CN116684942A - Network access method, electronic equipment and storage medium - Google Patents

Network access method, electronic equipment and storage medium Download PDF

Info

Publication number
CN116684942A
CN116684942A CN202211103509.XA CN202211103509A CN116684942A CN 116684942 A CN116684942 A CN 116684942A CN 202211103509 A CN202211103509 A CN 202211103509A CN 116684942 A CN116684942 A CN 116684942A
Authority
CN
China
Prior art keywords
network
electronic device
access information
server
electronic equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211103509.XA
Other languages
Chinese (zh)
Inventor
刘锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honor Device Co Ltd
Original Assignee
Honor Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Honor Device Co Ltd filed Critical Honor Device Co Ltd
Priority to CN202211103509.XA priority Critical patent/CN116684942A/en
Publication of CN116684942A publication Critical patent/CN116684942A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a method for accessing a network, electronic equipment and a storage medium, and relates to the technical field of communication. In the application, a first electronic device and a second electronic device are accessed to a first network, and the method comprises the following steps: the first electronic equipment acquires network access information of a second network; if the second electronic equipment detects that the preset condition is met, a second network is established; if the first electronic equipment detects that the first electronic equipment is disconnected with the first network, the first electronic equipment is connected with a second network; if the second electronic equipment detects that the first electronic equipment is accessed to the second network, network access information of a third network is sent to the first electronic equipment through the second network; the first electronic device accesses the third network according to the network access information of the third network. By adopting the method, after the intelligent home equipment is disconnected with the original network, the network can be rapidly reconfigured, the step of reconfiguring the network by the intelligent home equipment is reduced, and the speed of reconfiguring the network by the intelligent home equipment is improved.

Description

Network access method, electronic equipment and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method for accessing a network, an electronic device, and a storage medium.
Background
Along with the development of smart home, more and more smart home devices are used by people, such as smart televisions, smart air conditioners, smart desk lamps, smart speakers and the like. Smart home devices often need to be connected to a network so that the smart home devices can operate according to the needs of a user, for example, the user can control to turn on a smart television, turn on a smart air conditioner, etc. through a mobile phone.
However, when the network name of the Wi-Fi network accessed by the smart home changes, or the password of the Wi-Fi network changes, or a new network is replaced, the smart home device is disconnected. The user needs to manually perform operations of re-accessing the network (such as reset operation, operation of re-selecting the network and operation of re-inputting the password) on each intelligent home device, so that the intelligent home device re-accesses the Wi-Fi network, which results in complicated operation of re-accessing the network by the intelligent home device, reduces the speed of re-configuring the network by the intelligent home device, and influences the use of the intelligent home.
Disclosure of Invention
In order to solve the technical problems, the application provides a network access method, electronic equipment and a storage medium, so that after the intelligent household equipment is disconnected with an original network, the network can be rapidly reconfigured, the step of reconfiguring the intelligent household equipment is reduced, and the network reconfiguration speed of the intelligent household equipment is improved.
In a first aspect, the present application provides a method for accessing a network, applied to a system including a first electronic device and at least one second electronic device, where the first electronic device and the second electronic device have access to the first network, the method comprising: the first electronic equipment acquires network access information of a second network; if the second electronic equipment detects that the preset condition is met, a second network is established; if the first electronic equipment detects that the first electronic equipment is disconnected with the first network, the first electronic equipment is accessed to the second network according to the network access information of the second network; if the second electronic equipment detects that the first electronic equipment is accessed to the second network, network access information of a third network is sent to the first electronic equipment through the second network; the first electronic device accesses the third network according to the network access information of the third network.
In this way, the first electronic device (such as the intelligent home device) can acquire the network access information of the second network in advance, when the second electronic device (such as a mobile phone, a sound box, a router and the like) creates the second network, the first electronic device can access the second network, so that the first electronic device can acquire the network access information of the third network through the second network, the first electronic device can access the third network through the network access information of the third network, a plurality of network allocation steps are not needed to be manually performed by a user, the speed of accessing the third network by the first electronic device is improved, and the experience of using the intelligent home device by the user is improved.
According to a first aspect, a first electronic device obtains network access information of a second network, including: the first electronic equipment receives network access information of a second network issued by a server, wherein the server is in communication connection with the first network. In this way, the network access information of the second network can be issued by the server through the first network, and the network access information of the second network can be quickly acquired in this way.
According to a first aspect, before the second electronic device creates the second network, the method further comprises: the second electronic equipment receives network access information of a second network issued by the server, and the network access information of the second network is randomly generated by the server. In this way, the server randomly generates the network access information of the second network corresponding to each user account, and the user does not need to manually set the network access information of the second network, so that the operation steps of the user are further reduced, and the speed of network reconfiguration of the intelligent home equipment is improved.
According to the first aspect, before the first electronic device receives the network access information of the second network issued by the server, the method further includes: and the second electronic equipment uploads the network access information of the second network to the server so that the server can send the network access information of the second network to the first electronic equipment. In this way, the second electronic device (such as a mobile phone) can respond to the network access information of the second network input by the user, send the network access information of the second network to the server, and the server sends the network access information of the second network to the smart home device bound with the user account to which the mobile phone belongs, so that the smart home device bound with the user account to which the mobile phone belongs can accurately acquire the network access information of the second network uploaded by the mobile phone.
According to a first aspect, a first electronic device obtains network access information of a second network, including: the second electronic device sends network access information of the second network to the first electronic device through the first network. Therefore, the first electronic equipment and the second electronic equipment are both in the same local area network, and the network access information of the second network can be forwarded through the first access point in the wireless local area network, so that the transmission mode is simple and quick.
According to a first aspect, a first electronic device obtains network access information of a second network, including: the second electronic device is directly connected with the first electronic device through a preset connection mode, and the preset connection mode comprises the following steps: bluetooth connection, radio Frequency Identification (RFID) connection and Wireless Local Area Network (WLAN) direct connection; the second electronic device transmits network access information of the second network to the first electronic device. In this way, the first electronic device and the second electronic device establish direct connection, and the first electronic device can directly acquire the network access information of the second network from the second electronic device, so that the speed of the first electronic device for acquiring the network access information of the second network is high.
According to a first aspect, before the first electronic device obtains network access information of the second network, the method includes: the second electronic equipment acquires equipment identifiers corresponding to N first electronic equipment bound with a user account, wherein N is an integer greater than 1; the second electronic equipment responds to a grouping instruction input by a user, and the grouping instruction is uploaded to a server so that the server divides equipment identifiers corresponding to the N first electronic equipment into at least 2 groups; the first electronic device obtaining network access information of the second network, including: the method comprises the steps that a first electronic device receives network access information of a second network corresponding to a packet to which the first electronic device belongs, and the network access information of the second network is determined and issued by a server according to the packet to which the first electronic device belongs.
In this way, the second electronic device can upload the grouping operation input by the user to the server, and the server groups the plurality of first electronic devices bound with the user account, so that the server can transmit the network access information of the second network corresponding to the grouping to each first electronic device in the grouping in batches. The first electronic devices in the group can access the second network according to the network access information of the second network, and the network access information of the third network is received through the second network, so that the first electronic devices in the group can access the third network in batches, the operation of re-distributing the network for each first device by a user is not needed, and the speed of re-distributing the network for the intelligent home devices (namely the first electronic devices) is improved.
According to a first aspect, the method further comprises: the second electronic equipment receives network information of a second network input by a user; or the second electronic equipment randomly generates the network information of the second network according to the preset period. In this way, the network access information of the second network can be input by the user through the second electronic equipment or can be randomly generated by the second electronic equipment, so that the flexibility of the network access information of the second network acquired by the second electronic equipment is improved.
According to a first aspect, the preset conditions include: a disconnection from the first network is detected, or a creation instruction input by a user is received, the creation instruction being for instructing creation of the second network. In this way, the second electronic device can create the second network after detecting disconnection from the first network or receiving the creation instruction of the user, so that the flexibility of the second electronic device in creating the second network is improved.
According to a first aspect, the second network is a hotspot network.
According to a first aspect, a first electronic device accesses a third network according to network access information of the third network, comprising: the first electronic device disconnects from the second network; and the first electronic equipment searches the third network according to the network access information of the network of the third network and accesses the third network. In this way, the first electronic device automatically disconnects from the second network after receiving the network access information of the third network, so that the third network can be quickly accessed later.
In a second aspect, the present application provides a method for accessing a network, applied to a system including a first electronic device and at least one second electronic device, where the first electronic device and the second electronic device have access to the first network, the method comprising: the first electronic equipment acquires decryption information for decryption according to a first network; if the second electronic equipment detects that the preset condition is met, encrypting the network access information of the third network to generate encrypted data: the second electronic device broadcasting the encrypted data; the first electronic equipment receives the encrypted data and acquires network access information of a third network from the encrypted data according to the decryption information; the first electronic device accesses the third network according to the network access information of the third network.
In this way, the second electronic device transmits the network access information of the third network in a broadcast manner, and in order to ensure the security of the broadcast, the second electronic device encrypts the network access information of the third network, and the first electronic device decrypts the encrypted data according to the obtained decryption information (such as a key and a decryption manner). The first electronic equipment acquires the network access information of the third network, so that the third network can be searched without manual operation of a user, and the first electronic equipment is accessed into the third network, so that the step of the user for re-distributing the network to the first electronic equipment is reduced, and the speed of re-distributing the network to the first electronic equipment is improved.
According to a second aspect, a first electronic device obtains decryption information for decryption according to a first network, comprising: the first electronic device receives decryption information issued by a server, and the server is in communication connection with the first network. In this way, the decryption information can be issued by the server through the first network, and the decryption information matched with the first electronic device can be quickly acquired in this way.
According to a second aspect, a first electronic device obtains decryption information for decryption according to a first network, comprising: the second electronic device uploads the decryption information to the server for the server to issue the decryption information to the first electronic device. In this way, the accuracy of the decryption information can be ensured by the provision of the decryption information by the second electronic device.
According to a second aspect, the method further comprises, before encrypting the network access information of the third network to generate encrypted data: the second electronic device receives an encryption mode issued by the server, wherein the encryption mode and decryption information matched with the encryption mode are generated by the server. In this way, the server randomly generates the encryption mode and decryption information corresponding to each user account, the user does not need to manually set the encryption mode and decryption information, the operation steps of the user are further reduced, and the speed of the intelligent home equipment for re-distributing the network is improved.
According to a second aspect, before the first electronic device obtains decryption information for decryption according to the first network, the method further comprises: the second electronic equipment acquires equipment identifiers corresponding to N first electronic equipment bound with a user account, wherein N is an integer greater than 1; the second electronic equipment responds to a grouping instruction input by a user, and the grouping instruction is uploaded to a server so that the server divides equipment identifiers corresponding to the N first electronic equipment into at least 2 groups; the first electronic device obtains decryption information for decryption according to a first network, including: the first electronic equipment receives a secret key corresponding to the group to which the first electronic equipment belongs, and decryption information corresponding to the group to which the first electronic equipment belongs is determined and issued by the server according to the group to which the first electronic equipment belongs. In this way, the second electronic device can upload grouping operation input by the user to the server, and the server groups a plurality of first electronic devices bound with the user account, so that the server can issue encryption and decryption information corresponding to the grouping in batches, and does not need to issue the encryption and decryption information to the first electronic device and the second electronic device independently each time, so that devices in the grouping can be accessed to a third network in batches, and the speed of network reconfiguration of the intelligent home device is improved.
In a third aspect, the present application provides an electronic device, comprising: one or more processors; a memory; and one or more computer programs, wherein the one or more computer programs are stored on the memory, which when executed by the one or more processors, cause the electronic device to perform the method of accessing a network performed by the first electronic device or the second electronic device in any implementation of the first aspect and the first aspect, or the method of accessing a network performed by the first electronic device or the second electronic device in any implementation of the second aspect and the second aspect.
Any implementation manner of the third aspect and any implementation manner of the third aspect corresponds to any implementation manner of the first aspect and the first aspect, or corresponds to any implementation manner of the first aspect and the first aspect, respectively. Technical effects corresponding to any implementation manner of the third aspect and any implementation manner of the third aspect may refer to technical effects corresponding to any implementation manner of the first aspect and any implementation manner of the second aspect, which are not described herein.
In a fourth aspect, the present application provides a computer readable medium storing a computer program which, when run on an electronic device, causes the electronic device to perform the method of accessing a network performed by the first electronic device or the second electronic device in any of the implementations of the first aspect or the second aspect, or the method of accessing a network performed by the first electronic device or the second electronic device in any of the implementations of the second aspect or the second aspect.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments of the present application will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic view of a scenario illustrating an exemplary smart home device reconfiguration network;
fig. 2 is a schematic structural view of an exemplary electronic device;
FIG. 3 is a schematic software architecture diagram of an exemplary electronic device;
FIG. 4 is a flow chart illustrating a method of accessing a network;
FIG. 5 is a schematic diagram illustrating a first electronic device receiving network access information from a server for a second network;
FIG. 6 is a schematic diagram illustrating another first electronic device receiving network access information from a server for issuing a second network;
fig. 7 is a schematic diagram illustrating a first electronic device receiving network access information of a second network through a wireless local area network;
FIG. 8 is a schematic diagram illustrating yet another first electronic device receiving network access information from a server for a second network;
FIG. 9 is a schematic diagram of an exemplary first electronic device reconfiguration network;
FIG. 10 is a schematic diagram of an exemplary first electronic device reconfiguration network;
FIG. 11 is a schematic diagram of an exemplary first electronic device reconfiguration network;
FIG. 12 is a schematic diagram illustrating yet another first electronic device receiving network access information from a server for issuing a second network;
fig. 13 is a flow chart of a method of accessing a network, which is shown by way of example;
FIG. 14 is a schematic diagram illustrating a first electronic device obtaining a key;
FIG. 15 is a schematic diagram illustrating yet another first electronic device obtaining a key;
FIG. 16 is a schematic diagram illustrating yet another first electronic device obtaining a key;
FIG. 17 is a schematic diagram illustrating yet another first electronic device obtaining a key;
FIG. 18 is a schematic diagram illustrating a first electronic device obtaining a key in a broadcast manner and accessing a third network;
FIG. 19 is a schematic diagram illustrating a server periodically updating encryption schemes and keys;
fig. 20 is a schematic diagram illustrating different packet acquisition encryption schemes and keys.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In some embodiments, the smart home device needs to access the network, and meanwhile, the smart home device can be bound with a user account, and a control device (such as a mobile phone) matched with the user account can control the smart home device through the accessed network. When the network name of the network accessed by the intelligent household equipment changes, the password of the accessed network changes or the accessed network is replaced, the intelligent household equipment is disconnected with the current accessed network. At this time, the user is required to manually re-perform the network configuration operation on the smart home device to re-access the network.
Fig. 1 is a schematic view of an exemplary smart home device reconfiguration network.
As shown in fig. 1a, the smart home device is exemplified by a desk lamp, and the control device is exemplified by a mobile phone. When the network name of the network (such as Wi-FiA network) to which the desk lamp is originally connected is changed, or the password is changed, or the access point (such as a router) of the network to which the desk lamp is originally connected stops working, the desk lamp is disconnected from the network (such as Wi-FiA network) to which the desk lamp is originally connected. The user can turn on the bluetooth function of the mobile phone and the bluetooth function of the desk lamp again. After the mobile phone logs in the user account, the mobile phone responds to the operation of clicking the adding device by the user, a Bluetooth module in the mobile phone starts to scan Bluetooth devices nearby the mobile phone, a scanning interface 101 shown in 1a of fig. 1 is adopted, and the mobile phone starts a scanning function. The user may also click a manual add button 102 in the scan interface to manually add the device. After the mobile phone finishes scanning, the scanning result can be displayed in the interface 103, as shown in fig. 1b, the scanning result 104 is displayed in the interface 103, the name of the scanned bluetooth device, such as "XXX intelligent desk lamp 2S", is displayed in the scanning result 104, and meanwhile, the connection button 105 is displayed. The user clicks the connect button 105 and jumps to the interface 107. Optionally, if the mobile phone does not scan the bluetooth device, the user may click the button 106, and the mobile phone guides the user to perform the manual addition operation in response to the operation of the user.
The interface 107 displays an option 108 and an option 109, wherein the option 108 is used for indicating the network name of the network accessed by the current mobile phone, such as "Honor-lemon", and the option 109 is used for inputting the access password of the "Honor-lemon" network by the user. After the user inputs the access password of the network, the user can click a button of the next step, and the mobile phone jumps to the connection interface 111 in response to the click operation of the user, and the connection interface displays the process of accessing the network by the desk lamp. After the desk lamp is connected with a new network of Honor-lemon, the desk lamp is rebinding with a user account again, and the mobile phone can control the desk lamp again through the connected network.
When the original network is changed, and the desk lamp is disconnected from the original network (such as Wi-FiA), if a new network needs to be accessed, a plurality of network allocation operations need to be performed by a user, and the network allocation process is the same as that of the first network allocation process, so that the network allocation steps are multiple, for example, if there are many intelligent home devices needing to be re-allocated (such as 3 intelligent home devices to be re-allocated), the user needs to perform network allocation operation on the 3 intelligent home devices in sequence according to the steps in fig. 1, the network allocation speed is slow, and the user experience is poor.
The application provides a network access method, which is applied to a distribution network system, wherein the distribution network system comprises auxiliary distribution network equipment and intelligent household equipment, and the auxiliary distribution network equipment can send network access information of a network to be accessed to the intelligent household equipment, so that when the intelligent household equipment is disconnected from an original accessed network, a new network can be accessed according to the network access information of the network to be accessed, a user does not need to manually perform distribution network operation, the operation steps of user distribution network are reduced, the distribution network speed is improved, and the user experience of using the intelligent household equipment is improved. The auxiliary distribution network equipment and the intelligent household equipment belong to electronic equipment.
Fig. 2 is a schematic structural diagram of an electronic device 100 according to an embodiment of the present application. It should be understood that fig. 2 illustrates electronic device 100 as just one example of an electronic device, and that electronic device 100 may have more or fewer components than shown, may combine two or more components, or may have a different configuration of components. The various components shown in fig. 1 may be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
The electronic device 100 may include: processor 110, external memory interface 120, internal memory 121, universal serial bus (universal serial bus, USB) interface 130, charge management module 140, power management module 141, battery 142, antenna 1, antenna 2, mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, headset interface 170D, sensor module 180, keys 190, motor 191, indicator 192, camera 193, display 194, and subscriber identity module (subscriber identification module, SIM) card interface 195, etc. The sensor module 180 may include a pressure sensor, a gyroscope sensor, a barometric sensor, a magnetic sensor, an acceleration sensor, a distance sensor, a proximity sensor, a fingerprint sensor, a temperature sensor, a touch sensor, an ambient light sensor, a bone conduction sensor, and the like.
Fig. 3 is a software configuration block diagram of the electronic device 100 according to the embodiment of the present application.
The layered architecture of the electronic device 100 divides the software into several layers, each with a distinct role and division of labor. The layers communicate with each other through a software interface. In some embodiments, the Android system is divided into three layers, an application layer, an application framework layer and a kernel layer from top to bottom. It will be appreciated that the layers in the software structure of fig. 3 and the components contained in the layers do not constitute a particular limitation of the electronic device 100. In other embodiments of the application, electronic device 100 may include more or fewer layers than shown and may include more or fewer components per layer, as the application is not limited.
As shown in fig. 3, the application layer may include a series of application packages. The application package may include applications for distribution network applications, WLAN, bluetooth, music, games, short messages, gallery, talk, navigation, etc. The network distribution application in the auxiliary network distribution equipment can be used for sending network access information of the network to be accessed to the intelligent home equipment, and the network distribution application in the intelligent home equipment can receive the network access information of the network to be accessed, search the network to be accessed and access the network to be accessed according to the received network access information.
The application framework layer provides an application programming interface (application programming interface, API) and programming framework for application programs of the application layer. The application framework layer includes a number of predefined functions.
As shown in FIG. 3, the application framework layer may include a window manager, resource manager, content provider, view system, phone manager, notification manager, and the like.
The window manager is used for managing window programs. The window manager can acquire the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like.
The resource manager provides various resources for the application program, such as localization strings, icons, pictures, layout files, video files, and the like.
The content provider is used to store and retrieve data and make such data accessible to applications. The data may include video, images, audio, calls made and received, browsing history and bookmarks, phonebooks, etc.
The view system includes visual controls, such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, a display interface including a text message notification icon may include a view displaying text and a view displaying a picture.
The telephony manager is used to provide the communication functions of the electronic device 100. Such as the management of call status (including on, hung-up, etc.).
The notification manager allows the application to display notification information in a status bar, can be used to communicate notification type messages, can automatically disappear after a short dwell, and does not require user interaction. Such as notification manager is used to inform that the download is complete, message alerts, etc. The notification manager may also be a notification in the form of a chart or scroll bar text that appears on the system top status bar, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, a text message is prompted in a status bar, a prompt tone is emitted, the electronic device vibrates, and an indicator light blinks, etc.
The kernel layer is a layer between hardware and software. The kernel layer at least comprises a display driver, a Wi-Fi driver, a Bluetooth driver, an audio driver and a sensor driver.
It will be appreciated that the layers and components contained in the layers in the software structure shown in fig. 3 do not constitute a specific limitation on the electronic device 100. In other embodiments of the application, electronic device 100 may include more or fewer layers than shown and may include more or fewer components per layer, as the application is not limited.
Fig. 4 is a flow chart illustrating a method of accessing a network. In this example, the first electronic device is an intelligent home device, which may be a desk lamp, a sound device, an air conditioner, a television, or other devices, and in this example, the first electronic device is a desk lamp. The second electronic device is auxiliary network distribution equipment, and can be a mobile phone, a sound device, a router and the like. The method for accessing the network comprises the following steps:
step 401: the first electronic device obtains network access information of the second network.
The first electronic device and the second electronic device have access to a first network, which may be a Wi-Fi network, for example. When the second electronic device is disconnected from the first network, the first electronic device may obtain network access information of a network to be accessed through the auxiliary network (i.e., the second network), where the network to be accessed is a third network.
The first electronic device may obtain network access information of the second network in advance, so that the second network may be accessed in a subsequent step, so as to obtain network access information of the third network through the second network.
In some embodiments, the first electronic device may receive network access information of the second network issued by a server, where the server is a server corresponding to the user account and may be used to manage an intelligent home device bound to the user account. The process of the first electronic device receiving the network access information of the second network issued by the server is specifically described below with reference to fig. 5 and 6.
Fig. 5 is a schematic diagram illustrating an exemplary manner in which the first electronic device receiving server issues network access information of the second network, as shown in fig. 5:
step 501: and uploading the network access information of the second network to the first access point by the mobile phone.
In particular, the first access point may be a wireless access point (Wireless Access Point, AP), such as a router. As shown in fig. 5, the cloud end corresponding to the user account may include at least one server, where the server may be in communication connection with a first access point (denoted as AP 1) in the first network, and the server may obtain data uploaded by the mobile phone through the AP1, or may issue data to the mobile phone or other electronic devices accessing the first network through the AP 1. Optionally, in this example, the second electronic device takes a mobile phone as an example, and the mobile phone may upload network access information of the second network to the AP1, where the network access information of the second network may include: the network name of the second network and the access password of the second network, where the network name of the second network may be a service set identifier (Service Set Identifier, SSID) of the second network, e.g. SSID of the second network is "XX-link_455a20".
Optionally, the second electronic device may also be a sound device, a router, or the like. For example, if the second electronic device is a router, the user may set network access information of the second network in the router, and the router uploads the network access information of the second network to the cloud (i.e., the server).
Optionally, when uploading the network access information of the second network, the mobile phone may further carry a user account to which the mobile phone belongs, where the user account is used for binding with the smart home device and managing the smart home device.
Alternatively, the handset may store network access information for the second network in response to the network access information for the second network entered by the user.
Optionally, the mobile phone may also randomly generate network access information of the second network, and store the network access information of the second network. The mobile phone may also randomly generate the network access information of the second network periodically or aperiodically to improve the security of the network access information of the second network, for example, the mobile phone may update the network access information of the second network at intervals of 1 month. For example, the mobile phone may update the network access information of the second network according to a preset time, where the preset time may be N update times set by the user, and N may be an integer greater than 1, for example, N is 2, 5, and so on.
Step 502: the first access point uploads network access information of the second network to the server.
Specifically, after receiving the network access information of the second network uploaded by the mobile phone, the first access point uploads the network access information of the second network to the server.
Step 503: the server transmits network access information of the second network to the first access point.
Specifically, the server receives a user account to which the mobile phone belongs, and stores the relationship between the network access information of the second network and the user account. Optionally, the server may query the smart home device bound to the user account, for example, query that the smart home device bound to the user account is a desk lamp. The server may send the network access information of the second network to the queried smart home device (i.e. queried the first electronic device) through the first access point. As shown in fig. 5, if the user account to which the mobile phone belongs is the user account a, the server may query that the smart home device bound to the user account a is a desk lamp, and then the server issues network access information of the second network to the desk lamp through the router, e.g. the server issues network access information of the second network to the first access point.
Step 504: the first access point transmits network access information of the second network to the desk lamp.
Specifically, the first access point transmits the network access information of the second network to the desk lamp, and the desk lamp receives the network access information of the second network and stores the network access information of the second network.
In this example, the mobile phone may respond to the network access information of the second network input by the user, send the network access information of the second network to the server, and send the network access information of the second network to the smart home device bound to the user account to which the mobile phone belongs by the server, so that the smart home device bound to the user account to which the mobile phone belongs can accurately obtain the network access information of the second network uploaded by the mobile phone.
Alternatively, the handset may upload the network access information of the second network to the server through a cellular network, a 4G network, or a 5G network. For example, the user sets network access information of the second network to the mobile phone at the company, and the mobile phone transmits the set network access information of the second network to the server through the 4G network. The server may send the network access information of the second network to the desk lamp (i.e., the first electronic device) after receiving the network access information. When the user returns home, the desk lamp already receives the network access information of the second network issued by the server, the user can instruct the mobile phone to create a hot spot network (namely the second network), and the desk lamp is accessed into the second network according to the network access information of the second network.
That is, the mobile phone can upload the network access information of the second network to the server through the Wi-Fi network, the cellular network, the 4G network or the 5G network, so that the user can remotely upload the network access information of the second network to the server through the mobile phone without being close to the first electronic device, and the flexibility of uploading the network access information of the second network by the second electronic device is further improved.
Similarly, the server may issue network access information of the second network to the first electronic device via a Wi-Fi network, a cellular network, a 4G network, or a 5G network.
In some embodiments, the network access information for the second network may also be randomly generated by the server. Fig. 6 is a schematic diagram showing another first electronic device receiving network access information sent by a server to a second network, as shown in fig. 6:
step 601: the server generates network access information for the second network.
For example, the server may generate network access information of the second network corresponding to each user account. Specifically, the server stores a plurality of user accounts, and an intelligent home device and an auxiliary distribution network device which are bound with the user accounts, wherein the auxiliary distribution network device can be bound with a second electronic device (such as a mobile phone, a sound box, a router and the like) with the user accounts, and can also be a device for logging in the user accounts.
For example, the server stores a user account a and a user account B, the smart home device bound by the user account a is a desk lamp, and the second electronic device corresponding to the user account a is a mobile phone a. The intelligent home equipment bound by the user account B is sound equipment, and the second electronic equipment corresponding to the user account B is a mobile phone B. The server may randomly generate network access information of the second network corresponding to the user account a, for example, the second network corresponding to the user account a is Wi-fi_b1. The server may randomly generate network access information of the second network corresponding to the user account B, for example, the second network corresponding to the user account B is Wi-fi_b2.
Step 602: and the server transmits the network access information of the second network to the mobile phone.
The server may send the network access information of the second network to the second electronic device corresponding to the user account and the smart home device bound to the user account according to the user account. In this example, as shown in fig. 6, the server detects that the second electronic device corresponding to the user account is a mobile phone a, and may send the network access information of the second network corresponding to the user account a to the mobile phone a through the first access point. For example, as shown in fig. 6, the server may transmit network access information of the second network corresponding to the user account to the first access point (AP 1).
Step 603: and the server transmits network access information of the second network to the desk lamp.
For example, the server may issue, according to the user account, the network access information of the second network to the smart home device bound to the user account. In this example, as shown in fig. 6, the server detects that the smart home device bound by the user account is the desk lamp a, and the server may transmit the network access information of the second network corresponding to the user account to the desk lamp a through the first access point, that is, the server may transmit and issue the network access information of the second network corresponding to the user account to the first access point, and the first access point forwards the network access information of the second network to the desk lamp a.
Step 604: the first access point transmits network access information of the second network to the mobile phone.
As shown in fig. 6, the first access point forwards the network access information of the second network to the mobile a.
Step 605: the first access point transmits network access information of the second network to the desk lamp.
As shown in fig. 6, the first access point forwards the network access information of the second network to the desk lamp a.
Optionally, the server generates network access information of the second network corresponding to each user account, and the server may send the network access information of the second network to one or more (e.g. two or more) electronic devices bound by the user account. For example, the electronic device bound to the user account is provided with a sound box a, an air conditioner a, a desk lamp a and a router a, and the server can issue network access information of the second network to the sound box a, the air conditioner a, the desk lamp a and the router a. That is, the server is not limited to transmitting the network access information of the second network only to the first electronic device and the second electronic device.
In the example, the server randomly generates the network access information of the second network corresponding to each user account, and the user does not need to manually set the network access information of the second network, so that the operation steps of the user are further reduced, and the speed of network reconfiguration of the intelligent home equipment is improved.
In some embodiments, the second electronic device may further transmit network access information of the second network to the first electronic device through the wireless local area network, and a specific process may refer to fig. 7, including:
step 701: the mobile phone sends network access information of the second network to the desk lamp.
In an exemplary embodiment, the mobile phone may transmit the network access information of the second network to the first access point in response to the network access information of the second network input by the user, and the first access point forwards the network access information of the second network to the desk lamp.
Step 702: the first access point receives network access information of a second network transmitted by the mobile phone and forwards the network access information of the second network to the desk lamp.
The desk lamp receives network access information of a second network forwarded by the first access point. Because the desk lamp and the mobile phone are both in the same local area network, the network access information of the second network can be forwarded through the first access point in the wireless local area network, and the transmission mode is simple.
Optionally, the mobile phone may also directly establish a communication connection with the desk lamp, and the mobile phone directly transmits the network access information of the second network to the desk lamp, where the specific process is as shown in fig. 8, and includes:
step 801: the mobile phone sends network access information of the second network to the desk lamp.
For example, the handset may store network access information for the second network in response to the network access information for the second network entered by the user. Alternatively, the mobile phone may also randomly generate the network access information of the second network periodically or aperiodically.
When the mobile phone acquires the network access information of the new second network, the new network access information of the second network can be sent to the desk lamp.
Optionally, the mobile phone may also send the network access information of the second network to the desk lamp after receiving the acquisition request sent by the desk lamp.
In the example, the mobile phone can be connected with the desk lamp in a Bluetooth and RFID mode, and can also be connected with the desk lamp in a WLAN direct connection mode.
In this example, four ways of the first electronic device acquiring the network access information of the second network are listed, and after the first electronic device acquires the network access information of the second network, the second electronic device may execute step 402.
Step 402: and if the second electronic equipment detects that the preset condition is met, a second network is created.
Specifically, the preset condition may be that the mobile phone detects that the second electronic device is disconnected from the first network, for example, if the mobile phone detects that the second electronic device is disconnected from the first network, the mobile phone acquires stored network access information of the second network, and creates a hotspot network according to the network access information of the second network.
Optionally, the preset condition may also be that the mobile phone receives a creation instruction input by the user, for example, the user clicks an icon of the hotspot, and the mobile phone responds to the operation of the user to create the hotspot network (i.e. the second network) according to the network name and the access password pre-stored by the user. Or, the user can click a network creating control in the distribution network application interface of the mobile phone, and the mobile phone responds to the clicking operation of the user to create the hot spot network.
Optionally, if the server issues the network access information of the second network to one or more (e.g. two or more) devices bound to the user account, the user may select one electronic device from the plurality of electronic devices that receive the network access information of the second network as the second electronic device, and input a creation instruction into the selected second electronic device, where the second electronic device creates the second network in response to the creation instruction input by the user.
Step 403: and if the first electronic equipment detects that the first electronic equipment is disconnected with the first network, accessing the second network according to the network access information of the second network.
For example, after the first electronic device detects disconnection from the first network, the first electronic device may search for the second network according to network access information of the second network. After the first electronic device searches the second network, the first electronic device can access the second network according to the network access information of the second network. The process of searching the network by the first electronic device may refer to the current process of scanning the WLAN network by the mobile phone, which will not be described herein.
Step 404: and if the second electronic equipment detects that the first electronic equipment is accessed to the second network, the second electronic equipment sends network access information of a third network to the first electronic equipment through the second network.
For example, when the second electronic device detects that the first electronic device accesses the second network, the network access information of the third network may be sent to the first electronic device.
Optionally, the second electronic device may close the second network, such as closing a hotspot network, after completing transmission of the network access information of the third network.
Step 405: the first electronic device accesses the third network according to the network access information of the third network.
For example, the first electronic device may disconnect from the second network when receiving the network access information of the third network sent by the second electronic device. The first electronic device searches the third network according to the network name of the third network. And after the first electronic equipment searches the third network, accessing the third network according to the network access information of the third network.
Fig. 9 to 11 are schematic diagrams of the first electronic device reconfiguration network.
As shown in fig. 9, the first electronic device is exemplified by a desk lamp, and the second electronic device is exemplified by a mobile phone. The first access point may be a router, denoted AP1. The desk lamp may obtain the network access information of the second network according to the mode in step 401 (for example, the network name of the second network is "Wi-Fi 2", the access password is "123456"), and the network access information of the second network obtained by the mobile phone may also refer to the related description in step 401, which will not be described herein. In this example, the handset detects that it is disconnected from the first network (e.g., the network name of the first network is "Wi-Fi 1"), the handset performs step 901, and the handset creates a second network. The handset creates a hotspot network, such as Wi-Fi 2 network in 9a of fig. 9, from the stored network access information of the second network. The desk lamp searches the second network according to the stored network name of the second network. When the desk lamp searches the second network, step 902 is executed: the desk lamp is connected to the second network according to the access information of the second network. For example, the desk lamp accesses the second network according to the access password of the second network, and the mobile phone and the desk lamp shown in 9a in fig. 9 are in the same oval-shaped dotted line area, which indicates that the mobile phone and the desk lamp are in the same wireless local area network (for example, are both in Wi-Fi 2 network). After detecting that the desk lamp is connected to the Wi-Fi 2 network, the mobile phone executes step 903 to transmit network access information of a third network to the desk lamp. The network access information of the third network includes: a network name (e.g., SSID name) of the third network and an access password of the third network. After receiving the network access information of the third network, the desk lamp disconnects the Wi-Fi 2 network as shown in 9b of fig. 9. The handset may also shut down the hotspot network. The desk lamp searches for the third network according to the network name of the third network, if the third network is found, step 904 is executed: the desk lamp is accessed into the third network according to the network access information of the third network, as shown in 9b, the mobile phone and the desk lamp are both positioned in the third network (i.e. Wi-Fi 3), and the network re-distribution process of the desk lamp is finished.
In one example, the second electronic device may also be other electronic devices, such as a sound. Fig. 10 is a schematic diagram illustrating an audio device as a first electronic device, and an auxiliary desk lamp re-distribution network, and the process includes:
step 1001: the sound creates a second network.
Step 1002: and the desk lamp is accessed into the second network according to the network access information of the second network.
Step 1003: the sound equipment detects that the desk lamp is connected to the second network, and transmits network access information of the third network to the desk lamp.
As shown in fig. 10a, the above three steps may refer to the related description in step 401 for obtaining the network access information of the second network by the desk lamp, which is not described herein again. The description of step 1002 and step 1003 may refer to the description of fig. 9, and will not be described herein.
Step 1004: the desk lamp is accessed to the third network according to the network access information of the third network.
As shown in 10b of fig. 10, when the desk lamp receives the network access information of the third network, the connection with the second network may be disconnected. The process of accessing the desk lamp to the third network can be described with reference to fig. 9, and will not be described herein.
It should be noted that, in this example, devices located in the same virtual coil are located in the same wireless lan.
In one example, the second electronic device may also be a router. Fig. 11 is a schematic diagram illustrating a router as a first electronic device, and an auxiliary desk lamp re-distribution network, and the process includes:
step 1101: the router creates a second network.
Illustratively, the router may be a router of the third network, denoted as AP3 in fig. 11, and may store network access information of the second network entered by the user. The router may create the second network upon detecting a user entered instruction to create a network. For example, the user may instruct the router to create the second network through the computer. As shown in 11a of fig. 11, the router AP3 may be used to connect to a Wi-Fi2 network, and may also be used to connect to a Wi-Fi3 network.
Alternatively, the router creating the second network may also be a router of the first network, for example, the router of the first network may store network access information of the second network in advance, for example, the router AP1 may store network access information of the second network input by the user in advance. The desk lamp is disconnected from the first network, and the router AP1 may create the second network in response to a creation instruction input by a user.
Step 1102: and the desk lamp is accessed into the second network according to the network access information of the second network.
Step 1103: the router detects that the desk lamp is connected to the second network, and transmits network access information of the third network to the desk lamp.
The steps 1102 and 1103 may be shown in fig. 9a, and will not be described herein.
Step 1104: the desk lamp is accessed to the third network according to the network access information of the third network.
This step may be described with reference to 904 in fig. 9, and will not be described in detail herein.
In some embodiments, a plurality of first electronic devices are bound with a user account, a second electronic device obtains device identifiers corresponding to N first electronic devices bound with the user account, and N is an integer greater than 1; and the second electronic equipment responds to the grouping instruction input by the user, and uploads the grouping instruction to the server so that the server divides the equipment identifiers corresponding to the N first electronic equipment into at least 2 groups. The server can send network access information of a second network corresponding to the group to the first electronic equipment according to the group information; the first electronic equipment receives network access information of a second network corresponding to the packet to which the first electronic equipment belongs. The method for accessing the network may refer to the steps in fig. 12, including:
Step 1201: the server generates a second network for each packet.
The server illustratively stores device information bound to the user account. The user can log in the user account through the mobile phone, and in the process of logging in the user account through the mobile phone, the server can return the identification information of the equipment bound with the user account to the mobile phone. For example, the mobile phone displays 6 devices bound to the user account a, and the mobile phone may upload the grouping operation to the server in response to the grouping operation input by the user, and the server divides the 6 devices into 2 groups in response to the grouping operation, as shown in fig. 12, into a group a and a group B.
The server may generate a second network for each packet, e.g., the server may generate network access information for the second network for packet a and generate network access information for the second network for packet B. Alternatively, the network access information of the second network corresponding to the packet a may be the same as the network access information of the second network corresponding to the packet B, and the network access information of the second network corresponding to the packet a may be different from the network access information of the second network corresponding to the packet B.
Step 1202: the server issues network access information for the second network matching packet a to the device of packet a.
The server may issue network access information of the second network matching the packet a to the packet a through the router AP 1. The server may send network access information of the second network corresponding to the packet a to the second electronic device, and the first electronic device in the packet a. As shown in fig. 12, the mobile phone is a second electronic device, and the sound a and the desk lamp a may be first electronic devices in the group a.
Step 1203: the server issues network access information for the second network matching packet B to the device of packet B.
This step is similar to step 1202 and reference may be made to the relevant description in 1202.
Step 1204: the first access point issues network access information for a second network matching packet a to the device of packet a.
Specifically, after the first electronic device in the packet a receives the network access information of the second network corresponding to the packet a. The first electronic device in the group a may be configured in the manner described with reference to fig. 9-10.
Step 1205: the first access point issues network access information for a second network matching packet B to the device of packet B.
And after the first electronic equipment in the packet B receives the network access information of the second network corresponding to the packet B. The first electronic devices in the group B may be configured in the manner of fig. 9 to 10, that is, the stereo B and the table lamp B may be reconfigured in batch.
Alternatively, the network access information of the second network received by each packet may be the same or different.
Optionally, the network access information of the third network received by each packet may be the same or different, i.e. the first electronic device in each packet may access the same network. The first electronic device in different packets may access the same network or may access different networks.
In this example, the second electronic device may upload the grouping operation input by the user to the server, where the server groups the plurality of first electronic devices bound with the user account, so that the server may transmit, in bulk, network access information of the second network corresponding to the grouping to each device in the grouping. The device in the packet may access the second network according to the network access information of the second network, and receive the network access information of the third network. Therefore, the devices in the group can be accessed to the third network in batches, the operation of re-distributing the network for each device is not needed by a user, and the speed of re-distributing the network for the intelligent home equipment is improved.
The embodiment of the application also provides a method for accessing the network, wherein the second electronic equipment can transmit the network access information of the third network to the first electronic equipment in a broadcast mode, so that the first electronic equipment can access the third network according to the network access information of the third network after the connection with the first network is disconnected, a user does not need to carry out complex network allocation actions, and the speed of the first electronic equipment for re-allocating the network is improved.
Fig. 13 is a flow chart illustrating a method of accessing a network. The first electronic device may be an intelligent home device, such as a desk lamp, a sound device, an air conditioner, a television, and the like, and in this example, the first electronic device is exemplified by a desk lamp. The second electronic device is auxiliary network distribution equipment, and can be a mobile phone, a sound device, a router and the like. The method for accessing the network comprises the following steps:
step 1301: the first electronic device obtains a key for decryption according to the first network.
The first electronic device and the second electronic device have access to a first network, which may be a Wi-Fi network, for example. The second electronic device, such as a mobile phone, may send the network access information of the third network in a broadcast manner. In order to increase the security of the broadcast data, the second electronic device may encrypt the network access information of the third network, and the first electronic device may obtain decryption information for decryption in advance, for example, a key, a decryption manner (for example, a manner for decrypting MD 5), so that the network access information of the third network may be obtained from the broadcast data in a subsequent step. Decryption information is exemplified by a key in this example. The first electronic device obtains the secret key in a plurality of ways, and a process of the first electronic device obtaining the secret key in 4 ways will be specifically described with reference to fig. 14 to 17, wherein the first electronic device uses a desk lamp as an example, the second electronic device uses a mobile phone as an example, and a first access point of the first network is a router and is denoted as AP1. The first network corresponds to a respective server.
Fig. 14 is a schematic diagram illustrating a first electronic device obtaining a key, where a process of obtaining the key includes:
step 1401: the handset uploads the key to the first access point.
As shown in fig. 14, the cloud end corresponding to the user account may include at least one server, where the server may be communicatively connected to a first access point in the first network, and the first access point is configured to forward the received information. The server can acquire data uploaded by the mobile phone through the AP1, and can also send the data to the mobile phone or other electronic equipment accessed to the first network through the AP 1.
Optionally, the second electronic device may also be a router or the like. For example, if the second electronic device is a router, the user may set the encryption scheme and the key corresponding to the encryption scheme in the router, and the router may send the encryption scheme to the second electronic device and the key to the first electronic device.
Optionally, when uploading the secret key, the mobile phone can also carry a user account to which the mobile phone belongs, and the user account can be bound with the smart home device. After receiving the user account, the server may determine a first electronic device bound to the user account.
Alternatively, the handset may store the key in response to the user's input key or upload the input key to the server via the first access point.
Optionally, the mobile phone may also randomly generate an encryption mode and a key matching the encryption mode, and store the encryption mode and the key matching the encryption mode. The mobile phone can also randomly generate the encryption mode and the key matched with the encryption mode at regular or irregular intervals so as to improve the broadcasting security, for example, the mobile phone can update the encryption mode and the key matched with the encryption mode at intervals of 1 month. For another example, the mobile phone may update the network access information of the second network according to a preset time, where the preset time may be N update times set by the user, N may be an integer greater than 1, for example, N is 2, 5, and the like, and the preset time includes: 10 points on day 1 of 8 months 2022 and 22 points on day 23 of 8 months 2022.
Step 1402: the first access point is responsive to the key uploaded by the user to upload the key to the server.
Step 1403: the server issues a key to the first access point.
Specifically, the server may receive a user account to which the mobile phone belongs, and store the corresponding relationship between the key and the user account and the key. Optionally, the server may query the smart home device bound to the user account, for example, query the smart home device bound to the user account as the desk lamp a. The server may send a key corresponding to the user account to desk lamp a. As shown in fig. 14, if the user account to which the mobile phone belongs is a user account a, the server may query that the smart home device bound to the user account a is a desk lamp a, and then the server issues a key corresponding to the user account to the desk lamp a through the router AP 1.
Step 1404: the first access point receives the key issued by the server and forwards the key to the desk lamp.
In some embodiments, the key may be further acquired in a manner shown in fig. 15, and fig. 15 is a schematic diagram schematically illustrating a first electronic device acquiring the key, where a process for acquiring the key includes:
step 1501: the server generates an encryption scheme and a corresponding key.
Illustratively, the server may generate an encryption scheme and key corresponding to each user account. The server is specifically configured to store a plurality of user accounts, and an intelligent home device and an auxiliary distribution network device that are bound to the user accounts, where the auxiliary distribution network device may be specified by a user. For example, the user may log in to the user account through a mobile phone, and the server may return the electronic device that has been bound to the user account. And the mobile phone responds to the operation of selecting the second electronic equipment by the user, transmits the instruction of selecting the second electronic equipment by the user to the server, and determines the second electronic equipment by receiving the instruction of selecting the second electronic equipment by the user. For example, the electronic device bound to the user account a includes a desk lamp, a mobile phone, and a sound, the user can select the sound as the second electronic device, and the server receives the instruction of selecting the sound by the user uploaded by the mobile phone, and determines that the second electronic device is the sound.
For example, the server stores a user account a and a user account B, the smart home device bound by the user account a is a desk lamp, and the second electronic device bound by the user account a is a mobile phone a. The intelligent home equipment bound by the user account B is sound equipment, and the second electronic equipment bound by the user account B is a mobile phone B. The server may randomly generate an encryption manner and a key corresponding to the user account a, for example, the encryption manner a and the key a corresponding to the user account a. The server may randomly generate an encryption scheme and a key corresponding to the user account B, such as the encryption scheme B and the key B corresponding to the user account B. The encryption scheme a and the encryption scheme B may be the same, and the key a and the key B may be the same or different.
Step 1502: the server transmits an encryption mode corresponding to the secret key to the mobile phone.
Specifically, the server may issue an encryption manner to the mobile phone through the first access point according to the second electronic device address corresponding to the user account, that is, the first access point receives the encryption manner of the issued mobile phone, and execute step 1504.
Optionally, the server generates an encryption mode and a key corresponding to each user account, and the server may send the encryption mode and the key to one or more electronic devices bound to the user account. For example, the electronic device bound to the user account is provided with a sound box a, an air conditioner a, a desk lamp a and a router a, and the server can issue an encryption mode and a secret key corresponding to the user account to the sound box a, the air conditioner a, the desk lamp a and the router a.
Step 1503: the server issues a key to the desk lamp.
Specifically, the server may issue a key to the first electronic device (e.g. the desk lamp in fig. 15) through the first access point according to the address of the first electronic device corresponding to the user account, that is, the first access point receives the key of issuing the desk lamp, and execute step 1505.
Step 1504: the first access point transmits an encryption mode corresponding to the secret key to the mobile phone.
Step 1505: the first access point issues a key to the desk lamp.
In some embodiments, the key may also be transmitted to the first electronic device through the wireless lan, and fig. 16 is a schematic diagram illustrating an exemplary process for obtaining the key by the first electronic device, where the process for obtaining the key includes:
step 1601: the handset sends the key to the desk lamp.
For example, as shown in fig. 16, the mobile phone and the desk lamp are in the same lan, so the mobile phone can forward the key to the desk lamp through the AP1 in the wlan.
Step 1602: the first access point receives the key transmitted by the mobile phone and forwards the key to the desk lamp.
In the example, the mobile phone transmits the secret key to the desk lamp in a wireless local area network mode, a server is not needed, and the transmission mode is simple and high in speed.
Optionally, the mobile phone may also directly establish communication connection with the desk lamp, and the mobile phone directly transmits the secret key to the desk lamp, where the specific process is as shown in fig. 17, and includes:
step 1701: the handset sends the key to the desk lamp.
Illustratively, the handset may store a key in response to a user input of the key. Alternatively, the handset may randomly generate the key periodically or aperiodically.
When the handset obtains the new key, it can send the new key to the desk lamp.
Optionally, the mobile phone may also send the key to the desk lamp after receiving the acquisition request sent by the desk lamp.
In the example, the mobile phone can be connected with the desk lamp in a Bluetooth and RFID mode, and can also be connected with the desk lamp in a WLAN direct connection mode.
In this example, four ways in which the first electronic device obtains the key are listed, and after the first electronic device obtains the key, the second electronic device may perform step 1302.
Step 1302: and if the second electronic equipment detects that the preset condition is met, encrypting the network access information of the third network to generate encrypted data.
For example, the preset condition may be that the mobile phone detects that the second electronic device is disconnected from the first network, for example, the mobile phone detects that the second electronic device is disconnected from the first network, and then obtains a stored encryption mode, and encrypts the network access information of the third network according to the encryption mode.
Optionally, the preset condition may also be that the mobile phone receives a transmission instruction input by the user, for example, the user triggers the mobile phone to enter a one-key network configuration mode (such as a smart configuration mode), and the mobile phone responds to the operation of the user and encrypts the network access information of the third network according to a stored encryption mode pre-stored by the user.
Optionally, if the server issues the encryption manner and the secret key to a plurality of devices bound to the user account, the user may select one electronic device from the plurality of electronic devices that receive the encryption manner and the secret key as the second electronic device, and input an encryption instruction (or an instruction for sending network access information of the third network) into the selected second electronic device, where the second electronic device encrypts the network access information of the third network in response to the encryption instruction input by the user, to generate encrypted data.
Step 1303: the second electronic device broadcasts the encrypted data.
Specifically, the mobile phone starts a broadcasting mode to broadcast the encrypted data.
Step 1304: the first electronic device receives the encrypted data and acquires network access information of the third network from the encrypted data according to the secret key.
For example, after the first electronic device detects disconnection from the first network, the first electronic device may enter into a sniffer mode to monitor the broadcast message. After the first electronic device receives the broadcast message, network access information of the third network can be obtained from the broadcast message according to the stored decryption information.
Step 1305: the first electronic equipment accesses the third network according to the network access information of the third network
This step may be described with reference to 405, and will not be described in detail herein.
Fig. 18 is a schematic diagram illustrating that the first electronic device obtains a key in a broadcast manner and accesses to the third network.
As shown in fig. 18, the first electronic device is exemplified by a desk lamp, and the second electronic device is exemplified by a mobile phone. The first access point may be a router, denoted AP1. The desk lamp can acquire the key for decryption according to the method in step 1301, and the encryption method stored in the mobile phone can also refer to the related description in step 1301, which will not be described here again. In this example, the handset detects a disconnection from the first network (e.g., the network name of the first network is "Wi-Fi 1"), and the handset performs:
in step 1801, the mobile phone encrypts the network access information of the third network, and generates encrypted data.
The mobile phone may store network access information of a third network in advance, where the network access information of the third network includes: a network name (e.g., SSID name) of the third network and an access password of the third network.
Optionally, the mobile phone may access a third network, and store network access information of the third network. As shown at 18a of fig. 18, the handset is in a third network.
In step 1802, the handset broadcasts encrypted data using a broadcast mode. For specific procedures reference is made to step 1303.
Step 1803, the desk lamp receives the encrypted data, and obtains network access information of the third network from the encrypted data according to the key. For a specific procedure, reference may be made to step 1304, which is not described in detail herein.
After receiving the network access information of the third network, as shown in fig. 18b, the desk lamp searches for the third network according to the network name of the third network, and if the third network is found, step 1305 is executed: the desk lamp is accessed to the third network according to the network access information of the third network, as shown in 18b, after the desk lamp is accessed to the third network, the mobile phone and the desk lamp are both in the third network (i.e. Wi-Fi 3), and the network re-distribution process of the desk lamp is finished. And 18b, the mobile phone and the desk lamp are positioned in the same virtual coil, and the mobile phone and the desk lamp are characterized as being positioned in the same wireless local area network. The dashed circle in this example does not characterize the coverage of the network.
Fig. 19 is a schematic diagram illustrating a periodic update of an encryption scheme and a key by a server, which includes the following steps:
step 1901: the server periodically updates the encryption scheme and the corresponding key.
The encryption mode stored by the second electronic device is issued by the server, and the key matched with the encryption mode in the first electronic device is issued by the server. In order to improve the security of the second electronic device broadcasting the encrypted data, the server may periodically update the encryption mode and the corresponding key of each user account. For example, the server may periodically issue a key to the first electronic device, and periodically issue an encryption mode corresponding to the key to the second electronic device.
Alternatively, the update period of different user accounts may be different, for example, the server may update the encryption and key of user account a once every 10 days, and the server may update the encryption and key of user account B once every 20 days. Alternatively, the update period of different user accounts may be the same. For example, the server may update the encryption and key of user account C once every 10 days, and update the encryption and key of user account D once.
Optionally, the server may also update the encryption mode and the corresponding key periodically, so as to further improve the security of the server in issuing the encryption mode and the key.
Step 1902: the server periodically issues an encryption mode corresponding to the secret key.
And the server periodically transmits an encryption mode corresponding to the secret key to the second electronic equipment through the first access point.
Step 1903: the server periodically issues a key to the desk lamp.
The server periodically issues a key to the first electronic device through the first access point.
Step 1904: the first access point transmits an encryption mode corresponding to the secret key to the second electronic equipment.
Step 1905: the first access point issues a key to the desk lamp.
In some embodiments, a plurality of first electronic devices are bound with a user account, a second electronic device obtains device identifiers corresponding to N first electronic devices bound with the user account, and N is an integer greater than 1; and the second electronic equipment responds to the grouping instruction input by the user, and uploads the grouping instruction to the server so that the server divides the equipment identifiers corresponding to the N first electronic equipment into at least 2 groups. The first electronic equipment receives the secret key corresponding to the group to which the first electronic equipment belongs, and the secret key corresponding to the group of the first electronic equipment is determined and issued by the server according to the group to which the first electronic equipment belongs. The method for accessing the network for different packet devices may refer to the steps in fig. 20, including:
Step 2001: the server generates an encryption scheme and a key corresponding to each packet.
The server illustratively stores device information bound to the user account. The user can log in the user account through the mobile phone, and in the process of logging in the user account through the mobile phone, the server can return the identification information of the equipment bound with the user account to the mobile phone. For example, the mobile phone displays 4 first electronic devices bound to the user account a, the mobile phone may upload the grouping operation to the server in response to the grouping operation input by the user, the server divides the 4 first electronic devices into 2 groups in response to the grouping operation, as shown in fig. 20, the server divides the sound a and the desk lamp a into the group a, and divides the sound B and the desk lamp B into the group B.
The server may generate a second network for each packet, e.g., the server may generate an encryption scheme and key for packet a and an encryption scheme and key for packet B. Alternatively, the encryption scheme and key corresponding to the packet a may be the same as the encryption scheme and key corresponding to the packet B, and the encryption scheme and key corresponding to the packet a may be different from the encryption scheme and key corresponding to the packet B.
Step 2002: the server issues a key and encryption scheme matching the packet a to the device of the packet a.
After the server generates the corresponding encryption mode and the key for each packet, the server can issue the key corresponding to the packet to the first electronic device in different packets, and issue the encryption mode of the packet to the second electronic device corresponding to the packet. In this example, as shown in fig. 20, the mobile phone 1 is a second electronic device corresponding to the group a and the group B, and the server may issue a key a to the sound a and the desk lamp a in the group a; and issuing an encryption mode corresponding to the key A to the mobile phone 1 corresponding to the group A. The server can send a secret key B to the sound B and the desk lamp B in the group B; the server also issues an encryption scheme corresponding to the key B to the handset 1 corresponding to the packet B.
Optionally, when the server issues the key and the encryption mode, the server may also carry the corresponding relationship between the key and the packet, and carry the corresponding relationship between the encryption mode and the packet.
Step 2003: the server issues a key and encryption scheme matching the packet B to the device of the packet B.
This step may be described with reference to step 2002, and will not be described in detail herein.
Step 2004: the first access point issues a key and encryption scheme matching the packet a to the device of the packet a.
Step 1205: the first access point issues a key and an encryption mode matched with the packet B to the equipment of the packet B.
In this example, the second electronic device may upload the grouping operation input by the user to the server, where the server groups the plurality of first electronic devices bound with the user account, so that the server may issue, in batch, an encryption manner and a key corresponding to the grouping, without issuing, to the first electronic device and the second electronic device, the encryption manner and the key separately each time, so that devices in the grouping may access the third network in batch, and speed of network reconfiguration of the smart home device is improved.
The term "and/or" is herein merely an association relationship describing an associated object, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone.
The terms first and second and the like in the description and in the claims of embodiments of the application, are used for distinguishing between different objects and not necessarily for describing a particular sequential order of objects. For example, the first target object and the second target object, etc., are used to distinguish between different target objects, and are not used to describe a particular order of target objects.
In embodiments of the application, words such as "exemplary" or "such as" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "e.g." in an embodiment should not be taken as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion.
In the description of the embodiments of the present application, unless otherwise indicated, the meaning of "a plurality" means two or more. For example, the plurality of processing units refers to two or more processing units; the plurality of systems means two or more systems.
It will be appreciated that the electronic device, in order to achieve the above-described functions, includes corresponding hardware and/or software modules that perform the respective functions. The present application can be implemented in hardware or a combination of hardware and computer software, in conjunction with the example algorithm steps described in connection with the embodiments disclosed herein. Whether a function is implemented as hardware or computer software driven hardware depends upon the particular application and design constraints imposed on the solution. Those skilled in the art may implement the described functionality using different approaches for each particular application in conjunction with the embodiments, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The present embodiment also provides a computer storage medium having stored therein computer instructions which, when executed on an electronic device, cause the electronic device to perform the above-described related method steps to implement the method for accessing a network in the above-described embodiments. The storage medium includes: a U-disk, a removable hard disk, a Read Only Memory (ROM), a random access memory (random access memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The present embodiment also provides a computer program product which, when run on a computer, causes the computer to perform the above-mentioned related steps to implement the method of accessing a network in the above-mentioned embodiments.
The electronic device, the computer storage medium, the computer program product, or the chip provided in this embodiment are used to execute the corresponding methods provided above, so that the beneficial effects thereof can be referred to the beneficial effects in the corresponding methods provided above, and will not be described herein.
Any of the various embodiments of the application, as well as any of the same embodiments, may be freely combined. Any combination of the above is within the scope of the application.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present application and the scope of the claims, which are to be protected by the present application.

Claims (18)

1. A method of accessing a network for use in a system comprising a first electronic device and at least one second electronic device, the first electronic device and the second electronic device having access to the first network, the method comprising:
the first electronic equipment acquires network access information of a second network;
if the second electronic equipment detects that the preset condition is met, the second network is created;
if the first electronic equipment detects that the first electronic equipment is disconnected with the first network, the first electronic equipment accesses the second network according to the network access information of the second network;
if the second electronic equipment detects that the first electronic equipment is accessed to the second network, network access information of a third network is sent to the first electronic equipment through the second network;
The first electronic equipment accesses the third network according to the network access information of the third network.
2. The method of claim 1, wherein the first electronic device obtaining network access information for a second network comprises:
and the first electronic equipment receives the network access information of the second network issued by the server, wherein the server is in communication connection with the first network.
3. The method of claim 2, wherein prior to the second electronic device creating the second network, the method further comprises:
and the second electronic equipment receives the network access information of the second network issued by the server, and the network access information of the second network is randomly generated by the server.
4. The method of claim 2, wherein before the first electronic device receives the network access information of the second network issued by the server, the method further comprises:
and the second electronic equipment uploads the network access information of the second network to the server so that the server can send the network access information of the second network to the first electronic equipment.
5. The method of claim 1, wherein the first electronic device obtaining network access information for a second network comprises:
the second electronic device sends the network access information of the second network to the first electronic device through the first network.
6. The method of claim 1, wherein the first electronic device obtaining network access information for a second network comprises:
the second electronic device is directly connected with the first electronic device through a preset connection mode, and the preset connection mode comprises the following steps: bluetooth connection, radio Frequency Identification (RFID) connection and Wireless Local Area Network (WLAN) direct connection;
the second electronic device transmits network access information of the second network to the first electronic device.
7. The method of claim 1, wherein before the first electronic device obtains network access information for the second network, comprising:
the second electronic device obtains device identifiers corresponding to N first electronic devices bound with a user account, wherein N is an integer greater than 1;
the second electronic equipment responds to a grouping instruction input by a user, and uploads the grouping instruction to a server so that the server divides equipment identifiers corresponding to N first electronic equipment into at least 2 groups;
The first electronic device obtaining network access information of a second network, including:
the first electronic equipment receives network access information of a second network corresponding to the packet to which the first electronic equipment belongs, and the network access information of the second network is determined and issued by the server according to the packet to which the first electronic equipment belongs.
8. The method according to any one of claims 2, 4-7, wherein the method further comprises:
the second electronic equipment receives network information of the second network input by a user; or the second electronic equipment randomly generates the network information of the second network according to a preset period.
9. The method according to any one of claims 1-7, wherein the preset conditions comprise: a disconnection from the first network is detected, or a creation instruction input by a user is received, the creation instruction being used to instruct creation of the second network.
10. The method of claim 1, wherein the second network is a hotspot network.
11. The method of claim 1, wherein the first electronic device accessing the third network according to network access information of the third network, comprising:
The first electronic device disconnects from the second network;
and the first electronic equipment searches the third network according to the network access information of the network of the third network and accesses the third network.
12. A method of accessing a network for use in a system comprising a first electronic device and at least one second electronic device, the first electronic device and the second electronic device having access to the first network, the method comprising:
the first electronic equipment acquires decryption information for decryption according to the first network;
if the second electronic device detects that the preset condition is met, encrypting the network access information of the third network to generate encrypted data:
the second electronic device broadcasting the encrypted data;
the first electronic equipment receives the encrypted data and acquires network access information of the third network from the encrypted data according to the decryption information;
the first electronic equipment accesses the third network according to the network access information of the third network.
13. The method of claim 12, wherein the first electronic device obtaining decryption information for decryption from the first network comprises:
The first electronic equipment receives the decryption information issued by a server, and the server is in communication connection with the first network.
14. The method of claim 12, wherein the first electronic device obtaining decryption information for decryption from the first network comprises:
and the second electronic equipment uploads the decryption information to a server so that the server can send the decryption information to the first electronic equipment.
15. The method of claim 13, wherein the encrypting the network access information of the third network, prior to generating the encrypted data, further comprises:
and the second electronic equipment receives the encryption mode issued by the server, wherein the encryption mode and decryption information matched with the encryption mode are generated by the server.
16. The method of claim 12, wherein the first electronic device, prior to obtaining decryption information for decryption from the first network, further comprises:
the second electronic device obtains device identifiers corresponding to N first electronic devices bound with a user account, wherein N is an integer greater than 1;
The second electronic equipment responds to a grouping instruction input by a user, and uploads the grouping instruction to a server so that the server divides equipment identifiers corresponding to N first electronic equipment into at least 2 groups;
the first electronic device obtains decryption information for decryption according to the first network, including:
the first electronic equipment receives decryption information corresponding to the group to which the first electronic equipment belongs, and the server determines and issues the decryption information corresponding to the group to which the first electronic equipment belongs according to the group to which the first electronic equipment belongs.
17. An electronic device, comprising:
a memory and a processor, the memory coupled with the processor;
the memory stores program instructions that, when executed by the processor, cause the electronic device to perform the method of accessing a network performed by the first electronic device or the second electronic device of claims 1 to 11 or the method of accessing a network performed by the first electronic device or the second electronic device of claims 12 to 16.
18. A computer readable storage medium comprising a computer program, characterized in that the computer program, when run on an electronic device, causes the electronic device to perform the method of accessing a network performed by the first electronic device or the second electronic device according to any one of claims 1-11, or the method of accessing a network performed by the first electronic device or the second electronic device according to any one of claims 12-16.
CN202211103509.XA 2022-09-09 2022-09-09 Network access method, electronic equipment and storage medium Pending CN116684942A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211103509.XA CN116684942A (en) 2022-09-09 2022-09-09 Network access method, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211103509.XA CN116684942A (en) 2022-09-09 2022-09-09 Network access method, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116684942A true CN116684942A (en) 2023-09-01

Family

ID=87789629

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211103509.XA Pending CN116684942A (en) 2022-09-09 2022-09-09 Network access method, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116684942A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013006315A1 (en) * 2011-07-05 2013-01-10 Apple Inc. Configuration of accessories for wireless network access
WO2014143761A2 (en) * 2013-03-15 2014-09-18 Master Lock Company Systems and methods for configuration of wireless camera
CN107613471A (en) * 2016-07-12 2018-01-19 中兴通讯股份有限公司 A kind of WIFI hot spot information-pushing method, method of reseptance and device
CN111132373A (en) * 2019-12-05 2020-05-08 北京小米移动软件有限公司 Network connection method, device and equipment
CN112073243A (en) * 2020-09-08 2020-12-11 芜湖美的厨卫电器制造有限公司 Intelligent household appliance configuration method, terminal, intelligent household appliance, server and storage medium
CN112291787A (en) * 2019-07-24 2021-01-29 杭州萤石软件有限公司 Network connection method, device and system
CN112333062A (en) * 2020-11-03 2021-02-05 深圳Tcl新技术有限公司 Control method and control device for household equipment and computer readable storage medium
CN113301563A (en) * 2020-02-05 2021-08-24 阿里巴巴集团控股有限公司 Network configuration method, device, equipment and storage medium
WO2021164312A1 (en) * 2020-02-18 2021-08-26 华为技术有限公司 Wireless network information configuration method and apparatus for device
CN113423105A (en) * 2021-06-10 2021-09-21 杭州华橙软件技术有限公司 Network connection method and device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013006315A1 (en) * 2011-07-05 2013-01-10 Apple Inc. Configuration of accessories for wireless network access
WO2014143761A2 (en) * 2013-03-15 2014-09-18 Master Lock Company Systems and methods for configuration of wireless camera
CN107613471A (en) * 2016-07-12 2018-01-19 中兴通讯股份有限公司 A kind of WIFI hot spot information-pushing method, method of reseptance and device
CN112291787A (en) * 2019-07-24 2021-01-29 杭州萤石软件有限公司 Network connection method, device and system
CN111132373A (en) * 2019-12-05 2020-05-08 北京小米移动软件有限公司 Network connection method, device and equipment
CN113301563A (en) * 2020-02-05 2021-08-24 阿里巴巴集团控股有限公司 Network configuration method, device, equipment and storage medium
WO2021164312A1 (en) * 2020-02-18 2021-08-26 华为技术有限公司 Wireless network information configuration method and apparatus for device
CN112073243A (en) * 2020-09-08 2020-12-11 芜湖美的厨卫电器制造有限公司 Intelligent household appliance configuration method, terminal, intelligent household appliance, server and storage medium
CN112333062A (en) * 2020-11-03 2021-02-05 深圳Tcl新技术有限公司 Control method and control device for household equipment and computer readable storage medium
CN113423105A (en) * 2021-06-10 2021-09-21 杭州华橙软件技术有限公司 Network connection method and device

Similar Documents

Publication Publication Date Title
US20220303276A1 (en) Network connection method, hotspot terminal and management terminal
EP3151628B1 (en) Method, device and system for accessing a wireless network
US20220201453A1 (en) Service connection establishment method, bluetooth master device, chip, and bluetooth system
US10887745B2 (en) Method and device for sharing file between different terminals
CN105188013A (en) Network hotspot sharing method, device and system
CN104967596A (en) Method and apparatus for realizing binding and communication between user terminal and Internet of things device
EP3007515B1 (en) Method, terminal, client and system for accessing wireless network
CN106789470B (en) Terminal resource sharing method, device and system
CN113316131B (en) Connection establishment method, device, electronic equipment and storage medium
US11452156B2 (en) Configuration system, client device, embedded device configuration method, and storage medium
CN111918256A (en) Intelligent device network distribution method and device based on Bluetooth and storage medium
CN113099440A (en) Network configuration method, device, equipment and system
CN113490207B (en) Internet of things equipment binding method and device, computer equipment and storage medium
US10652729B1 (en) Subscriber identity privacy
CN112422518B (en) Network access method, device and storage medium
CN111970676B (en) WiFi hot spot access method, device, equipment and storage medium
EP2854027B1 (en) Method for downloading application program, user equipment and application server
CN113225761A (en) Method for selecting network slice and electronic equipment
CN111787514B (en) Method and device for acquiring equipment control data, storage medium and electronic device
CN114338132B (en) Secret-free login method, client application, operator server and electronic equipment
EP4261665A1 (en) Application program login method and system
CN116684942A (en) Network access method, electronic equipment and storage medium
US20150163733A1 (en) Method for information processing and electronic apparatus thereof
CN105163399B (en) Data sharing method and device
CN114143129B (en) Gateway batch networking method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination