CN114270781A - Device access method, device, system control method, electronic device and storage medium - Google Patents

Device access method, device, system control method, electronic device and storage medium Download PDF

Info

Publication number
CN114270781A
CN114270781A CN201980099290.0A CN201980099290A CN114270781A CN 114270781 A CN114270781 A CN 114270781A CN 201980099290 A CN201980099290 A CN 201980099290A CN 114270781 A CN114270781 A CN 114270781A
Authority
CN
China
Prior art keywords
hotspot
equipment
preset
network
controlled
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201980099290.0A
Other languages
Chinese (zh)
Inventor
方宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Shenzhen Huantai Technology Co Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Shenzhen Huantai Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd, Shenzhen Huantai Technology Co Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN114270781A publication Critical patent/CN114270781A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the application provides a device access method, a device, a system control method, an electronic device and a storage medium. The equipment access method comprises the following steps: a user terminal acquires equipment identification information of controlled equipment; creating a wireless hotspot taking a preset hotspot name as a hotspot name and a preset hotspot password as a hotspot password; responding to an access request of the controlled equipment, and establishing connection with the controlled equipment through a wireless hotspot; and sending network authentication information to the controlled equipment, wherein the network authentication information is used for the controlled equipment to access the network of the gateway equipment. The identification information of the controlled equipment is obtained, the hotspot corresponding to the identification information is established, so that the controlled equipment is connected with the user terminal through the hotspot, the user terminal sends the network information to the controlled equipment through the hotspot, the controlled equipment is further networked through the network information, and the controlled equipment is only connected with the hotspot corresponding to the identification information, so that the access safety of the controlled equipment is greatly improved.

Description

Device access method, device, system control method, electronic device and storage medium Technical Field
The application relates to the technical field of smart home, in particular to a device access method, a device, a system control method, electronic equipment and a storage medium.
Background
When the intelligent equipment (such as intelligent lighting equipment, an intelligent air conditioner, a refrigerator and the like) is used, the intelligent equipment needs to be connected to a network, so that an intelligent terminal such as a mobile phone and the like can control the intelligent equipment. Along with the rapid popularization of intelligent equipment, various intelligent equipment types are more and more, the intelligent equipment needs to acquire network information when accessing a network, and the existing various intelligent equipment is very easy to be interfered by other electronic equipment in the environment when acquiring the network information.
Disclosure of Invention
The application aims to provide a device access method, a device, a system control method, an electronic device and a storage medium, so as to improve the security of intelligent device access.
In a first aspect, an embodiment of the present application provides an apparatus access method, which is applied to an intelligent apparatus control system, where the intelligent apparatus control system includes: controlled equipment, a user terminal and gateway equipment, wherein the method comprises the following steps: the user terminal acquires equipment identification information of the controlled equipment, wherein the equipment identification information comprises a preset hotspot name and a preset hotspot password; creating a wireless hotspot taking the preset hotspot name as a hotspot name and the preset hotspot password as a hotspot password; establishing a connection with the controlled device through the wireless hotspot in response to an access request of the controlled device; and sending network authentication information to the controlled equipment, wherein the network authentication information is used for the controlled equipment to access a network of the gateway equipment, and the network authentication information comprises a network account and a network password corresponding to the network account.
In a second aspect, an embodiment of the present application provides a device access method, which is applied to an intelligent device control system, where the intelligent device control system includes: the system comprises controlled equipment, a user terminal and gateway equipment, wherein the controlled equipment is provided with equipment identification information, and the equipment identification information comprises a preset hotspot name and a preset hotspot password; the method comprises the following steps: the controlled device scans for wireless hotspots; if a preset wireless hotspot established by the user terminal is scanned, connecting the preset wireless hotspot, wherein the hotspot name of the preset wireless hotspot is a preset hotspot name, and the hotspot password is a preset hotspot password; receiving network verification information sent by the user terminal; and accessing the network of the gateway equipment according to the network verification information.
In a third aspect, the present application provides an apparatus access device, which is applied to an intelligent apparatus control system, where the intelligent apparatus control system includes: controlled equipment, user terminal and gateway equipment, the device includes: the device comprises an acquisition module, a hotspot creating module, a connection module and a sending module, wherein the acquisition module is used for acquiring device identification information of the controlled device, and the device identification information comprises a preset hotspot name and a preset hotspot password. The hot spot creating module is used for creating a wireless hot spot with the preset hot spot name as a hot spot name and the preset hot spot password as a hot spot password. The connection module is used for responding to an access request of the controlled equipment and establishing connection with the controlled equipment in the wireless hotspot. The sending module is used for sending network authentication information to the controlled device, the network authentication information is used for the controlled device to access a network of the gateway device, and the network authentication information comprises a network account and a network password corresponding to the network account.
In a fourth aspect, the present application provides an apparatus access device, which is applied to an intelligent device control system, where the intelligent device control system includes: controlled equipment, user terminal and gateway equipment, controlled equipment has equipment identification information, equipment identification information includes predetermineeing hot name and predetermineeing hot password, the device includes: the device comprises a scanning module, a hotspot connecting module, a receiving module and an access module. The scanning module is used for scanning wireless hotspots. The hotspot connection module is used for connecting the preset wireless hotspot when the preset wireless hotspot established by the user terminal is scanned, wherein the hotspot name of the preset wireless hotspot is a preset hotspot name, and the hotspot password is a preset hotspot password. The receiving module is used for receiving the network verification information sent by the user terminal. The access module is used for accessing the network of the gateway equipment according to the network verification information.
In a fifth aspect, an embodiment of the present application provides an electronic device, including a memory and a processor, where the memory is coupled with the processor; the memory stores instructions that, when executed by the processor, cause the processor to: acquiring equipment identification information of the controlled equipment, wherein the equipment identification information comprises a preset hotspot name and a preset hotspot password; creating a wireless hotspot taking the preset hotspot name as a hotspot name and the preset hotspot password as a hotspot password; establishing a connection with the controlled device within the wireless hotspot in response to an access request of the controlled device; and sending network authentication information to the controlled equipment, wherein the network authentication information is used for the controlled equipment to access a network of the gateway equipment, and the network authentication information comprises a network account and a network password corresponding to the network account.
In a sixth aspect, an embodiment of the present application provides a control method for an intelligent device control system, where the intelligent device control system includes: controlled equipment, a user terminal and gateway equipment, wherein the method comprises the following steps: and the user terminal acquires equipment identification information of the controlled equipment, wherein the equipment identification information comprises a preset hotspot name and a preset hotspot password. And the user terminal creates a wireless hotspot taking the preset hotspot name as a hotspot name and the preset hotspot password as a hotspot password. And the controlled equipment scans a wireless hotspot, and if the wireless hotspot established by the user terminal is scanned, the controlled equipment is connected with the wireless hotspot. The user terminal sends network authentication information to the controlled device, the network authentication information is used for the controlled device to access a network of the gateway device, and the network authentication information comprises a network account and a network password corresponding to the network account. And the controlled equipment accesses the network of the gateway equipment according to the network verification information.
In a seventh aspect, an embodiment of the present application provides a computer-readable storage medium. The computer readable storage medium has program code stored therein, which can be invoked by the processor to perform the device access method described above.
According to the device access method, the device, the system control method, the electronic device and the storage medium, when the device is accessed, the identification information of the controlled device is obtained, the hot spot corresponding to the identification information is established, so that the controlled device is connected with the user terminal through the hot spot, the user terminal sends the network information to the controlled device through the hot spot, the controlled device is further networked through the network information, and the controlled device is only connected with the hot spot corresponding to the identification information, so that the access safety of the controlled device is greatly improved.
These and other aspects of the present application will be more readily apparent from the following description of the embodiments.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic diagram illustrating an architecture of an intelligent device control system according to an embodiment of the present application;
fig. 2 is a schematic diagram illustrating an architecture of another smart device control system according to an embodiment of the present application;
fig. 3 is a flowchart illustrating a device access method according to an embodiment of the present application;
fig. 4 shows a flowchart of an embodiment of step S110 in the device access method proposed in fig. 3;
fig. 5 shows an interface diagram of a confirmation interface in the device access method proposed in fig. 3;
fig. 6 shows a flowchart of an embodiment of step S140 in the device access method proposed in fig. 3;
fig. 7 is a flowchart illustrating a further device access method proposed in the embodiment of the present application;
fig. 8 shows an interface diagram of an authentication interface in the device access method proposed in fig. 7;
fig. 9 is a flowchart illustrating yet another device access method proposed in the embodiment of the present application;
fig. 10 is a flowchart illustrating another device access method proposed in the embodiment of the present application;
fig. 11 is a flowchart of an intelligent device control system according to an embodiment of the present application;
fig. 12 is a block diagram of a structure of a device access apparatus according to an embodiment of the present application;
fig. 13 is a block diagram of another structure of a device access apparatus according to an embodiment of the present application;
fig. 14 is a block diagram of an electronic device according to an eighth embodiment of the present application;
fig. 15 is a block diagram of a storage medium according to a ninth embodiment of the present application;
fig. 16 is a block diagram of a storage medium according to a tenth embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The internet of things is a network concept which extends and expands the user side of the internet of things to any article to perform information exchange and communication on the basis of the internet concept. With the development of the internet of things technology, some scenes can be configured in the internet of things system. For a configured scene, a plurality of controlled devices can be involved, and the plurality of controlled devices have a certain linkage relationship and can work cooperatively.
As shown in fig. 1, the intelligent device control system includes one or more controlled devices 99, one or more user terminals 100, and one or more gateway devices 90, where the controlled devices 99 and the user terminals 100 may both connect to a network through the gateway devices 90, the user terminals 100 may send control instructions to the controlled devices 99 through the network to control the controlled devices 99, and the controlled devices 99 correspondingly execute corresponding operations after receiving the control instructions. When the controlled device 99 is in close proximity to the user terminal 100, the controlled device 99 may also communicate with the user terminal 100 through a wireless hotspot established by the access user terminal 100.
The controlled device 99 may be a projector, a projection screen, an intelligent lamp, an intelligent socket, a human body sensor, a door and window sensor, a wireless switch, an air conditioner partner, a smoke alarm, an intelligent curtain motor, an air purifier, an intelligent sound box, or the like. In one manner, as shown in fig. 1, the controlling user terminal 100 may perform data interaction with the controlled device 99 by directly establishing a wireless connection with the gateway device 90. Moreover, after establishing connection with the cloud 91, the user terminal 100 may also implement data interaction with the controlled device 99 through a data link between the cloud 91 and the gateway device 90. The user terminal 100 may be various intelligent electronic devices such as a mobile phone, a tablet computer, a personal computer, and an intelligent watch, and the gateway device 90 may be a router, a gateway, and the like.
As another way, as shown in fig. 2, the user terminal 100 directly establishes data interaction with the cloud 91, and then the cloud 91 may perform data interaction with the controlled device 99 through the gateway device 90, and then the user terminal 100 further implements data interaction with the controlled device 99.
As another way, the user terminal 100 may also directly establish data interaction with the first cloud, and then implement data interaction between the user terminal 100 and the second cloud based on the data interaction between the first cloud and the second cloud, and then the user terminal 100 further implements data interaction with the controlled device 99 under the condition that the second cloud can perform data interaction with the controlled device 99.
Wherein the data interaction between the user terminal 100 and the controlled device 99 may be triggered by a client installed in the user terminal 100. The controlled device 99 has a wireless connection module for connecting an infinite hotspot or WiFi in an area, and the wireless connection module can enter an adjustment mode when the controlled device 99 is started for the first time, and at this time, the wireless connection module automatically scans a wireless hotspot in the area range and connects with a preset wireless hotspot. When the controlled device 99 is connected to the network of the gateway device 90, the network information of the network of the gateway device 90 may be stored, and when the controlled device is turned on next time, the controlled device may be automatically connected to the network of the connected gateway device 90.
When the controlled device is installed and used for the first time, the intelligent device needs to be accessed, so that the controlled device is accessed into the network of the gateway device, and can receive the control instruction sent by the user terminal. In the prior art, the controlled device needs to first obtain network information of the gateway device from the user terminal, where the network information includes, but is not limited to, network authentication information. The controlled device acquires the network information from the user terminal by establishing a connection with the user terminal through a hotspot in advance, but a plurality of hotspots established by the user terminal may exist in the range near the controlled device, and only one or a part of the user terminals are really required to be connected, so that potential safety hazards are caused to the access operation of the controlled device.
Embodiments of the present application will be described in detail below with reference to the accompanying drawings.
Referring to fig. 3, a first embodiment of the present invention provides a device access method, which may be applied to the intelligent device control system shown in fig. 1 and may be executed by a user terminal, where the intelligent device control system includes: controlled equipment, a user terminal and gateway equipment.
Step S110: and the user terminal acquires the equipment identification information of the controlled equipment. The device identification information includes a preset hotspot name and a preset hotspot password.
The identification information of the controlled device is identification information formed on a controlled device body or a specification and the like, and is used for acquiring a preset hotspot name and a preset hotspot password. Wherein the identification information can be set in the forms of words, figures and the like. In some embodiments, the identification information may further include manufacturer information, model information, or category information of the controlled device, so that the controlled device can be clearly informed of the manufacturer, category, model, and the like.
The preset hotspot name and the preset hotspot password refer to hotspot names and hotspot passwords of hotspots which can be connected with the controlled device, and it can be understood that the controlled device can only be connected with a specific hotspot, wherein the specific hotspot refers to a hotspot with the same hotspot name as the preset hotspot name and the same hotspot password as the preset hotspot password. When one or more hotspots are near the controlled device, the controlled device can detect the one or more hotspots and only connect with a specific hotspot, and when no specific hotspot exists nearby, no connection is made with any hotspot.
In some embodiments, the identification information may also be stored in the controlled device in the form of voice or the like. The electronic equipment recognizes the identification information carried in the voice through the voice assistant. In addition, the controlled device may also actively send its identification information, for example, the intelligent device sends its identification information to the outside in a wireless signal manner, and the identification information is acquired after being captured by the user terminal. The identification information may also be actively acquired by the electronic device, such as scanning a two-dimensional code.
In some embodiments, the identification information may be provided on the smart device, for example, in the form of a two-dimensional code, a barcode, text, a graphic, etc. Referring now to fig. 4, acquiring device identification information of the controlled device may include the steps of:
step S111: and acquiring an identification image of the controlled equipment, wherein the identification image carries identification information.
The identification image refers to an image of identification information set on the intelligent device. And acquiring identification information from the identification image by using an image recognition technology. The identification image may be acquired through an assumed camera of the user terminal, and in some embodiments, the identification image acquired by a camera of another device may also be received.
Step S112: the identification information is recognized from the identification image.
And acquiring identification information from the identification image by using an image recognition technology. The identification information acquisition mode can realize automatic acquisition, does not need manual input of a user, further improves the equipment access efficiency, and also prevents input errors caused by manual input.
It is understood that, in some other embodiments, the identification information may be manually input by the user, and in this case, the corresponding identification information may be acquired in response to the input operation of the user.
Step S120: and creating the wireless hotspot taking the preset hotspot name as a hotspot name and the preset hotspot password as a hotspot password.
The wireless hotspot is a WiFi hotspot or WLAN hotspot which is established by the user terminal and can convert GPRS, 3G or 4G, 5G signals received by the mobile phone into WiFi signals to be sent out. The wireless hotspot may access a legitimate controlled device.
In some embodiments, after obtaining the identification information, the user terminal may automatically establish a wireless hotspot in which the preset hotspot name is used as a hotspot name and the preset hotspot password is used as a hotspot password. In some embodiments, before step S120 is executed, a confirmation interface may be displayed for prompting the user that a specific hotspot is to be established. As an example, FIG. 5 shows a form of a confirmation interface that confirms creation of a hotspot when the user selects "Yes" and does not create a hotspot when the user selects "No".
In some embodiments, the user terminal has already established a wireless hotspot, and at least one of a hotspot name and a hotspot password of the established wireless hotspot is not the same as the identification information, at this time, the established wireless hotspot may be closed first, and the wireless hotspot with the preset hotspot name as the hotspot name and the preset hotspot password as the hotspot password may be created again.
Step S130: establishing a connection with the controlled device through the wireless hotspot in response to an access request of the controlled device.
After the wireless hotspot is created in step S120, when the user terminal is within the scannable range of the controlled device, the created wireless hotspot may be detected by the controlled device and may be connected by the controlled device. And when receiving an access request of the controlled equipment, allowing the controlled equipment to access the wireless hotspot and establishing connection with the controlled equipment through the wireless hotspot. After the connection is established with the controlled equipment through the wireless hotspot, data interaction can be carried out between the user terminal and the controlled equipment.
Step S140: and sending network verification information to the controlled equipment. The network authentication information is used for the controlled device to access a network of the gateway device, and the network authentication information includes a network account and a network password corresponding to the network account.
The network authentication information refers to authentication information of the gateway device, and is used for the controlled device to access the network of the gateway device, and the network authentication information includes, but is not limited to, a network account and a network password corresponding to the network account.
In some embodiments, the user terminal has accessed the network of the gateway device once, at this time, the network authentication information of the gateway device is stored in the user terminal, and the user may send the cache information to the controlled device by retrieving the cache information of the network authentication information of the gateway device.
In some embodiments, the user terminal has accessed the network of the plurality of gateway devices once, so the user terminal stores the network authentication information of the gateway devices. Referring now to fig. 6, step S140 may proceed as follows:
step S141: and acquiring the saved WiFi list.
The WiFi list comprises WiFi information which is connected by all users, and the WiFi information comprises a network account and a network password corresponding to the network account.
Step S142: in response to a user selection in the WiFi list, determining the selected WiFi as a target network.
Step S143: and sending the network verification information of the target network to the controlled equipment.
In some embodiments, the user terminal may have currently established a connection with the network of the gateway device, and at this time, may acquire the currently connected WiFi, determine the currently connected WiFi as a target network, and send network authentication information of the target network to the controlled device. Therefore, the sending process of the network verification information is automatically completed without the operation of a user.
In some embodiments, the network authentication information may also be manually input by a user, and the user terminal transmits the network authentication information manually input by the user to the controlled device.
After receiving the network authentication information sent by the user, the controlled device can be connected with the gateway device to access the network. At this time, the user terminal may send a control instruction to the controlled device through the network of the gateway device, so that the controlled device executes an operation corresponding to the control instruction.
According to the device access method provided by the embodiment, the controlled device is only connected with the specific hotspot by creating the specific hotspot, so that the problem of safety in use of the controlled device caused by the fact that the controlled device is accessed to other non-specific hotspots is solved.
Referring to fig. 7, fig. 7 is a flowchart illustrating a device access method according to a second embodiment of the present application. As will be explained in detail with respect to the flow shown in fig. 8, the method may specifically include the following steps:
step S210: and the user terminal acquires equipment identification information of the controlled equipment, wherein the equipment identification information comprises a preset hotspot name and a preset hotspot password.
Step S220: and creating the wireless hotspot taking the preset hotspot name as a hotspot name and the preset hotspot password as a hotspot password.
Step S230: detecting whether an access request of the controlled equipment is received. And the access request is sent by the controlled equipment and is used for requesting to access the wireless hotspot created by the user terminal.
In some embodiments, the access request is issued by the controlled device upon the controlled device scanning for a wireless hotspot. In some embodiments, the preset hotspot name and the preset hotspot password of the controlled device of the same manufacturer or the same model may be the same, so that when different users perform access operations on such controlled devices at the same time, the controlled device may access to a wireless hotspot established by another user terminal, which may cause a security problem. (for example, two adjacent households use the same type of controlled device, and establish the same wireless hotspot at a certain moment, at this time, the controlled device may be accessed to the network optical device of the adjacent household, causing a security problem). Therefore, the relative distance between the controlled equipment and the user terminal is not too far, and the safety problem caused by the fact that the controlled equipment is accessed to a wireless hotspot established by other far user terminals is avoided.
If an access request is detected, step S240 is executed: and authenticating the access request.
In some embodiments, the verification of the access request may be performed by a user, at which time, the device information of the access request may be displayed to the user by means of an authentication interface, and the access request may be verified in response to an operation of the user. As an example, fig. 8 shows a form of an authentication interface in which when the user selects "yes", the result of verification is indicated as being qualified, and when the user selects "no", the result of verification is indicated as being unqualified.
In some embodiments, the access request includes device information of the controlled device, including but not limited to one or more of a device type, a device model, a device location, and the like, and at this time, the user terminal may also complete the verification process by itself, and after receiving the access request, the user terminal obtains the device information, and when the device information meets a preset condition, it determines that the verification is qualified, and when the device information does not meet the preset condition, it determines that the verification is unqualified. The preset condition may be that the device information is a non-mobile terminal, such as a mobile terminal of another user.
When the step S240 verifies the qualification, the step S250 is executed: establishing a connection with the controlled device through the wireless hotspot.
If the access request is not detected in step S230, the access request may be caused by that the user terminal is far away from the controlled device and the controlled device cannot receive the signal of the wireless hotspot, or may be caused by that the signal of the wireless hotspot received by the controlled device is weak. At this time, step S260 is performed: and sending out prompt information. The prompt information is used for prompting the user to enable the user terminal to approach the controlled equipment.
It will be appreciated that the prompt may be presented in text, graphics, sound, etc. The hint information may be turned off after the access request is received again. It will be appreciated that the prompt may also be turned off by the user.
Step S250 may be followed by step S270: and sending network authentication information to the controlled equipment, wherein the network authentication information is used for the controlled equipment to access a network of the gateway equipment, and the network authentication information comprises a network account and a network password corresponding to the network account.
In some embodiments, the method may further optionally include step S280: and receiving control port information sent by the controlled equipment. The control port is used for the controlled equipment to receive control instructions.
The control port is used for the controlled device to receive the control instruction, and after the controlled device is accessed to the network of the gateway device, the control port information can be sent to the user terminal through the network of the gateway device. In some embodiments, after the controlled device and the user terminal establish a connection at the wireless hotspot, the control port information may be sent to the user terminal through the wireless hotspot, and at this time, the user terminal may send the network authentication information to the controlled device through the control port.
The device access method provided by the embodiment can verify the access request sent by the controlled device, and avoids the security threat to the information of the user terminal caused by the access of the electronic devices of other users to the wireless hotspot. Meanwhile, the controlled equipment is ensured not to access wireless hotspots created by other user terminals, and meanwhile, the problem of safety of the controlled equipment is avoided.
Referring to fig. 9, fig. 9 is a flowchart illustrating a device access method according to a third embodiment of the present application, where the device access method may be applied to the intelligent device control system shown in fig. 1 and may be executed by a controlled device, and the intelligent device control system includes: the device comprises controlled equipment, a user terminal and gateway equipment, wherein the controlled equipment is provided with equipment identification information, and the equipment identification information comprises a preset hotspot name and a preset hotspot password. The device identification information can be identified in the controlled device body, and can also be identified in a paper or electronic specification in a text, graphic or other modes.
As will be explained in detail with respect to the flow shown in fig. 9, the method may specifically include the following steps:
step S310: the controlled device scans for wireless hotspots.
The controlled device scans the wireless hotspots in the area, and can acquire a list of the wireless hotspots in the area. In some embodiments, the controlled device may further display the acquired list of wireless hotspots in the area to the user in the form of a display interface. It is to be understood that a wireless hotspot may be established by one or more user terminals.
In some embodiments, the controlled device may automatically scan a wireless hotspot in the area when the controlled device is first powered on, or may start a hotspot switch of the controlled device to scan the wireless hotspot in response to a user operation after the controlled device is first powered on. The user operation may be a predetermined operation performed on a physical or virtual key on the controlled device, for example: and a special entity key is arranged on the controlled equipment, and when the entity key is pressed, the controlled equipment carries out an adjustment mode and starts to scan the wireless hotspot.
The method has the advantage that the situation that the controlled equipment starts to scan the wireless hot spot in the area after being misoperated after leaving the factory and unnecessary power consumption is caused because the user does not establish the preset wireless hot spot on the user terminal at the moment can be avoided. Meanwhile, the problem of safety of the controlled equipment caused by connection of the preset wireless hotspot established by the non-user can be avoided, wherein the preset wireless hotspot established by the non-user can be the preset wireless hotspot established by other users.
Step S320: and if the preset wireless hotspot established by the user terminal is scanned, connecting the preset wireless hotspot. The hotspot name of the preset wireless hotspot is a preset hotspot name, and the hotspot password is a preset hotspot password.
Determining whether a wireless hotspot with the same hotspot name as a preset hotspot name exists or not by acquiring a wireless hotspot list; if the wireless hotspot with the same name as the preset hotspot exists, determining the wireless hotspot with the same name as the preset hotspot as the preset wireless hotspot, and connecting the preset wireless hotspot with a preset hotspot password.
And when the list of the wireless hotspots in the area is acquired, determining whether a preset wireless hotspot exists. The mode of determining whether the preset wireless hotspot exists is to compare the preset hotspot name and the preset hotspot password with all the wireless hotspots in the wireless hotspot list, and determine that the hotspot name is the preset hotspot name, and the hotspot with the hotspot password being the preset hotspot password is the preset wireless hotspot.
The method comprises the steps of connecting a preset wireless hotspot after a preset wireless hotspot is determined, wherein the preset wireless hotspot is connected, sending an access request to the preset wireless hotspot according to a preset password, establishing connection with the preset wireless hotspot after the access request passes, and performing data interaction between a user terminal and controlled equipment through the preset wireless hotspot after the connection with the preset wireless hotspot is established.
In some embodiments, if there is more than one preset wireless hotspot in the list of wireless hotspots, it indicates that there are multiple user terminals nearby that establish the preset wireless hotspot, and there may be a case where there may be controlled devices of the same model or the same manufacturer nearby, but the probability may belong to different users, and the different users perform access operation at the same time or at a similar time.
In some embodiments, after connecting to the preset wireless hotspot, information of a control port may be further sent to the user terminal, where the control port is configured to receive a control instruction.
Step S330: and receiving the network verification information sent by the user terminal.
After the connection with the preset wireless hotspot is established, network authentication information sent by the user terminal is received through the preset wireless hotspot, wherein the network authentication information comprises a network name and a network password of the network of the gateway device, and is used for the controlled device to access the network of the gateway device.
Step S340: and accessing the network of the gateway equipment according to the network verification information.
After the network authentication information is obtained, the network name of the network of the gateway equipment is obtained from the network authentication information, the network of the gateway equipment is determined from the list of the wireless hotspots in the area obtained by scanning in advance, a connection request is sent to the gateway equipment according to the network password in the network authentication information, and then connection is established with the network of the gateway equipment. After that, the controlled device can perform data interaction with the user terminal through the gateway device, receive the control instruction from the user terminal and execute the control instruction, so that the user terminal can control the controlled device without being located near the controlled device.
According to the device access method provided by the embodiment, the controlled device can scan the wireless hotspot in the area where the controlled device is located and only connects with the preset wireless hotspot, so that the controlled device can be ensured not to be connected with the wireless hotspot established by a non-user, and the security of access operation is improved.
Referring to fig. 10, fig. 10 is a flowchart illustrating a device access method according to a fourth embodiment of the present application, where the device access method is applied to the intelligent device control system shown in fig. 1 and can be executed by a controlled device, and the intelligent device control system includes: the device comprises controlled equipment, a user terminal and gateway equipment, wherein the controlled equipment is provided with equipment identification information, and the equipment identification information comprises a preset hotspot name and a preset hotspot password.
The device access method may include the steps of:
step S410: the controlled device scans for wireless hotspots.
Step S420: and if a preset wireless hotspot established by the user terminal is scanned, detecting the signal intensity of the preset wireless hotspot.
The hotspot name of the preset wireless hotspot is a preset hotspot name, and the hotspot password is a preset hotspot password. The distance between the user terminal establishing the preset wireless hotspot and the controlled equipment can be roughly determined by detecting the signal intensity of the preset wireless hotspot, if the signal intensity of the preset wireless hotspot is stronger, the distance between the current user terminal and the controlled equipment is closer, and the user terminal establishing the preset wireless hotspot can be determined to be created by a legal owner of the controlled equipment. The method and the device avoid the safety problem caused by the fact that the controlled device is mistakenly connected with the user terminals of other users after scanning the preset wireless hotspots established by other nearby users in the same time period.
Step S430: and if the signal intensity of the preset wireless hotspot is greater than or equal to the preset intensity, connecting the preset wireless hotspot.
The preset intensity may be preset by a system or customized by a user, and the preset intensity may be pre-stored as a value in the controlled device, and the preset intensity may be, for example, 20dBm, 30dBm, or the like. If the signal intensity of the preset wireless hotspot is greater than or equal to the preset intensity, a reminding message can be sent, wherein the reminding message is used for reminding the user that the controlled device is too far away from the user terminal, so that the user can approach the user terminal to the controlled device after receiving the reminding message.
The reminding information can comprise voice information or broadcast information, and the voice information can be directly broadcasted to the outside so that a user can directly receive the voice information and then approach the user terminal to the controlled equipment. The broadcast information can be sent out in a radio wave mode, can be received by the user terminal and is directly displayed on the user terminal, so that the user can know the reminding information by looking at the user terminal. Wherein when the signal intensity of the preset wireless hotspot is greater than or equal to the preset intensity, the reminding information can be closed
Step S440: receiving network verification information sent by the user terminal;
step S450: and accessing the network of the gateway equipment according to the network verification information.
The device access method provided by this embodiment can detect the signal strength of the preset wireless hotspot after the preset wireless hotspot is scanned, and only when the signal strength of the preset wireless hotspot is greater than or equal to the preset strength, the preset wireless hotspot is connected, so as to connect with the network of the gateway device after the network verification information is acquired, thereby improving the security of controlled device access.
Referring to fig. 11, the present embodiment provides a control method of an intelligent device control system, where the intelligent device control system includes: controlled equipment, a user terminal and gateway equipment, wherein the control method comprises the following steps:
step S510: and the user terminal acquires the equipment identification information of the controlled equipment.
The device identification information includes a preset hotspot name and a preset hotspot password.
Step S520: and the user terminal creates a wireless hotspot taking the preset hotspot name as a hotspot name and the preset hotspot password as a hotspot password.
Step S530: and the controlled equipment scans a wireless hotspot, and if the wireless hotspot established by the user terminal is scanned, the controlled equipment is connected with the wireless hotspot.
Step S540: and the user terminal sends network verification information to the controlled equipment.
The network authentication information is used for the controlled device to access a network of the gateway device, and comprises a network account and a network password corresponding to the network account;
step S550: and the controlled equipment accesses the network of the gateway equipment according to the network verification information.
It is to be understood that various implementations described in the foregoing embodiments can be applied to specific steps in this embodiment, and specific implementations of various steps in this embodiment and some possible implementations can refer to the foregoing embodiments.
Referring to fig. 12, a sixth embodiment of the present application provides a device access apparatus 400, which can be applied to a user terminal 100 in an intelligent device control system shown in fig. 1, where the intelligent device control system includes: controlled device, user terminal and gateway device, the apparatus 400 includes: an obtaining module 410, a hotspot creating module 420, a connecting module 430, and a sending module 440, which may be used to execute the device access method in the first embodiment or the second embodiment.
The obtaining module 410 is configured to obtain device identification information of the controlled device, where the device identification information includes a preset hotspot name and a preset hotspot password.
The hotspot creating module 420 is configured to create a wireless hotspot with the preset hotspot name as a hotspot name and the preset hotspot password as a hotspot password.
The connection module 430 is configured to establish a connection with the controlled device in the wireless hotspot in response to an access request of the controlled device.
The sending module 440 is configured to send network authentication information to the controlled device, where the network authentication information is used for the controlled device to access a network of a gateway device, and the network authentication information includes a network account and a network password corresponding to the network account.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses and modules may refer to the corresponding processes in the foregoing first embodiment or the second embodiment, and are not described herein again.
In the several embodiments provided in the present application, the coupling or direct coupling or communication connection between the modules shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or modules may be in an electrical, mechanical or other form.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
Referring to fig. 13, a seventh embodiment of the present application provides a device access apparatus 500, which can be applied to a controlled device 99 in an intelligent device control system as shown in fig. 1, where the intelligent device control system includes: controlled device, user terminal and gateway device, the apparatus 500 includes a scanning module 510, a hot spot connection module 520, a receiving module 530 and an access module 540.
The scanning module 510 is configured to scan a wireless hotspot.
The hotspot connection module 520 is configured to connect to a preset wireless hotspot established by the user terminal when the preset wireless hotspot is scanned, where a hotspot name of the preset wireless hotspot is a preset hotspot name, and a hotspot password is a preset hotspot password.
The receiving module 530 is configured to receive network authentication information sent by the user terminal.
The access module 540 is configured to access the network of the gateway device according to the network authentication information.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses and modules may refer to the corresponding processes in the foregoing third embodiment or fourth embodiment, and are not described herein again.
In the several embodiments provided in the present application, the coupling or direct coupling or communication connection between the modules shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or modules may be in an electrical, mechanical or other form.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
Referring to fig. 14, based on the foregoing intelligent device network distribution method and apparatus, an eighth embodiment of the present application further provides another electronic device 100 capable of executing the device access method of the first embodiment or the second embodiment. The electronic device 100 includes one or more processors 302 (only one shown), a memory 304, a network module 306, and an optional camera module 310 and an optional screen 312 coupled to each other. The memory 304 stores a program that can execute the content of the first embodiment or the second embodiment, and the processor 302 can execute the program stored in the memory 304.
Processor 302 may include one or more processing cores, among others. The processor 302 interfaces with various components throughout the electronic device 100 using various interfaces and circuitry to perform various functions of the electronic device 100 and process data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 304 and invoking data stored in the memory 304. Alternatively, the processor 302 may be implemented in hardware using at least one of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 302 may integrate one or a combination of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing display content; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 302, but may be implemented by a communication chip.
The Memory 304 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). The memory 304 may be used to store instructions, programs, code, sets of codes, or sets of instructions. The memory 304 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for implementing at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing various method embodiments described below, and the like. The storage data area may also store data created by the terminal 100 in use, such as a phonebook, audio-video data, chat log data, and the like.
The network module 306 is configured to receive and transmit electromagnetic waves, and achieve interconversion between the electromagnetic waves and electrical signals, so as to communicate with a communication network or other devices, for example, a gateway device. The network module 306 may include various existing circuit elements for performing these functions, such as an antenna, a radio frequency transceiver, a digital signal processor, an encryption/decryption chip, a Subscriber Identity Module (SIM) card, memory, a WiFi module, and so forth. The network module 306 may create a wireless hotspot for other devices to access. The wireless network may comprise a cellular telephone network, a wireless local area network, or a metropolitan area network.
The camera module 310 may be configured to capture an identification image of the controlled device, so that the processor 302 recognizes the identification information from the identification image.
The screen 312 is used for human-computer interaction, wherein the screen may be a touch screen or a non-touch screen, and the screen may be an LCD screen, an LED screen, an OLED screen, a QLED screen, or other various screens. The camera module 310 and the screen 312 are electrically connected to the processor 302.
Referring to fig. 15, a block diagram of a computer-readable storage medium according to a ninth embodiment of the present application is shown. The computer readable medium 800 has stored therein a program code that can be called by a processor to execute the method described in the first embodiment or the second embodiment.
The computer-readable storage medium 800 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. Alternatively, the computer-readable storage medium 800 includes a non-transitory computer-readable storage medium. The computer readable storage medium 800 has storage space for program code 810 to perform any of the method steps of the method described above. The program code can be read from or written to one or more computer program products. The program code 810 may be compressed, for example, in a suitable form.
Referring to fig. 16, a block diagram of a computer-readable storage medium according to a tenth embodiment of the present application is shown. The computer-readable medium 900 has stored therein program code that can be called by a processor to execute the method described in the third or fourth embodiment.
The computer-readable storage medium 900 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. Optionally, the computer-readable storage medium 900 includes a non-transitory computer-readable storage medium. The computer readable storage medium 900 has storage space for program code 910 to perform any of the method steps of the method described above. The program code can be read from or written to one or more computer program products. The program code 910 may be compressed, for example, in a suitable form.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (20)

  1. The equipment access method is applied to an intelligent equipment control system, and the intelligent equipment control system comprises the following steps: controlled equipment, a user terminal and gateway equipment, wherein the method comprises the following steps:
    the user terminal acquires equipment identification information of the controlled equipment, wherein the equipment identification information comprises a preset hotspot name and a preset hotspot password;
    creating a wireless hotspot taking the preset hotspot name as a hotspot name and the preset hotspot password as a hotspot password;
    establishing a connection with the controlled device through the wireless hotspot in response to an access request of the controlled device;
    and sending network authentication information to the controlled equipment, wherein the network authentication information is used for the controlled equipment to access a network of the gateway equipment, and the network authentication information comprises a network account and a network password corresponding to the network account.
  2. The method of claim 1, wherein the establishing a connection with the controlled device through the wireless hotspot in response to the access request of the controlled device comprises:
    detecting whether an access request of the controlled equipment is received;
    if so, verifying the access request;
    if the verification is qualified, establishing connection with the controlled equipment through the wireless hotspot;
    and if the access request of the controlled equipment is not received, sending prompt information, wherein the prompt information is used for prompting a user to enable the user terminal to be close to the controlled equipment.
  3. The method of claim 2, wherein after establishing the connection with the controlled device via the wireless hotspot if the controlled device is qualified, the method further comprises:
    and receiving control port information sent by the controlled equipment, wherein the control port is used for the controlled equipment to receive a control instruction.
  4. The method of claim 3, wherein the sending the network authentication information to the controlled device is performed through the control port.
  5. The method of claim 1, wherein the obtaining of the device identification information of the controlled device comprises:
    acquiring an identification image of the controlled equipment, wherein the identification image carries identification information;
    the identification information is recognized from the identification image.
  6. The method of any of claims 1 to 5, wherein sending the network authentication information to the target smart device comprises:
    acquiring a stored WiFi list;
    in response to a user selection in the WiFi list, determining the selected WiFi as a target network;
    and sending the network verification information of the target network to the target intelligent equipment.
  7. The method of any of claims 1 to 5, wherein sending the network authentication information to the target smart device comprises:
    acquiring a currently connected WiFi, and determining the currently connected WiFi as a target network;
    and sending the network verification information of the target network to the target intelligent equipment.
  8. The equipment access method is applied to an intelligent equipment control system, and the intelligent equipment control system comprises the following steps: the system comprises controlled equipment, a user terminal and gateway equipment, wherein the controlled equipment is provided with equipment identification information, and the equipment identification information comprises a preset hotspot name and a preset hotspot password; the method comprises the following steps:
    the controlled device scans for wireless hotspots;
    if a preset wireless hotspot established by the user terminal is scanned, connecting the preset wireless hotspot, wherein the hotspot name of the preset wireless hotspot is a preset hotspot name, and the hotspot password is a preset hotspot password;
    receiving network verification information sent by the user terminal;
    and accessing the network of the gateway equipment according to the network verification information.
  9. The method of claim 8, wherein the connecting the predetermined wireless hotspot if the predetermined wireless hotspot established by the user terminal is scanned comprises:
    if a preset wireless hotspot established by the user terminal is scanned, detecting the signal intensity of the preset wireless hotspot;
    and if the signal intensity of the preset wireless hotspot is greater than or equal to the preset intensity, connecting the preset wireless hotspot.
  10. The method of claim 9, wherein if the signal strength of the predetermined wireless hotspot is less than a predetermined strength, sending a warning message, wherein the warning message is used to warn the user that the controlled device is too far away from the user terminal.
  11. The method of claim 10, wherein the reminder information comprises voice information or broadcast information.
  12. The method of claim 8, wherein the connecting the predetermined wireless hotspot if the predetermined wireless hotspot established by the user terminal is scanned comprises:
    acquiring a wireless hotspot list, and determining whether a wireless hotspot with the same hotspot name as a preset hotspot name exists;
    if the wireless hotspot with the same name as the preset hotspot exists, determining the wireless hotspot with the same name as the preset hotspot as the preset wireless hotspot, and connecting the preset wireless hotspot with a preset hotspot password.
  13. The method of claim 8, further comprising: and after the preset wireless hotspot is connected, sending a control port to the user terminal, wherein the control port is used for receiving a control instruction.
  14. The method of claim 13, wherein the receiving the network authentication information sent by the user terminal is performed through the control port.
  15. The method of claim 8, wherein the controlled device scans for wireless hotspots, comprising:
    and responding to the operation of a user, starting a hot spot switch of the controlled equipment, and scanning the wireless hot spot.
  16. The device access device is applied to an intelligent device control system, and the intelligent device control system comprises: controlled equipment, user terminal and gateway equipment, the device includes:
    the acquisition module is used for acquiring equipment identification information of the controlled equipment, and the equipment identification information comprises a preset hotspot name and a preset hotspot password;
    the hotspot creating module is used for creating a wireless hotspot taking the preset hotspot name as a hotspot name and the preset hotspot password as a hotspot password;
    a connection module for establishing a connection with the controlled device within the wireless hotspot in response to an access request of the controlled device;
    the network authentication information is used for the controlled device to access a network of the gateway device, and comprises a network account and a network password corresponding to the network account.
  17. The device access device is applied to an intelligent device control system, and the intelligent device control system comprises: controlled equipment, user terminal and gateway equipment, controlled equipment has equipment identification information, equipment identification information includes predetermineeing hot name and predetermineeing hot password, the device includes:
    a scanning module for scanning wireless hotspots;
    the hotspot connection module is used for connecting a preset wireless hotspot when the preset wireless hotspot established by the user terminal is scanned, wherein the hotspot name of the preset wireless hotspot is a preset hotspot name, and the hotspot password is a preset hotspot password;
    the receiving module is used for receiving the network verification information sent by the user terminal;
    and the access module is used for accessing the network of the gateway equipment according to the network verification information.
  18. An electronic device, applied to a smart device control system, the smart device control system comprising: controlled equipment, electronic equipment and gateway equipment, electronic equipment includes: comprising a memory and a processor, the memory coupled with the processor; the memory stores instructions that, when executed by the processor, cause the processor to:
    acquiring equipment identification information of the controlled equipment, wherein the equipment identification information comprises a preset hotspot name and a preset hotspot password;
    creating a wireless hotspot taking the preset hotspot name as a hotspot name and the preset hotspot password as a hotspot password;
    establishing a connection with the controlled device within the wireless hotspot in response to an access request of the controlled device;
    and sending network authentication information to the controlled equipment, wherein the network authentication information is used for the controlled equipment to access a network of the gateway equipment, and the network authentication information comprises a network account and a network password corresponding to the network account.
  19. A control method of an intelligent device control system, the intelligent device control system comprising: controlled equipment, a user terminal and gateway equipment, wherein the method comprises the following steps:
    the user terminal acquires equipment identification information of the controlled equipment, wherein the equipment identification information comprises a preset hotspot name and a preset hotspot password;
    the user terminal creates a wireless hotspot with the preset hotspot name as a hotspot name and the preset hotspot password as a hotspot password;
    the controlled equipment scans a wireless hotspot, and if the wireless hotspot established by the user terminal is scanned, the controlled equipment is connected with the wireless hotspot;
    the user terminal sends network authentication information to the controlled equipment, the network authentication information is used for the controlled equipment to access a network of the gateway equipment, and the network authentication information comprises a network account and a network password corresponding to the network account;
    and the controlled equipment accesses the network of the gateway equipment according to the network verification information.
  20. A computer-readable storage medium, having stored thereon program code that can be invoked by a processor to perform the method according to any one of claims 1 to 8.
CN201980099290.0A 2019-10-18 2019-10-18 Device access method, device, system control method, electronic device and storage medium Pending CN114270781A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/112008 WO2021072761A1 (en) 2019-10-18 2019-10-18 Device access method and apparatus, system control method, electronic device and storage medium

Publications (1)

Publication Number Publication Date
CN114270781A true CN114270781A (en) 2022-04-01

Family

ID=75538184

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201980099290.0A Pending CN114270781A (en) 2019-10-18 2019-10-18 Device access method, device, system control method, electronic device and storage medium

Country Status (2)

Country Link
CN (1) CN114270781A (en)
WO (1) WO2021072761A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113691404A (en) * 2021-08-23 2021-11-23 深圳市欧瑞博科技股份有限公司 Network repairing method and device of intelligent equipment and intelligent gateway
CN114302395B (en) * 2021-11-25 2023-11-21 泰康保险集团股份有限公司 Method, portable gateway, device and computer readable medium for interacting data
CN114158044B (en) * 2021-11-30 2023-07-25 四川长虹电器股份有限公司 Intelligent equipment network distribution system and method
CN115022982B (en) * 2021-12-31 2023-04-11 荣耀终端有限公司 Multi-screen cooperative non-inductive access method, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105228147A (en) * 2015-09-17 2016-01-06 小米科技有限责任公司 Method for connecting network, Apparatus and system
CN107371163A (en) * 2017-07-28 2017-11-21 歌尔股份有限公司 A kind of method and apparatus for controlling access wireless network
CN107612909A (en) * 2017-09-18 2018-01-19 阿里巴巴集团控股有限公司 Information interacting method, device and equipment on internet of things equipment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3398365B1 (en) * 2015-12-28 2019-11-20 Telecom Italia S.p.A. Methods and systems for opportunistically connecting devices to a communication network
CN106454827A (en) * 2016-09-30 2017-02-22 上海斐讯数据通信技术有限公司 Intelligent equipment networking method and intelligent equipment networking system
US10608721B2 (en) * 2017-12-14 2020-03-31 Google Llc Opportunistic beamforming
CN108156647A (en) * 2017-12-19 2018-06-12 北京小米移动软件有限公司 Password acquisition methods and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105228147A (en) * 2015-09-17 2016-01-06 小米科技有限责任公司 Method for connecting network, Apparatus and system
CN107371163A (en) * 2017-07-28 2017-11-21 歌尔股份有限公司 A kind of method and apparatus for controlling access wireless network
CN107612909A (en) * 2017-09-18 2018-01-19 阿里巴巴集团控股有限公司 Information interacting method, device and equipment on internet of things equipment

Also Published As

Publication number Publication date
WO2021072761A1 (en) 2021-04-22

Similar Documents

Publication Publication Date Title
CN114270781A (en) Device access method, device, system control method, electronic device and storage medium
CN109348458B (en) Network access configuration method and device, electronic equipment and network system
KR101782070B1 (en) Method for controlling smart apparatus, terminal and server
CN109951362B (en) Electronic device and method for controlling nodes in a network
CN110430557B (en) Method, device and system for accessing equipment to network, electronic equipment and storage medium
CN110602692B (en) Data updating method and device and electronic equipment
US20180368058A1 (en) Method for controlling device access, and related device and system
US10154526B2 (en) Network setup for limited user interface devices
KR102339713B1 (en) Device network configuration method and apparatus, and medium
CN108462697B (en) Data processing method and device, electronic equipment and computer readable storage medium
CN113169992B (en) Equipment network distribution method and device, electronic equipment and storage medium
CN109725543B (en) Equipment control code configuration method and device, cloud server and network system
CN109997378B (en) Network sharing method and terminal
CN105472694A (en) Method and device for accessing WiFi through scanning two-dimensional code
CN113273151A (en) Intelligent device management method, mobile terminal and system
CN112164216A (en) Configuration method and device of intelligent remote controller, intelligent gateway equipment and storage medium
CN111077788A (en) Method, device and system for controlling access of intelligent equipment
CN112492611A (en) Network configuration method, network configuration device, electronic equipment and readable storage medium
CN106385397B (en) Method and device for access control and type configuration of network access equipment
CN111970676B (en) WiFi hot spot access method, device, equipment and storage medium
US9756608B1 (en) Systems and methods for providing wireless unconnected communication between devices
CN111511043B (en) Network connection method, device, electronic equipment and storage medium
CN109600340B (en) Operation authorization method, device, terminal and server
CN114158019A (en) Terminal control method, terminal control system, and storage medium
CN112905992B (en) Intelligent login method and device for local area network, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination