assignee
Hangzhou Tuya Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Tuya Information Technology Co Ltd filed Critical Hangzhou Tuya Information Technology Co Ltd
Priority to CN202011564906.8A priority Critical patent/CN112637853B/en
Publication of CN112637853A publication Critical patent/CN112637853A/en
Application granted granted Critical
Publication of CN112637853B publication Critical patent/CN112637853B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Abstract

The application discloses a networking and distribution method and a first-closing device, wherein the method comprises the following steps: acquiring a target management frame sent by a control terminal; analyzing the target management frame to obtain a private identification; generating a networking authentication request based on the private identity; and sending the networking authentication request to a gateway device to request to be connected with the gateway device. According to the technical scheme, risks in a network distribution and a network connection process are reduced, and therefore the network distribution of the equipment to be distributed can be realized more safely.

Description

Networking and network distribution method and related device
Technical Field
The application relates to the technical field of intelligent security and protection, in particular to a networking and network distribution method and a related device.
Background
The existing wifi packaged product distribution network and networking mode is mainly a full-automatic distribution network and networking mode based on a modified and packaged wifi management frame. However, in the existing networking and distribution network processes, two problems exist, firstly, the Beacon broadcasted by the router gateway is easily grabbed by surrounding wireless monitoring equipment, and a larger security risk exists. Second, connect the router gateway through standard encryption mode wifi agreement, need carry out authentication in advance earlier, carry out four times again and shake hands and confirm the exactness of wifi secret key, just can encrypt data transmission at last, just so cause the networking process complicated, the networking speed is slow and then makes the networking and join in marriage net efficiency lower, so need a technical scheme that can solve above-mentioned technical problem.
Disclosure of Invention
The technical problem mainly solved by the application is to provide a networking method, a network distribution method and a related device, which reduce the risk of network distribution and the risk of the networking process, and further realize safer network distribution for equipment to be networked.
In order to solve the technical problem, the application adopts a technical scheme that: there is provided a method of networking, the method comprising:
acquiring a target management frame sent by a control terminal;
analyzing the target management frame to obtain a private identification;
generating a networking authentication request based on the private identity;
and sending the networking authentication request to a gateway device to request to be connected with the gateway device.
In order to solve the above technical problem, another technical solution adopted by the present application is: a network distribution method is provided, and the method comprises the following steps:
acquiring a networking authentication request sent by equipment to be distributed;
judging whether the networking authentication request comprises a preset private identification or not;
if so, sending a response frame to the equipment to be networked, and configuring network bandwidth resources for the equipment to be networked to complete networking authentication.
In order to solve the above technical problem, the present application adopts another technical solution: an electronic device is provided that includes a processor, and memory and communication circuitry coupled with the processor; wherein,
the communication circuit is used for communicating with other electronic equipment;
the memory is used for storing a computer program;
the processor is adapted to run the computer program to perform the method as described above.
In order to solve the above technical problem, the present application adopts another technical solution that: there is provided a computer readable storage medium storing a computer program executable by a processor for implementing the method as described above.
The beneficial effect of this application is: different from the situation in the prior art, according to the technical scheme provided by the application, the obtained target management frame is analyzed by obtaining the target management frame sent by the control terminal, so that the private identification in the target management frame is obtained, finally, the networking authentication request is generated based on the obtained private identification, and is sent to the gateway equipment so as to request to be connected with the gateway equipment.
Drawings
Fig. 1 is a schematic flowchart illustrating a networking method according to an embodiment of the present application;
fig. 2 is a schematic flow chart of another embodiment of a networking method according to the present application;
fig. 3 is a schematic flowchart of an embodiment of a method for network distribution according to the present application;
fig. 4 is a schematic flow chart of another embodiment of a network distribution method according to the present application;
fig. 5 is a schematic flow chart of a network distribution method according to another embodiment of the present application;
fig. 6 is a schematic flowchart of a distribution network method according to another embodiment of the present application;
FIG. 7 is a schematic structural diagram of an embodiment of an electronic device according to the present application;
fig. 8 is a schematic structural diagram of an embodiment of a computer-readable storage medium according to the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the description of the present application, "plurality" means at least two, e.g., two, three, etc., unless explicitly specifically limited otherwise. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
Referring to fig. 1, fig. 1 is a schematic flow chart of an embodiment of a networking method according to the present application. In the current embodiment, the method provided by the present application includes steps S110 to S140.
S110: and acquiring a target management frame sent by the control terminal.
In the technical scheme provided by the application, when the equipment to be networked needs to be connected to the gateway equipment, or when the gateway equipment is newly used for the network distribution of each equipment to be networked, the control terminal sends the target management frame outwards, so that the private identification used for networking is sent to the control terminal, and meanwhile, the private identification needed when the network distribution is carried out on the equipment to be networked is sent to the gateway equipment. It should be noted that the number of the devices to be networked may be one or multiple. In the technical scheme provided by the application, the number of the devices to be networked is not limited, and can be set according to actual requirements.
Further, the control terminal sends the target management frame to the outside only when the device to be configured needs to be connected to the gateway device to be connected to the network or when the gateway device is newly configured for each device to be configured, and the control terminal does not send the target management frame to the outside at other times, so that the target management frame is prevented from being monitored by other unrelated devices.
Furthermore, each device to be configured acquires the target management frame broadcast by the control terminal by monitoring the signaling broadcast by the external control terminal.
Further, in another embodiment, the control terminal may also send the target management frame directionally. Specifically, the control terminal directly sends the target management frame to the device to be configured and the gateway device. During the period, the control terminal does not send the target management frame to other devices, so that other unrelated devices are prevented from obtaining the target management frame, the control terminal can further reduce the networking risk of the device to be networked through directionally sending the target management frame, and the networking safety of the device to be networked is improved.
The device to be configured is a device which needs to access the gateway device. In some embodiments, the device to be networked may also be understood as a device connected to the gateway device, where network bandwidth resources need to be adjusted, such as: when the gateway device needs to adjust the network resources of one or more connected devices, the device that needs to adjust the bandwidth resources and is already connected to the gateway device is also referred to as a device to be networked. Further, the device to be networked includes: the system comprises a network camera, a network television, an intelligent sound box, a Tianmao demon and the like. Furthermore, when the network to be distributed includes a plurality of devices, it is not limited herein that the plurality of devices to be distributed are the same type of device, that is, the plurality of devices to be distributed under the same gateway device may be different types of devices.
The control terminal is a terminal capable of sending message instructions to the equipment to be networked and to the gateway equipment. Further, the control terminal includes one or more of a smartphone, a tablet, a computer device, and the like. Furthermore, the control terminal is a terminal which runs the corresponding APP in the scheme and correspondingly logs in the APP account, if a plurality of control terminals exist, the current effective control terminal is the terminal which logs in the APP account, and other terminals which do not log in the APP account correspondingly do not have the authority to externally send the target management frame.
After the network to be distributed device obtains the target management frame sent by the control terminal through monitoring, the following step S120 is further executed.
S120: and analyzing the target management frame to obtain the private identification.
After the device to be distributed acquires the target management frame sent by the control terminal, the acquired target management frame is further analyzed, so that a private identifier for networking is obtained from the target management frame. The target management frame is a data frame which is sent by the control terminal and carries a private identification, and the private identification is identification information which is set by a user through the control terminal and is used for networking authentication. The specific content of the private identity is set by a user, and is not listed. As in an embodiment, the private identity may be "tuya"; in another embodiment, the private identity may also be "beauty"; in yet another embodiment, the private identification may also include a set symbol and/or number, such as "@ #", "@ 520" may be used.
Further, the target management frame includes: a probe request frame. It is understood that in other embodiments, the target management frame may also include other types of frames, which are not listed here.
S130: a networking authentication request is generated based on the private identity.
And after the network to be distributed equipment acquires the private identification, generating a networking authentication request based on the private identification. The networking authentication request is a request sent by the network equipment to be distributed to the gateway equipment.
Further, the generating a networking authentication request based on the private identity further includes: and encapsulating the private identity into an association request frame to serve as a networking authentication request.
Wherein the association request frame includes: an association request frame.
Further, when the association request frame is an association request frame, the above steps encapsulate the private identity into a reserved field of the association request frame. Wherein the reserved field includes an SSID field.
Further, in an embodiment, when the private identity includes the preset network bandwidth resource priority identity information at the same time, encapsulating the private identity into the association request frame in the corresponding step further includes: and packaging the network bandwidth resource priority identification information into an association request frame so as to identify the priority configuration sequence of the network bandwidth resources of different terminals to the gateway equipment. The method comprises the steps of packaging a private identification comprising preset network bandwidth resource priority identification information into an association request frame, providing the private identification for networking authentication for gateway equipment, and feeding back the network bandwidth resource priority of equipment to be configured, which is set by a user, to the gateway equipment, so that the gateway equipment can not configure the network bandwidth resources for each equipment to be configured according to the network bandwidth resource priority.
The network bandwidth resource priority identification information is identification information which is preset by a user and used for identifying the priority sequence of bandwidth resource allocation of one or more devices to be allocated with the network. When the gateway device allocates the network resources to the outside, the gateway device preferentially allocates the network resources to the device to be allocated with the higher priority of the network bandwidth resources. Furthermore, when the network bandwidth resources are in a short amount in a certain period of time, the gateway device may adjust the ratio of the network bandwidth resources of each device to be configured (including the device connected to the current gateway device) according to the network bandwidth resource priority identification information in the received target management frame, so as to preferentially ensure the network bandwidth resources of the device to be configured with a higher network bandwidth resource priority.
Further, in another embodiment, the network bandwidth resource priority identification information and the private identification are independent from each other, and at this time, the network bandwidth resource priority identification information is also encapsulated into the association request frame at the same time when the private identification is encapsulated into the association request frame. Furthermore, since the control terminal sends the target management frame to the device to be networked and the gateway device for networking simultaneously, the gateway device may obtain the network bandwidth resource priority identification information in advance, and therefore, in an embodiment, the device to be networked may also encapsulate only the private identification for networking authentication into the association request frame, without encapsulating the network bandwidth resource priority identification information into the association request frame as well, which may increase security, adapt to user requirements, and further increase the networking rate.
S140: the networking authentication request is sent to the gateway device to request a connection with the gateway device.
After the network to be distributed equipment acquires the private identification and generates a networking authentication request based on the private identification, the generated networking authentication request is further sent to the gateway equipment, and then the request is connected with the gateway equipment.
Further, if a plurality of connected gateway devices can be selected at the same time, step S140 further includes: the networking authentication request is sent to multiple gateway devices simultaneously.
Further, if a plurality of connected gateway devices can be selected at the same time, step S140 further includes: the networking authentication request is sent to the gateway device with the best network signal.
Further, if a plurality of connected gateway devices can be selected at the same time, step S140 further includes: and sending the networking authentication request to the gateway equipment with the best historical quality service.
Further, if a plurality of connected gateway devices can be selected at the same time, step S140 further includes: and sending the networking authentication request to the common gateway equipment.
In an embodiment, when the device to be networked is a network camera, the target management frame is a probe request frame, and the association request frame is an association request frame, the technical solution provided by the present application is as follows: when a network needs to be distributed, the control terminal encapsulates the private identification used for networking authentication into a probe request frame, and the private identification is sent to the equipment to be distributed and the gateway equipment by broadcasting the probe request frame outwards. And monitoring the signaling broadcast by the external terminal equipment by the equipment to be distributed to acquire the target management frame. Specifically, after receiving a probe request frame broadcast by the control terminal, the device to be configured further parses the probe request frame, and further acquires a private identifier encapsulated in the probe request frame, and the device to be configured further encapsulates the acquired private identifier into an SSID field in an association request frame, and then sends the association request frame (networking authentication request) encapsulated with the private identifier to the gateway device to request connection with the gateway device. After receiving an association request frame sent by a device to be configured, a gateway device further analyzes the association request frame to obtain a private identifier, compares the private identifier obtained from the association request frame with a private identifier in a target management frame sent by a control terminal, and if the two private identifiers are consistent, responds to a networking authentication request of the device to be configured and sends a response frame (association response frame) to the device to be configured, and simultaneously allocates network bandwidth resources to the device to be configured; otherwise, if the two private identifications are not consistent after comparison, the networking authentication request of the equipment to be distributed cannot be responded. When the response frame sent by the gateway device is received, it can be determined that the current device to be networked has completed networking pre-authentication. If the device to be networked is a network camera and the gateway device is a router gateway, the pre-authentication of wifi is already completed after the network camera receives the association response frame.
According to the technical scheme provided by the application figure 1, the acquired target management frame is analyzed by acquiring the target management frame sent by the control terminal, and then the private identification in the target management frame is acquired, and finally, the networking authentication request is generated based on the acquired private identification and sent to the gateway equipment so as to request to be connected with the gateway equipment.
Referring to fig. 2, fig. 2 is a schematic flowchart illustrating another embodiment of a networking method according to the present application. In the current embodiment, the method provided by the present application includes:
s201: and acquiring a target management frame sent by the control terminal.
Step S201 in the current embodiment is the same as step S110, and is not repeated here, and specifically, refer to the description in the corresponding part above.
Further, in an embodiment, when the network connection to be established between the device to be configured and the gateway device is a wireless connection and the gateway device is a router gateway, after the step S201 acquires the target management frame sent by the terminal device, the method provided in the present application further includes: and switching the wireless module to a management mode. After the device to be networked acquires the target management frame sent by the control terminal, the wireless module of the device to be networked is switched to the management mode, namely the device to be networked switches wifi to the managed mode.
In the current embodiment, to further increase the security of the distribution network, when encapsulating the private identifier into the target management frame, the control terminal first encodes the private identifier encapsulated into the target management frame, thereby further increasing the security of the distribution network. It should be noted that, the encoding rule according to which the encoding operation is performed on the private identifier is preset, and is not limited herein. The step S120 of parsing the target management frame to obtain the private identity further includes steps S202 to S203.
S202: and analyzing the target management frame to obtain a preset mark.
After the target management frame is acquired, analyzing the target management frame, and correspondingly acquiring the preset mark. The preset mark is data obtained after the control terminal encodes the private identity, and the preset mark can also be understood as the private identity after the encoding operation is completed. Therefore, in the current embodiment, after the device to be networked acquires the target management frame, the device to be networked correspondingly acquires the preset mark after analyzing the target management frame.
S203: the preset mark is decoded to obtain the private identity.
After the preset mark is obtained, the preset mark is further decoded, and then a private identity for networking authentication is obtained. And the decoding operation executed by the equipment end to be configured corresponds to the encoding operation at one side of the control terminal.
S204: a networking authentication request is generated based on the private identity.
S205: the networking authentication request is sent to the gateway device to request a connection with the gateway device.
Steps S204 to S205 are the same as steps S130 and S140, and may specifically refer to the description of the corresponding parts above, which are not repeated herein.
S206: and monitoring whether a response frame sent by the gateway equipment is received within a set time.
After the network to be distributed equipment sends the networking authentication request to the gateway equipment, the network to be distributed equipment further monitors whether a response frame sent by the gateway equipment is received within a set time. The preset time is a preset waiting time, and the length of the preset time is not limited herein, specifically based on actual setting. The response frame is a data frame which is sent to the equipment to be distributed to inform the equipment to be distributed of responding to the networking authentication request after the gateway equipment determines that the private identity to be verified in the networking authentication request sent by the equipment to be distributed is consistent with the private identity sent by the control terminal and responds to the networking authentication request of the equipment to be distributed.
S207: and if not, the networking authentication request is sent to the gateway equipment again.
If the device to be networked does not receive the response frame sent by the gateway device within the set time, the device to be networked resends the networking authentication request generated in step S204 to the gateway device.
Further, if the gateway device is not received within a set amount of set time after monitoring, the network connection authentication request is stopped being sent again, and the control terminal is fed back that the gateway device cannot be connected to, so that the user knows, and a new private identity sent by the control terminal is further obtained. In another embodiment, after monitoring that the gateway device is not received within a set number of set time, the network connection authentication request is stopped being sent again, and the control terminal is fed back that the gateway device cannot be connected to the control terminal, so as to prompt the user that the gateway device is abnormal and please check the gateway device.
In the current embodiment, the private identification is encoded and then packaged into a target management frame and sent to the network to be distributed device, the network to be distributed device analyzes the target management frame to obtain a preset mark after obtaining the target management frame correspondingly, then performs corresponding decoding operation on the preset mark to obtain the private identification, then generates a networking authentication request based on the private identification, and sends the networking authentication request to the gateway device to request connection with the gateway device. That is, in the current embodiment, the private identities are encoded and then sent, and corresponding decoding operations are respectively executed at the device end to be configured and the gateway device end to obtain the private identities, so that other devices cannot obtain the private identities even after monitoring the target management frame because correct decoding operations cannot be executed, and thus, the unrelated devices are prevented from being connected to the gateway device, the security of the network to be configured can be further increased, and the excessive network bandwidth resources are prevented from being occupied by other devices.
Referring to fig. 3, fig. 3 is a schematic flow chart of an embodiment of a method for network distribution according to the present application.
In the current embodiment, before the gateway device performs the network distribution for the device to be network-distributed, that is, before performing step S310, the method provided by the present application further includes: receiving a target management frame sent by a control terminal; and analyzing the target management frame to obtain a preset private identity, and saving the preset private identity to call in the process of responding to the networking authentication request.
As described above, in an embodiment, the control terminal may send the target management frame to the device to be configured and the gateway device simultaneously in a broadcast manner, that is, the target management frame is sent by the control terminal to the device to be configured and the gateway device in a broadcast manner. The target management frame is a data frame carrying a private identifier, the target management frame is a data frame only sent in a distribution network stage, and the control terminal does not send the target management frame to the outside in other time periods. Further, the target management frame includes a probe request frame.
Further, in another embodiment, the target management frame may also be sent by the control terminal to the network device to be configured and the gateway device in a directional manner.
After receiving the target management frame sent by the control terminal, the gateway device further analyzes the target management frame, further obtains a private identifier encapsulated in the target management frame, stores the private identifier, calls the private identifier in a process of responding to a networking authentication request of the network equipment to be distributed, namely compares the preset private identifier obtained in the self-networking authentication request with the private identifier obtained in the target management frame after obtaining the preset private identifier in the networking authentication request sent by the network equipment to be distributed, and judges whether the networking authentication request of the network equipment to be distributed needs to be responded according to a comparison result.
Specifically, in the current embodiment, the method provided by the present application includes steps S310 to S330.
S310: and acquiring a networking authentication request sent by the equipment to be distributed.
As described above, after the gateway device receives the target management frame sent by the control terminal, analyzes the target management frame to obtain the private identifier, and further stores the private identifier, the gateway device updates the obtained private identifier to the latest comparison identifier for networking authentication. The method comprises the steps that after the network to be distributed equipment generates a networking authentication request and sends the networking authentication request to the gateway equipment, the gateway equipment detects whether the networking authentication request of the network to be distributed equipment is received, and if the networking authentication request sent by the network to be distributed equipment is obtained by the gateway equipment, the step S320 is further executed. The networking authentication request is a request instruction which is sent to the gateway device by the device to be networked in a directional mode and is specifically used for requesting connection with the gateway device.
Further, the networking authentication request comprises: an association request frame. Further, the association request frame includes: an association request frame.
S320: and judging whether the networking authentication request comprises a preset private identity or not.
After the networking authentication request sent by the device to be networked is acquired, the gateway device further judges whether the networking authentication request includes a preset private identity. Specifically, after receiving a networking authentication request sent by a device to be networked, the gateway device further analyzes the networking authentication request to determine whether the networking authentication request includes a preset private identity. The preset private identity is a private identity sent by the control terminal through the target management frame.
Further, please refer to fig. 4, where fig. 4 is a schematic flowchart of another embodiment of a network distribution method according to the present application. In the present embodiment, the step S320 of determining whether the networking authentication request includes a preset private identity further includes:
s401: and analyzing the networking authentication request to obtain the private identification to be verified.
And the gateway equipment analyzes the received networking authentication request to obtain the private identification to be verified. The private identity to be verified is a mark for networking authentication obtained by analyzing the self-networking authentication request.
S402: and comparing the private identification to be verified with a preset private identification.
And comparing the acquired private identification to be verified with the preset private identification acquired from the target management frame to judge whether the private identification to be verified is consistent with the preset private identification.
S403: and if the private identity to be verified is consistent with the preset private identity, judging that the networking authentication request comprises the preset private identity.
And if the private identity to be verified is judged to be consistent with the preset private identity, the networking authentication request is judged to comprise the preset private identity.
S404: otherwise, the networking authentication request is judged not to include the preset private identification.
If the comparison in step S402 shows that the private identity to be verified is inconsistent with the preset private identity, it is determined that the networking authentication request does not include the preset private identity.
S330: if so, sending a response frame to the equipment to be networked, and configuring network bandwidth resources for the equipment to be networked to complete networking authentication.
And if the gateway equipment judges that the networking authentication request comprises the preset private identification, sending a response frame to the equipment to be networked so as to inform the equipment to be networked that the gateway equipment responds to the networking authentication request. After the gateway device generates the response frame to the device to be networked, the gateway device further configures network bandwidth resources for the device to be networked to complete networking authentication. The preset private identity is identity information consistent with the private identity in the target management frame sent by the control terminal.
Further, in an embodiment, the private identity includes preset network bandwidth resource priority identity information, that is, the private identity sent by the control terminal includes preset network bandwidth resource priority identity information. Further, the networking authentication request sent by the device to be networked also correspondingly includes network bandwidth resource priority identification information, and the network bandwidth resource priority identification information included in the networking authentication request is acquired from the target management frame. Further, in another embodiment, the target management frame sent by the control terminal includes the private identifier and the preset network bandwidth resource priority identifier information at the same time, and the networking authentication request sent by the device to be networked may or may not include the network bandwidth resource priority identifier information correspondingly, which is not limited herein.
Then, correspondingly, in the step S330, configuring network bandwidth resources for the device to be networked to complete networking authentication, further includes: and configuring network bandwidth resources for the equipment to be networked according to the preset network bandwidth resource priority identification information so as to complete networking authentication.
The network bandwidth resource priority identification information may be a priority for identifying a current network to be distributed. In other embodiments, the network bandwidth resource priority identification information may also be an allocation priority of the network bandwidth resource that identifies one or more devices to be networked.
For example, when the network bandwidth resource priority identification information is used to identify the allocation priority of the network bandwidth resources of one or more devices to be configured, and is used to identify the allocation order of the network bandwidth resources with a high priority, the gateway device allocates the network bandwidth resources to the devices to be configured with a higher priority of the network bandwidth resources preferentially when allocating the network bandwidth resources to each device to be configured. For example, when the device to be networked is a network camera, the user may set the highest allocation priority of the network bandwidth resource for the network camera arranged in the doorway direction in advance through the control terminal, and correspondingly, the gateway device may preferentially allocate the network bandwidth resource for the network camera arranged in the doorway, thereby ensuring that the network camera arranged in the doorway can better complete the work of shooting and uploading videos.
In another embodiment, the method provided by the present application further includes: when network bandwidth resources are allocated or provided for each device to be configured, and in a time period when the network bandwidth resources are in shortage, the gateway device correspondingly adjusts each network bandwidth resource to be configured according to the received network bandwidth resource priority identifier, and preferentially ensures the network bandwidth resources of the device to be configured with higher network bandwidth resource priority level.
Furthermore, the user can set different network bandwidth resource priorities of the devices to be distributed in different time periods according to actual application requirements. If the network camera is set to have the highest network bandwidth resource priority in the time period when no one is at home; and in the time period of someone at home, the network television is set to have higher network bandwidth resource priority.
Referring to fig. 5, fig. 5 is a schematic flow chart of another embodiment of a network distribution method according to the present application. In the present embodiment, it is stated that when the control terminal encodes the private identity and transmits the encoded private identity, the method provided in the present application specifically includes the steps.
S501: and receiving a target management frame sent by the control terminal.
S502: and analyzing the target management frame to obtain a preset private identity, and saving the preset private identity to call in the process of responding to the networking authentication request.
After receiving the target management frame sent by the control terminal, the gateway device further analyzes the target management frame to obtain a preset private identity, then stores the obtained preset private identity, and then calls the preset private identity in the subsequent networking authentication request process of the network equipment to be distributed.
S503: and acquiring a networking authentication request sent by the equipment to be distributed.
Step S503 is the same as step S310 described above and will not be described again. The above step S320 includes steps S504 to S508 in the present embodiment. The step S401 analyzes the networking authentication request to obtain the private identity to be verified, and further includes steps S504 to S505.
S504: and analyzing the networking authentication request to obtain a preset mark.
After the networking authentication request sent by the equipment to be networked is obtained, the networking authentication request is further analyzed, so that the preset mark is obtained from the networking authentication request sent by the equipment to be networked.
Further, in one embodiment, the networking authentication request includes an association request frame. Correspondingly, the association request frame sent by the equipment to be configured is analyzed, so as to obtain the preset mark from the SSID field in the association request frame. The preset mark is data obtained after decoding the private identity, and the preset mark can also be understood as an encoded private identity.
S505: and decoding the preset mark to obtain the private identification to be verified.
And after the preset mark is obtained, further executing corresponding decoding operation on the preset mark, and further obtaining the private mark to be verified.
S506: and comparing the private identity to be verified with the preset private identity to judge whether the private identity to be verified is consistent with the preset private identity.
S507: and judging that the networking authentication request comprises a preset private identity.
S508: and judging that the networking authentication request does not comprise a preset private identity.
After the private identification to be verified is obtained from the self-networking authentication request, the private identification to be verified is further compared with the preset private identification to judge whether the private identification to be verified is consistent with the preset private identification. If the private identity to be verified is judged to be consistent with the preset private identity, the networking authentication request is judged to include the preset private identity, and step S509 is executed correspondingly; otherwise, if the private identity to be verified is judged to be inconsistent with the preset private identity, the currently received networking authentication request is judged not to include the preset private identity, the current cycle is ended, and whether a new networking authentication request or a target management frame is received or not is continuously monitored.
S509: and sending a response frame to the equipment to be networked, and configuring network bandwidth resources for the equipment to be networked so as to complete networking authentication.
Step S509 is the same as step S330, and can refer to the description of the corresponding parts above, which is not repeated herein.
Referring to fig. 6, fig. 6 is a schematic flowchart of an embodiment of a network distribution method according to the present application. In the current embodiment, the network distribution method provided by the application is explained by taking the control terminal as an execution main body.
S610: and acquiring a private identification set by a user.
After the user logs in the APP account at the control terminal, a required private identity is set in the APP, and after the control terminal acquires the private identity set by the user, the following step S120 is further executed. Specifically, some private identifications which can be selected by the user can be provided in advance in the APP, and the user can also directly input the private identification required by the user according to the requirement of the user.
S620: and encapsulating the private identification to a target management frame, and sending the target management frame to the equipment to be networked and the gateway equipment.
And after the control terminal acquires the private identification set by the user, further packaging the private identification into the target management frame. And after encapsulating the private identification to the target management frame, the control terminal further sends the target management frame to the equipment to be networked and the gateway equipment.
In an embodiment, the control terminal may send the target management frame to the device to be networked and the gateway device by directional sending.
In another embodiment, the control terminal may also broadcast the target management frame to the network-to-be-distributed device and the gateway device in an external broadcast mode.
Further, in an embodiment, in order to further increase security, after the control terminal acquires the private identity set by the user, the control terminal further performs an encoding operation on the private identity, and encapsulates the encoded private identity into the target management frame. In the current embodiment, the private identity is encoded and then encapsulated into the target management frame, so that after other unrelated devices acquire the target management frame, the private identity for networking authentication still cannot be acquired because the corresponding decoding rule is unknown, and the networking security of the device to be networked is further increased. It should be noted that, when the encoding operation executed by the control terminal is set, both the gateway device and the device to be networked execute corresponding decoding operations.
Further, in order to better meet the actual application requirements of the user, in the technical scheme provided by the application, the user can also set the network bandwidth resource priority identification information of one or more devices to be matched simultaneously when setting the private identifier, and the control terminal can encapsulate the network bandwidth resource priority identification information into the target management frame simultaneously. Specifically, the user may set different network bandwidth resource priorities for one or more devices to be matched according to the application requirements of the user.
Furthermore, the network bandwidth resource priority identification information can be set in the private identification, so that the network bandwidth resource priority of one or more devices to be matched can be identified to the gateway device.
By taking the router gateway as an example, the technical scheme provided by the application can better improve the safety problem of the distribution network, the speed problem of the networking and the efficiency problem of data transmission in the prior art.
Specifically, the technical scheme provided by the application utilizes the probe request frame which is encapsulated with the private identification and is sent by the control terminal only in the distribution network stage, and stops sending the probe request frame after the networking is completed, so that the time is short, other equipment cannot acquire the probe request frame at a high frequency, and the networking and distribution network safety is improved compared with the prior technical scheme.
Meanwhile, in the technical scheme provided by the application, the private identification packaged to the probe request frame is in a non-standard wifi secret key format, so that even if the private identification is monitored by other equipment, the purpose of the private identification is difficult to confirm, and the safety of networking and distribution networks is further improved.
The technical scheme that this application provided still through abandoning the encryption mode of current complicated wifi standard, utilizes the private label that can comparatively make things convenient for dynamic update, only including the target management frame of private label just can carry out authentication process in advance, realizes under non-traditional encryption mode (also can understand for under the non-encryption mode), only need carry out authentication in advance and can accomplish the networking, does not need the quartic to handshake for networking speed, and then improve current betterly.
Meanwhile, in the technical scheme provided by the application, because a traditional encryption process (wherein the traditional encryption process refers to encrypting data by using wifi encryption protocol) is not required to be executed, the encrypted data content is directly transmitted, namely the transmitted data content is encrypted, the throughput of data transmission can be improved by about 10%, and the efficiency problem of the existing data transmission is well improved.
Referring to fig. 7, fig. 7 is a schematic structural diagram of an embodiment of an electronic device according to the present application. In the present embodiment, the electronic device 700 provided by the present application comprises a processor 701 and a memory 702 and a communication circuit 703 coupled to the processor 701, i.e. the memory 702 and the communication circuit 703 are connected to the processor 701 respectively. The electronic device 700 may be a device to be configured to execute the network connection method described in any one of the embodiments in fig. 1 to fig. 2 and corresponding embodiments thereof, the electronic device 700 may also be a gateway device described in any one of the embodiments in fig. 3 to fig. 5 and corresponding embodiments thereof, and the electronic device 700 may also be a control terminal for executing the network connection method described in any one of the embodiments in fig. 6 and corresponding embodiments thereof.
The processor 701 is connected to the memory 702 and the communication circuit 703, respectively.
The communication circuit 703 is configured to communicate with an external electronic device (which may also be understood as other nodes in a wireless ad hoc network) under the control of the processor 701 to perform transmission of data frames or instructions.
The memory 702 comprises a local storage and stores a computer program which, when executed by the processor 701, implements the method according to any of the embodiments described above.
The processor 701 is configured to execute the computer program stored in the memory 702 to perform the method described in any one of the embodiments of fig. 1 to 6 and the corresponding embodiments.
Further, when the electronic device 700 is a device to be networked, the electronic device includes a webcam, an intelligent speaker, a tianmao eidolon, a web tv, and the like.
Further, when the electronic device 700 is a gateway device, the electronic device 700 includes a router device.
Further, when the electronic device 700 is a control terminal, the electronic device 700 includes any one of a mobile phone, a computer, a tablet computer, and the like, or other devices that can perform login APP and send out a target management frame.
Referring to fig. 8, fig. 8 is a schematic structural diagram of an embodiment of a computer-readable storage medium according to the present application. The computer-readable storage medium 800 stores a computer program 801 that can be executed by a processor, the computer program 801 being configured to implement the method as described in any one of the embodiments of fig. 1 to 6 and corresponding embodiments thereof. Specifically, the computer-readable storage medium 800 may be one of a memory, a personal computer, a server, a network device, or a usb disk, and is not limited in any way herein.
The above description is only for the purpose of illustrating embodiments of the present application and is not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application or are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (12)

1. A method of networking, the method comprising:
acquiring a target management frame sent by a control terminal;
analyzing the target management frame to obtain a private identification;
generating a networking authentication request based on the private identity;
and sending the networking authentication request to a gateway device to request to be connected with the gateway device.
2. The method of claim 1, wherein parsing the target management frame to obtain a private identity further comprises:
analyzing the target management frame to obtain a preset mark;
and decoding the preset mark to obtain the private identification.
3. The method of claim 1, wherein generating a networking authentication request based on the private identity further comprises:
and encapsulating the private identity into an association request frame to serve as the networking authentication request.
4. The method according to claim 3, wherein the private identity includes predefined network bandwidth resource priority identity information;
the encapsulating the private identity into an association request frame includes: and packaging the network bandwidth resource priority identification information into the association request frame so as to identify the priority configuration sequence of the network bandwidth resources of different terminals to the gateway equipment.
5. The method of claim 1, wherein after sending the networking authentication request to a gateway device, the method further comprises:
monitoring whether a response frame sent by the gateway equipment is received within a set time;
and if not, the networking authentication request is retransmitted to the gateway equipment.
6. A network distribution method, characterized in that the method comprises:
acquiring a networking authentication request sent by equipment to be distributed;
judging whether the networking authentication request comprises a preset private identification or not;
if so, sending a response frame to the equipment to be networked, and configuring network bandwidth resources for the equipment to be networked to complete networking authentication.
7. The method of claim 6, further comprising:
receiving a target management frame sent by a control terminal;
and analyzing the target management frame to obtain the preset private identity, and storing the preset private identity to be called in the process of responding to the networking authentication request.
8. The method according to claim 7, wherein the determining whether the networking authentication request includes a preset private identity further comprises:
analyzing the networking authentication request to obtain a private identification to be verified;
comparing the private identification to be verified with the preset private identification;
if the private identity to be verified is consistent with the preset private identity, judging that the networking authentication request comprises the preset private identity; otherwise, the networking authentication request is judged not to include the preset private identity.
9. The method according to claim 8, wherein the parsing the networking authentication request to obtain the private identity to be verified further comprises:
analyzing the networking authentication request to obtain a preset mark;
and decoding the preset mark to obtain the private identification to be verified.
10. The method according to claim 6, wherein the private identity includes predefined network bandwidth resource priority identity information;
the configuring network bandwidth resources for the device to be networked to complete networking authentication further comprises:
and configuring network bandwidth resources for the equipment to be networked according to the preset network bandwidth resource priority identification information so as to finish networking authentication.
11. An electronic device comprising a processor and memory and communication circuitry coupled to the processor; wherein,
the communication circuit is used for communicating with other electronic equipment;
the memory is used for storing a computer program;
the processor is configured to run the computer program to perform the method of any one of claims 1 to 10.
12. A computer-readable storage medium, characterized in that it stores a computer program executable by a processor for implementing the method of any one of claims 1 to 10.
CN202011564906.8A 2020-12-25 2020-12-25 Networking and distribution method and related device Active CN112637853B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011564906.8A CN112637853B (en) 2020-12-25 2020-12-25 Networking and distribution method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011564906.8A CN112637853B (en) 2020-12-25 2020-12-25 Networking and distribution method and related device

Publications (2)

Publication Number Publication Date
CN112637853A true CN112637853A (en) 2021-04-09
CN112637853B CN112637853B (en) 2023-05-12

Family

ID=75325029

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011564906.8A Active CN112637853B (en) 2020-12-25 2020-12-25 Networking and distribution method and related device

Country Status (1)

Country Link
CN (1) CN112637853B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115220419A (en) * 2021-12-13 2022-10-21 广州汽车集团股份有限公司 Vehicle offline configuration method and device based on wireless protocol and vehicle
CN115314341A (en) * 2022-06-19 2022-11-08 湖北鑫英泰系统技术股份有限公司 Preposed storage type operation and maintenance gateway based on user behavior simulation

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101577670A (en) * 2008-05-07 2009-11-11 华为技术有限公司 Method, device and system for bandwidth allocation
US20120173726A1 (en) * 2009-06-30 2012-07-05 Nokia Corporation Apparatus and Method for Resource Contention
GB201620900D0 (en) * 2016-12-08 2017-01-25 British Telecomm Configuration of wireless-equipped devices
CN106535288A (en) * 2015-09-10 2017-03-22 阿里巴巴集团控股有限公司 Method for sending and obtaining wifi networking information and corresponding apparatus
CN107079261A (en) * 2014-08-22 2017-08-18 电子湾有限公司 The access certificate to secure network is provided using wireless beacon
CN108702623A (en) * 2017-05-25 2018-10-23 华为技术有限公司 A kind of configuration method and equipment of WLAN
CN108924907A (en) * 2018-06-22 2018-11-30 四川斐讯信息技术有限公司 A kind of fast access method of wireless network, system and for net equipment
US20180359764A1 (en) * 2016-02-18 2018-12-13 Comcast Cable Communications, Llc SSID Broadcast Management to Support Priority of Broadcast
CN112020120A (en) * 2019-05-28 2020-12-01 阿里巴巴集团控股有限公司 Network configuration method, device, equipment and system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101577670A (en) * 2008-05-07 2009-11-11 华为技术有限公司 Method, device and system for bandwidth allocation
US20120173726A1 (en) * 2009-06-30 2012-07-05 Nokia Corporation Apparatus and Method for Resource Contention
CN107079261A (en) * 2014-08-22 2017-08-18 电子湾有限公司 The access certificate to secure network is provided using wireless beacon
CN106535288A (en) * 2015-09-10 2017-03-22 阿里巴巴集团控股有限公司 Method for sending and obtaining wifi networking information and corresponding apparatus
US20180359764A1 (en) * 2016-02-18 2018-12-13 Comcast Cable Communications, Llc SSID Broadcast Management to Support Priority of Broadcast
GB201620900D0 (en) * 2016-12-08 2017-01-25 British Telecomm Configuration of wireless-equipped devices
CN108702623A (en) * 2017-05-25 2018-10-23 华为技术有限公司 A kind of configuration method and equipment of WLAN
CN108924907A (en) * 2018-06-22 2018-11-30 四川斐讯信息技术有限公司 A kind of fast access method of wireless network, system and for net equipment
CN112020120A (en) * 2019-05-28 2020-12-01 阿里巴巴集团控股有限公司 Network configuration method, device, equipment and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115220419A (en) * 2021-12-13 2022-10-21 广州汽车集团股份有限公司 Vehicle offline configuration method and device based on wireless protocol and vehicle
CN115220419B (en) * 2021-12-13 2023-11-21 广州汽车集团股份有限公司 Whole vehicle offline configuration method and device based on wireless protocol and vehicle
CN115314341A (en) * 2022-06-19 2022-11-08 湖北鑫英泰系统技术股份有限公司 Preposed storage type operation and maintenance gateway based on user behavior simulation

Also Published As

Publication number Publication date
CN112637853B (en) 2023-05-12

Similar Documents

Publication Publication Date Title
US10154528B2 (en) Handling of proximity services device to device related identities at radio access network level
KR20190120345A (en) Quality of service control method and apparatus, SMF, UPF, UE, PCF and AN
EP3386252B1 (en) Resource requesting method, device, network side node and system
CN107005851A (en) A kind of device-to-device D2D communication means, apparatus and system
US10492122B2 (en) Terminal discovery method, terminal, server, base station, management entity, and system
CN113453360B (en) Data transmission method and device
EP3709686B1 (en) Data transmission control method and related product
CN113132983B (en) Network disconnection reconnection method for intelligent terminal
US11770810B2 (en) Service data transmission method, first communications node, and base station
CN112637853B (en) Networking and distribution method and related device
CN114666912B (en) Method, device, computer equipment and system for requesting uplink resource
US20220312517A1 (en) D2d communication method, apparatus, and system
CN102308651B (en) Method of transmitting information of a service flow in a wireless system
EP3567920B1 (en) Information transmission method, radio access apparatus and terminal
WO2022067700A1 (en) Communication method, apparatus, and system
WO2021103026A1 (en) Method for performing communication on bandwidth part
US20230050923A1 (en) Media packet transmission method, apparatus, and system
US11974363B2 (en) Communication method, communication apparatus, and terminal device
CN112153599B (en) Message transmission method and device, internet of vehicles equipment and management node
JP2021510013A (en) Network configuration method, equipment, network elements and systems
CN115623542A (en) Communication method, device and system
EP3370368A1 (en) Communication system, networking method and controller for application-driven network
WO2024027260A1 (en) Communication method, terminal, communication device, and storage medium
US20230072333A1 (en) Communications Method, Apparatus, and System
CN113348715B (en) Data transmission method, device and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant