CN117793678A - Network connection method, electronic equipment and system - Google Patents

Network connection method, electronic equipment and system Download PDF

Info

Publication number
CN117793678A
CN117793678A CN202211194288.1A CN202211194288A CN117793678A CN 117793678 A CN117793678 A CN 117793678A CN 202211194288 A CN202211194288 A CN 202211194288A CN 117793678 A CN117793678 A CN 117793678A
Authority
CN
China
Prior art keywords
connection
electronic device
networking information
router
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211194288.1A
Other languages
Chinese (zh)
Inventor
胡诗尧
余勇超
张华翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202211194288.1A priority Critical patent/CN117793678A/en
Priority to PCT/CN2023/120278 priority patent/WO2024067334A1/en
Publication of CN117793678A publication Critical patent/CN117793678A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/73Access point logical identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a network connection method, electronic equipment and a system, relates to the technical field of terminals, and can improve networking efficiency of equipment. Applied to a first electronic device or a component supporting a function of the first electronic device (such as a chip system), the method comprises: acquiring networking information of the first connection; and sending the networking information of the first connection to a third electronic device, so that the third electronic device interacts with the second electronic device through the first connection using the networking information of the first connection. Wherein the first connection is a communication connection established between the first electronic device and a second electronic device.

Description

Network connection method, electronic equipment and system
Technical Field
The present disclosure relates to the field of terminals, and in particular, to a network connection method, an electronic device, and a system.
Background
Currently, the types and numbers of smart devices available to users are increasing. In the process of using the intelligent device, a user needs to carry out network distribution on the intelligent device. Taking a wireless fidelity (wireless fidelity, wi-Fi) network configured by the mobile phone for the loudspeaker box as an example, the mobile phone establishes a bluetooth connection with the loudspeaker box, and sends a Wi-Fi service set identifier (service set identifier, SSID) and a Wi-Fi password to the loudspeaker box through the bluetooth connection. And the sound box establishes connection with the Wi-Fi access point according to the SSID and the password of the Wi-Fi. In general, the process of establishing connection of the sound box includes various steps such as channel scanning, four-step handshake authentication, etc., and the networking process is long in time consumption and poor in user experience.
Disclosure of Invention
The application provides a network connection method, electronic equipment and a system, which are used for improving networking efficiency.
In order to achieve the above purpose, the present application adopts the following technical scheme:
in a first aspect, a network connection method is provided in the present application, and the network connection method is applied to a first electronic device or a component (such as a chip system) supporting a function of the first electronic device, and includes:
acquiring networking information of the first connection; and sending the networking information of the first connection to the third electronic device, such that the third electronic device interacts with the second electronic device over the first connection using the networking information of the first connection. Wherein the first connection is a communication connection established by the first electronic device with the second electronic device.
By way of example, taking a third electronic device as a sound box, a first electronic device as a mobile phone, and a second electronic device as a router, the mobile phone establishes a first connection with the router in advance. When the loudspeaker box needs networking, the mobile phone can acquire networking information of the first connection and send the networking information of the first connection to the loudspeaker box, so that the loudspeaker box can use the networking information of the first connection to interact with the router through the first connection.
Compared with the prior art that the third electronic device (sound box) needs to automatically scan a channel and execute a four-step handshake (comprising negotiating a secret key with a router), so that the networking efficiency of the sound box is lower, the technical scheme of the application can shorten the networking time of the third electronic device and improve the networking efficiency of the third electronic device because the first electronic device can pre-establish the first connection and send the networking information of the first connection to the third electronic device, so that the third electronic device can directly use the networking information of the first connection for networking without automatically scanning the channel.
In one possible design, the method further comprises, prior to obtaining networking information for the first connection:
acquiring one or more pieces of identification information;
establishing one or more communication connections with the second electronic device according to the one or more identification information; the one or more communication connections include a first connection.
Meaning that a first electronic device may pre-establish one or more communication connections with a second electronic device and may determine available communication connections from the one or more communication connections, and forward networking information streams of the available communication connections (e.g., the first connection) to other devices. Therefore, other devices can use networking information of available communication connection to directly interact with the second electronic device, and the processes of channel scanning, handshake authentication and the like do not need to be executed by themselves, so that the networking efficiency of the other devices can be improved.
In some scenarios, networking information of the first electronic device may also be used by the first electronic device itself.
In one possible design, the first electronic device may also obtain networking information for an established available communication connection between the other device and the second electronic device from the other device, and send the networking information for the available communication connection to the third electronic device for use. The first electronic device may be a mobile phone, a central control device, or other devices. Taking the example that the first electronic device is the mobile phone 1, the mobile phone 2 in the whole house already establishes the connection 1 and the connection 2 with the router, and networking information of the connection 1 is not used currently. When the mobile phone 1 detects the networking request of the sound box, the networking information of the connection 1 established by the mobile phone 2 can be sent to the sound box. The speakers may interact with the router through connection 1 using networking information for connection 1.
In one possible design, after sending the networking information of the first connection to the third electronic device, the method further comprises:
the first connection between the second electronic device is disabled.
In this way, only one device (the third electronic device) can interact with the second electronic device at the same time using the networking information of the first connection, and collisions between devices can be avoided.
The first electronic device failing the first connection may be the first electronic device saving information of the first connection, but ceasing to use the first connection to interact with the second electronic device. Thus, when the first connection needs to be reused later, the first electronic device can interact with the second electronic device directly through the first connection according to the stored networking information of the first connection.
Alternatively, the first electronic device failing the first connection may be implemented as: disconnecting the first connection or freezing the first connection. Alternatively, the first electronic device may delete the information of the first connection.
In one possible design, the networking information of the first connection is networking information that is not sent for use by other devices.
Alternatively, the networking information of the first connection is networking information that was sent for use by the other device and is not currently used by the other device. Therefore, the first electronic equipment can distribute the idle networking information to other equipment for use, and the utilization rate of the networking information is improved.
In one possible design, after sending the networking information of the first connection to the third electronic device, the method further includes:
A first message is received from the third electronic device, the first message indicating that the third electronic device has established a second connection, the second connection being a communication connection between the third electronic device and the second electronic device.
Illustratively, as in fig. 11, after the speaker receives the networking information of the first connection from the handset, the first connection may be used to interact with the router. And, the sound box may establish a connection 4 with the router using its own device address (one example of identification information), and send a first message to the handset, the first message indicating that the connection 4 has been established (one example of a second connection). A mobile phone (one example of a first electronic device) receives a first message from a speaker (a third electronic device).
In the scheme, the sound box firstly uses networking information of the first connection distributed by the mobile phone, and directly interacts with the router through the first connection, so that the time for accessing the sound box to the network is shortened. After that, after network access, the loudspeaker box can additionally establish a connection 4. Because the loudspeaker box is connected with the network when the loudspeaker box establishes the connection 4, the connection 4 is established without affecting the existing first connection of the loudspeaker box, which means that the surfing experience of the user is not affected.
In one possible design, the first connection between the third electronic device and the second electronic device is reserved after the second connection is established, or the first connection between the third electronic device and the second electronic device is disabled.
Illustratively, as shown in fig. 14, after the connection 6 (an example of the second connection) is established between the speaker and the router, the first connection between the speaker and the router is reserved, and the speaker can interact with the router through the first connection (connection 1) and the connection 6, so that the transmission efficiency can be improved. Alternatively, after connection 6 (one example of a second connection) is established between the speaker and the router, the first connection between the speaker and the router is disabled and the speaker may interact with the router through connection 6
In one possible design, after the first connection between the third electronic device and the second electronic device is failed, the method further comprises:
a second message is received from the third electronic device, the second message indicating that the first connection between the third electronic device and the second electronic device has failed. In this way, the first electronic device can learn that the first connection between the third electronic device and the second electronic device has failed, so that the first electronic device can distribute networking information of the first connection to other devices that need to be networked.
In one possible design, the method further includes, prior to receiving the second message from the third electronic device:
and sending a third message to the third electronic device, the third message indicating that the first connection is to be disabled.
That is, in some scenarios, the first electronic device may instruct the third electronic device to fail the first connection.
In one possible design, the method further comprises:
displaying a first interface, wherein the first interface comprises a first control;
and detecting the operation of the user on the first control, and starting the function of network connection.
Illustratively, as in fig. 18, the handset displays an interface 180 (one example of a first interface), the interface 180 including a control 1801 (one example of a first control). The operation of the control 1801 by the user is detected, and the mobile phone opens the network connection function of the application.
In one possible design, in a wireless fidelity Wi-Fi network, the networking information of the first connection includes any one or more of the following: the method comprises the steps of first identification information, a secret key used for transmitting a message through a first connection, an address of a second electronic device (router), a working frequency band corresponding to the first connection and a working channel corresponding to the first connection;
in a data network, networking information includes any one or more of the following: a key, a user identifier and first identifier information;
in a bluetooth scenario, networking information includes, but is not limited to: first identification information, a key.
Optionally, the identification information includes, but is not limited to, a device address.
For example, as in fig. 6 (b), assuming that the information of the first connection received by the speaker from the handset includes (WLAN MAC2, IP2, ptk2, gtk2, 2.4 GHz), the speaker may send a message to the router of WLAN mac_router, ip_router directly using WLAN MAC2, IP2 instead of the handset. Wherein, the receiving and dispatching frequency band of the sound box is 2.4GHz. For unicast messages, the loudspeaker can encrypt the messages through ptk2 and send the encrypted messages to the router. For multicast or broadcast messages, the loudspeaker can encrypt the message through gtk2 and send the encrypted message to the router. For the router, it does not perceive that the opposite device of connection 2 is switched from the handset to the loudspeaker.
In a second aspect, the present application provides a network connection method applied to a third electronic device or related component (such as a chip system), the method including:
receiving networking information of the first connection; the first connection is a communication connection between the first electronic device and the second electronic device, which is established by the first electronic device;
interaction is performed with the second electronic device over the first connection using networking information of the first connection.
In one possible design, after receiving the networking information of the first connection, the method further comprises:
Networking information for the first connection is stored.
In the technical scheme, the equipment using the networking information can store the networking information for a period of time so as to shorten the time for subsequent networking. The device that uses the networking information may be a device that originally generated the networking information (such as a master device) or may be a slave device that is assigned and uses the networking information. Therefore, for the communication connection which is established successfully in history, the master device or the slave device can multiplex networking information of the communication connection and directly interact with the router, so that the networking efficiency of the device can be improved.
In one possible design, after storing the networking information of the first connection, the method further comprises:
disabling a first connection with a second electronic device;
when the network range of the second electronic device is re-entered, the first connection is used to interact with the second electronic device via the first connection using networking information of the first connection.
After the third electronic device stores the networking information of the first connection, in some scenarios, if the third electronic device (such as a sound box) enters the network coverage of the second electronic device (such as a router) again, the networking information of the first connection can be directly used to interact with the router, so that a connection establishment process is not required to be re-executed, and the time for the sound box to re-access the router network is shortened.
In one possible design, after the failure of the first connection with the second electronic device, the method further comprises:
and sending a second message to the first electronic device, wherein the second message is used for indicating that the first connection between the third electronic device and the second electronic device is invalid.
In one possible design, after receiving the networking information of the first connection, the method further comprises:
establishing a second connection with the second electronic equipment by using the identification information of the second electronic equipment;
interact with a second electronic device through a second connection.
Illustratively, as in S401 of fig. 10, the speaker may use its own identification information (such as a device address), establish a connection 4 (an example of a second connection) with the router, and interact with the router through the connection 4.
In one possible design, after establishing the second connection with the second electronic device, the method further comprises:
a first message is sent to the first electronic device, the first message being used to indicate that a second connection with the second electronic device has been established.
In one possible design, after establishing the second connection with the second electronic device, the method further comprises:
the first connection between the second electronic device is disabled.
In one possible design, a first connection between a failure and a second electronic device includes:
disabling the first connection when the first condition is satisfied;
the first condition includes any one or more of the following: the first period of time is reached after the second connection with the second electronic device is established, and the high bandwidth communication connection is not required for the current service.
In one possible design, prior to disabling the first connection with the second electronic device, the method further comprises:
a third message is received from the first electronic device, the third message indicating that the first connection is to be disabled.
In one possible design, the method further comprises:
receiving networking information of the third connection from the fourth electronic device;
interaction with the second electronic device is performed over the third connection using the networking information of the third connection.
For example, as shown in fig. 12, after the third electronic device (speaker) is disconnected from handset a, networking information for the third connection (connection 6) may be received from the fourth electronic device (handset B) and interacted with the router through connection 6.
Alternatively, the first connection may be disabled or reserved after the speaker receives networking information for connection 6.
In one possible design, after receiving networking information for the third connection from the fourth electronic device, the method further comprises:
The first connection is disabled.
In one possible design, the method further comprises:
under the condition that the communication parameters of the second electronic equipment are changed, scanning to obtain networking information of fourth connection; the fourth connected networking information is matched with the communication parameters of the second electronic equipment;
interact with the second electronic device through a fourth connection.
In the method, when the communication parameters of the second electronic equipment (such as a router) change, the third electronic equipment (such as a sound box) can scan to obtain new networking information, and the third electronic equipment can surf the internet through the new networking information, so that the normal surfing function of the third electronic equipment can be ensured.
In one possible design, the method further comprises:
receiving networking information of a fourth connection from the fourth electronic device under the condition that the communication parameters of the second electronic device are changed, wherein the networking information of the fourth connection is matched with the communication parameters of the second electronic device;
interact with the second electronic device through a fourth connection.
In the method, when the communication parameters of the router are changed, the sound box can acquire and directly use the new networking information to surf the internet from the central control equipment, the connection establishment flow is not required to be re-executed, the steps of channel scanning, four-step handshake and the like can be omitted, and the efficiency of re-networking of the sound box is improved.
In one possible design, the method further comprises:
displaying a second interface, wherein the second interface comprises a second control;
and detecting the operation of the user on the second control, and starting the function of network connection.
Illustratively, as in FIG. 17, the watch displays an interface 170 (one example of a second interface), the interface 170 including a control 1701 (one example of a second control). And when the operation of the control 1701 by the user is detected, the watch starts the network connection function of the watch, and networking of the watch is rapidly realized.
In one possible design, the second interface further includes a third control;
receiving operation of a user on a second control;
and when the first electronic device breaks the communication connection with the second electronic device, breaking the communication connection with the second electronic device.
Illustratively, as also in FIG. 17, the interface 170 also includes a control 1702 (one example of a third control). If the user operates control 1702 (e.g., opens a switch), then subsequently when the first electronic device (e.g., a cell phone) is disconnected, the watch is also disconnected from the cell phone.
In a third aspect, the present application provides a network connection device, applied to a first electronic device or a chip system, where the device includes:
the processing module is used for acquiring networking information of the first connection; the first connection is a communication connection between the first electronic device and the second electronic device, which is established by the first electronic device;
And the communication module is used for sending the networking information of the first connection to the third electronic equipment so that the third electronic equipment can interact with the second electronic equipment through the first connection by using the networking information of the first connection.
In one possible design, the processing module is further configured to:
acquiring one or more identification information prior to acquiring networking information of the first connection;
establishing one or more communication connections with the second electronic device according to the one or more identification information; the one or more communication connections include a first connection.
In one possible design, the processing module is further configured to disable the first connection with the second electronic device after sending networking information of the first connection to the third electronic device.
In one possible design, the networking information of the first connection is networking information that was sent to the other device for use and is not currently used by the other device, or the networking information of the first connection is networking information that was not sent to the other device for use.
In one possible design, the communication module is further configured to receive a first message from the third electronic device after sending networking information of the first connection to the third electronic device, the first message being used to indicate that the third electronic device has established a second connection, the second connection being a communication connection between the third electronic device and the second electronic device.
In one possible design, the first connection between the third electronic device and the second electronic device is reserved after the second connection is established, or the first connection between the third electronic device and the second electronic device is disabled.
In one possible design, the communication module is further configured to receive a second message from the third electronic device after the first connection between the third electronic device and the second electronic device is failed, the second message being configured to indicate that the first connection between the third electronic device and the second electronic device has failed.
In one possible design, the communication module is further configured to send a third message to the third electronic device before receiving the second message from the third electronic device, the third message being configured to indicate that the first connection is to be disabled.
The device also comprises a display module, wherein the display module is used for displaying a first interface, and the first interface comprises a first control;
the processing module is also used for detecting the operation of the user on the first control and starting the function of network connection.
In one possible design, in a wireless fidelity Wi-Fi network, the networking information of the first connection includes any one or more of the following: the method comprises the steps of first identification information, a secret key used for transmitting a message through a first connection, an address of a second electronic device, a working frequency band corresponding to the first connection and a working channel corresponding to the first connection;
In a data network, networking information includes any one or more of the following: a key, a user identifier and first identifier information;
in a bluetooth scenario, networking information includes, but is not limited to: first identification information, a key.
In a fourth aspect, the present application provides a network connection device, applied to a third electronic device or a chip system, where the device includes:
a communication module for:
receiving networking information of the first connection; the first connection is a communication connection between the first electronic device and the second electronic device, which is established by the first electronic device;
interaction is performed with the second electronic device over the first connection using networking information of the first connection.
In one possible design, the apparatus further includes a storage module to store networking information of the first connection after receiving the networking information of the first connection.
In one possible design, the processing module is to disable the first connection with the second electronic device after storing networking information of the first connection;
the communication module is further configured to interact with the second electronic device through the first connection using networking information of the first connection when reentering the network range of the second electronic device.
In one possible design, the communication module is further configured to send a second message to the first electronic device after the failure of the first connection with the second electronic device, the second message being configured to indicate that the first connection between the third electronic device and the second electronic device has failed.
In one possible design, the processing module is configured to establish a second connection with the second electronic device using the own identification information after receiving the networking information of the first connection;
the communication module is also used for interacting with second electronic equipment through second connection;
in one possible design, the communication module is further configured to send a first message to the first electronic device after the second connection with the second electronic device is established, the first message being used to indicate that the second connection with the second electronic device has been established.
In one possible design, the processing module is further configured to disable the first connection with the second electronic device after establishing the second connection with the second electronic device.
In one possible design, a first connection between a failure and a second electronic device includes:
disabling the first connection when the first condition is satisfied;
The first condition includes any one or more of the following: the first period of time is reached after the second connection with the second electronic device is established, and the high bandwidth communication connection is not required for the current service.
In one possible design, the communication module is further configured to receive a third message from the first electronic device before failing the first connection with the second electronic device, the third message being configured to indicate that the first connection is to be failed.
In one possible design, the communication module is further configured to:
receiving networking information of the third connection from the fourth electronic device;
interaction with the second electronic device is performed over the third connection using the networking information of the third connection.
In one possible design, the processing module is further configured to disable the first connection after receiving networking information for the third connection from the fourth electronic device.
In one possible design, the processing module is further configured to scan for networking information of the fourth connection in a case where a communication parameter of the second electronic device changes; the fourth connected networking information is matched with the communication parameters of the second electronic equipment;
and the communication module is also used for interacting with the second electronic equipment through the fourth connection.
In one possible design, the communication module is further configured to:
receiving networking information of a fourth connection from the fourth electronic device under the condition that the communication parameters of the second electronic device are changed, wherein the networking information of the fourth connection is matched with the communication parameters of the second electronic device;
interact with the second electronic device through a fourth connection.
In one possible design, the apparatus further includes a display module for displaying a second interface, the second interface including a second control;
and the processing module is used for detecting the operation of the user on the second control and starting the function of network connection.
In a fifth aspect, the present application provides an electronic device, including: an input device, a display screen, one or more processors, memory, and one or more computer programs; wherein the processor is coupled to the input device, the processor, and the memory, the one or more computer programs are stored in the memory, and when the electronic device is running, the processor executes the one or more computer programs stored in the memory to cause the electronic device to perform the method of any of the designs described above.
In a sixth aspect, the present application provides a terminal comprising a processor and a memory for storing computer program code, the computer program code comprising computer instructions which, when executed by the processor, perform the method as in any of the possible designs of any of the above aspects of the present application.
In a seventh aspect, the present application provides a computer readable storage medium comprising computer instructions which, when run on an electronic device, cause the electronic device to perform the method of any one of the possible designs described above.
In an eighth aspect, the present application provides a computer program product for, when run on an electronic device, causing the electronic device to perform the method of any one of the possible designs described above.
In a ninth aspect, a network connection system is provided, where the system includes a first electronic device and a third electronic device in any of the possible designs of the foregoing aspect.
Drawings
FIG. 1A is a diagram of a network connection method provided in the related art;
FIG. 1B is an interface diagram of a network connection method according to the related art;
FIG. 2 is a schematic diagram of a system architecture according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 4 is a flow chart of a network connection method according to an embodiment of the present application;
fig. 5 and fig. 6 are schematic views of a scenario provided in an embodiment of the present application;
fig. 7 to fig. 12 are schematic flow diagrams of a network connection method according to an embodiment of the present application;
Fig. 13 to 16 are schematic views of a scenario provided in an embodiment of the present application;
fig. 17 and fig. 18 are schematic views of interfaces provided in embodiments of the present application;
fig. 19 is a flow chart of a network connection method according to an embodiment of the present application;
FIG. 20 is a schematic diagram of an interface provided in an embodiment of the present application;
fig. 21 is a schematic structural diagram of a network connection device according to an embodiment of the present application;
fig. 22 is a schematic structural diagram of a chip system according to an embodiment of the present application.
Detailed Description
The terms "first" and "second" and the like in the description and in the drawings of the present application are used for distinguishing between different objects or for distinguishing between different processes of the same object. The words "first," "second," and the like may distinguish between identical or similar items that have substantially the same function and effect. For example, the first device and the second device are merely for distinguishing between different devices, and are not limited in their order of precedence. It will be appreciated by those of skill in the art that the words "first," "second," and the like do not limit the amount and order of execution, and that the words "first," "second," and the like do not necessarily differ.
"at least one" means one or more, and "a plurality" means two or more.
"and/or", describes an association relationship of an association object, and indicates that there may be three relationships, for example, a and/or B, and may indicate: a alone, a and B together, and B alone, wherein a, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship. "at least one of" or the like means any combination of these items, including any combination of single item(s) or plural items(s). For example, at least one (one) of a, b, or c may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or plural.
Furthermore, references to the terms "comprising" and "having" and any variations thereof in the description of the present application are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed but may optionally include other steps or elements not listed or inherent to such process, method, article, or apparatus.
It should be noted that, in the embodiments of the present application, words such as "exemplary" or "such as" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "for example" should not be construed as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion.
First, technical terms related to embodiments of the present application will be described:
1. handshake authentication
In some network protocols, in order to ensure reliability and security of a communication connection, a station (station) and an Access Point (AP) may perform authentication through a multiple handshake manner, and establish a connection. In this way, the station and the access point can determine that the other party is a trusted device. Illustratively, in Wi-Fi protocol, using a speaker as a site and a router as an access point, as in step 5 of fig. 1A, the speaker and the router may be authenticated, for example, by a four-way handshake connection, and a connection is established.
As in fig. 1A, during the first handshake, the router broadcasts its SSID and media access control (media access control, MAC) address. The router may also generate a random code Anonce.
The loudspeaker may obtain the SSID, the MAC address, and the random code of the router from the router, and generate a random code (Snonce) and a pairwise transfer key (pairwise transit key, PTK) of the router based on the SSID, the MAC address of the router, the random code of the router, and the MAC address of the router. The loudspeaker may also generate message integrity check (message integrity check, MIC) information based on the PTK.
In some examples, the PTK may be used to encrypt unicast packets between a router and a voice box, the PTK used by the router to communicate with different voice boxes.
In the second handshake process, the sound box sends the random code SNonce and MIC information of the sound box to the router.
After receiving the MIC of the sound box, the router can compare the MIC of the sound box with the MIC generated by the router to perform integrity check. If the verification fails, the handshake fails. If the verification is successful, which means that the random code SNonce of the loudspeaker is not tampered, the router can generate a PTK and a temporary group key (group temporal key, GTK) according to the SNonce and generate a MIC according to the PTK. Wherein the GTK may be used to encrypt multicast/broadcast packets between the router and the voice box. In some examples, all speakers connected to the router share a GTK.
In the third handshake process, the router may encrypt the GTK using the PTK and send the MIC and the encrypted GTK to the speaker.
After the sound box receives the MIC and the encrypted GTK from the router, the sound box decrypts the GTK by using the PTK generated by the sound box, and can verify the MIC at the same time, if the decryption is successful and the MIC verification is successful, the sound box can send an Acknowledgement (ACK) message to the router for confirmation in the fourth handshake process. Thus, authentication is completed between the sound box and the router, and connection is established. After the connection is established, the speakers may interact with the router through the connection using networking information for the connection. For example, the speaker may encrypt unicast messages using the PTK, multicast/broadcast messages using the GTK, etc.
2. Channel scanning
Typically, an access point supports operation on one or more frequency bands. For example, wi-Fi is divided into two frequency bands, 5G and 2.4G, each frequency band dividing a number of channels, and an access point may operate on a certain channel. If a station wants to access the access point, it first switches to the same channel as the access point. To switch to the channel where the access point is located, the station first knows on which channel the access point is operating, so the station will monitor the broadcast data packet of the access point on each channel in turn, and if the data packet of the access point is received on channel X, it is indicated that the access point is operating on channel X. This process is called channel scanning.
In order to successfully establish a connection with the router, for example, using the speaker as a site and using the router as an access point, as shown in step 4 of fig. 1A, the speaker may perform channel scanning, scan surrounding wireless signals, and obtain, from the scanning result, channel frequency bands and signal strengths of other wireless signals in the surrounding environment, thereby establishing a connection with the router on the corresponding frequency bands.
Fig. 1A shows a process of configuring a Wi-Fi network for a speaker box by a mobile phone. In the process, the mobile phone and the router are firstly connected in a communication way. Then, the mobile phone establishes a Bluetooth connection with the sound box, and the mobile phone can send the SSID of Wi-Fi and Wi-Fi password of the router to the sound box through the Bluetooth connection. In this way, the sound box can establish connection with the router according to the SSID and the password of Wi-Fi.
Fig. 1B shows a related interface of a speaker distribution network in the related art. As in (a) of fig. 1B, after detecting that the handset is close to the speaker, the handset may pop up the pop-up window 101, where the pop-up window 101 includes a "connect" button. After detecting that the user clicks the connect button, the mobile phone can send the SSID and Wi-Fi password of Wi-Fi of the router to the sound box. After the loudspeaker box receives information such as SSID of Wi-Fi, four-step handshake authentication, channel scanning and the like can be performed according to the information such as SSID of Wi-Fi. In this process, the mobile phone may display the networking progress of the sound box in the pop-up window 101 as shown in fig. 1B (B). After the sound box is connected successfully, the mobile phone can prompt that the sound box is connected successfully in the popup window 101 shown in (c) of fig. 1B.
It can be seen that the process of establishing connection between the sound box and the router includes various steps such as channel scanning, four-step handshake authentication, etc., and the networking process generally takes about 3-5 s, and the networking time is long. Moreover, the above steps have a probability of failure, for example, if one of the four-way handshake authentication fails, the networking may fail, the mobile phone may be blocked at the interface shown in fig. 1B, and the networking experience of the user is poor.
In order to solve the above technical problems, an embodiment of the present application provides a network connection method. The network connection method of the embodiment of the application can be applied to a wireless network system, and the wireless network system can be any type of wireless network system. For example, the wireless network may be a Wi-Fi network, or a data network, or bluetooth. The embodiment of the application does not limit the type of the wireless network system, the specific networking mode and the like.
Taking a wireless network system as an example of a Wi-Fi network system, fig. 2 shows an exemplary architecture of a Wi-Fi network system to which the embodiments of the present application are applicable. As in fig. 2, the system includes an access point 300, a master device 100, and a slave device 200.
The master device 100 may also be referred to as a first electronic device 100. The master device 100 may establish a connection with the access point 300 and may access the network 400 through the access point 300 to obtain services provided by the network 400.
In the embodiment of the present application, the master device 100 may connect with the access point 300 through multiple connections, and may maintain multiple connections with the access point 300. Subsequently, after detecting the request for the network allocation from the slave device 200, the master device 100 may select one connection from the plurality of connections, obtain networking information (such as a key and a working channel) corresponding to the connection, and send the networking information corresponding to the connection to the slave device 200. So that the slave device 200 interacts data messages and control messages with the access point 300 through the connection according to the networking information corresponding to the connection.
The slave device 200 may also be referred to as a third electronic device 200. Slave device 200 may receive networking information (e.g., keys PTK, GTK, working channel, etc.) corresponding to a certain connection from master device 100. Since the slave device 200 can directly receive the key required for communication and the networking information such as the channel band of the access point 300 from the master device 100, the slave device 200 does not need to re-perform the steps of channel scanning, four-step handshake authentication, connection establishment, and the like to obtain the networking information, and can directly interact with the access point 300 with data messages and control messages according to the networking information obtained from the master device 100. In this way, the networking time of the slave device can be shortened, and the networking efficiency of the slave device can be improved. For example, assume that networking information received from device 200 is: { PTK: ptk1; GTK1; working frequency band: 5GHz; working channel: channel X }, the slave device 200 may interact with the access point 300 directly over the 5GHz band with the unicast message encrypted with ptk 1. The slave device 200 may also directly interact with the access point in the 5GHz band to encrypt the multicast message with the gtk 1.
The access point 300 may also be referred to as a second electronic device 300. The access point 300 may be a device that provides wireless internet access. In Wi-Fi networks, access points 300 include, but are not limited to: wireless routers, customer premise equipment (customer premise equipment, CPE), etc.
For example, the host device 100 in the present application may be a mobile phone, a central control device of a whole house, a tablet computer, a personal computer (personal computer, PC), a personal digital assistant (personal digital assistant, PDA), a smart watch, a netbook, a wearable electronic device, an augmented reality (augmented reality, AR) device, a Virtual Reality (VR) device, a vehicle-mounted device, a smart car, a robot, or the like, and the specific form of the host device is not particularly limited in the present application.
For example, the slave device 200 in the present application may be an intelligent sound box, a body fat scale, a sweeper, a water dispenser, or other intelligent home devices. Alternatively, the slave device 200 may be a mobile phone, a tablet, or the like, and the specific form of the slave device is not particularly limited in the present application. The master device may be the same or different from the slave device.
Optionally, the system shown in fig. 2 may further include a central control device 500. The central control device may be connected to the master device 100, the slave device 200, and the second electronic device 300. Alternatively, the master device 100 may report one or more networking information to the central control device 500. The central control device 500 stores networking information from one or more host devices 100. Subsequently, the central control device 500 may send networking information to the slave device 200 in order for the slave device 200 to interact with the second electronic device 300 using the networking information.
Alternatively, the central control device 500 may be located in the home of the user or on the cloud side. Embodiments of the present application are not limited to a particular implementation of the central control device 500 and a particular deployment location.
The master device, the slave device and the access point in the embodiments of the present application may be implemented by the electronic device in fig. 3. Fig. 3 is a schematic hardware structure of an electronic device according to an embodiment of the present application. The electronic device comprises at least one processor 201, a memory 202 and at least one transceiver 203.
The processor 201 may be a general purpose central processing unit (central processing unit, CPU), microprocessor, application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of programs in accordance with aspects of the present application.
Communication lines may be included between the components for communicating information between the components.
A transceiver 203 for communicating with other devices. In the embodiments of the present application, the transceiver may be a module, a circuit, a bus, an interface, or other devices capable of implementing a communication function, for communicating with other apparatuses. Alternatively, the transceiver may be a separately provided transmitter that is operable to transmit information to other devices, or a separately provided receiver that is operable to receive information from other devices. The transceiver may also be a component that integrates the functions of transmitting and receiving information, and the embodiments of the present application do not limit the specific implementation of the transceiver.
The memory 202 may be, but is not limited to, a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (random access memory, RAM) or other type of dynamic storage device that can store information and instructions, an electrically erasable programmable read-only memory (EEPROM), a compact disc-only memory (compact disc read-only memory) or other optical disk storage, a compact disc storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory may be stand alone and be coupled to the processor via a communication line. The memory may also be integrated with the processor.
The memory 202 is used for storing computer-executable instructions for implementing the embodiments of the present application, and is controlled by the processor 201 to execute the instructions. The processor 201 is configured to execute computer-executable instructions stored in the memory 202, thereby implementing the methods provided in the embodiments described below.
Alternatively, the computer-executable instructions in the embodiments of the present application may be referred to as application code, instructions, computer programs, or other names, and the embodiments of the present application are not limited in detail.
In a particular implementation, the processor 201 may include one or more CPUs, as one embodiment.
In a particular implementation, as one embodiment, an electronic device may include multiple processors. Each of these processors may be a single-core (single-CPU) processor or may be a multi-core (multi-CPU) processor. A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
An exemplary block diagram of an electronic device is shown in fig. 3. It should be understood that the illustrated electronic device is only one example, and that in actual practice the electronic device may have more or fewer components than shown in fig. 3, may combine two or more components, or may have a different configuration of components, etc.
The following describes the technical solution of the embodiment of the present application in detail.
Scene one: a master device and a slave device networking
In this scenario, the master device may establish a plurality of communication connections with the access point using a plurality of device addresses, respectively. The master device may assign networking information of the established communication connection to the slave device, which uses the networking information to log on.
Taking a main device as a mobile phone, a slave device as a loudspeaker box, an access point as a router and a network as a Wi-Fi network as an example, the mobile phone establishes two communication connections with the router, and the network connection method of the embodiment of the application is described in detail. As shown in fig. 4, the method comprises the steps of:
s101, the mobile phone acquires a device address 1 and a device address 2.
The device address characterizes the identity of the device, and can be used for establishing network connection between the mobile phone and other devices. Alternatively, the device address may be, but is not limited to, a WLAN MAC address.
In the embodiment of the application, the mobile phone can acquire a plurality of WLAN MAC addresses, and respectively establish a plurality of connections with the router by using the plurality of WLAN MAC addresses. As for the router, since the plurality of connections correspond to different WLAN MAC addresses, respectively, the router regards the plurality of connections as connections between the plurality of different devices and itself.
As a possible implementation manner (configuration manner 1 of WLAN MAC address), a WLAN MAC address (real WLAN MAC address of the mobile phone) is preconfigured at the factory of the mobile phone. No collision is generated between the real WLAN MAC address and the WLAN MAC addresses of other devices. The handset may then generate one or more virtual WLAN MAC addresses by an algorithm. For example, the handset may generate a virtual WLAN MAC address through a WLAN MAC address generator. The virtual WLAN MAC address generated by the handset is different from the WLAN MAC address of the handset.
Optionally, the mobile phone may generate a virtual WLAN MAC address based on the real WLAN MAC address of the mobile phone, where the real WLAN MAC address of the mobile phone has an association relationship with the virtual WLAN MAC address. In this way, the probability of the virtual WLAN MAC address colliding with the WLAN MAC addresses of other devices can be reduced.
Illustratively, table 1 shows WLAN MAC addresses in a handset.
Table 1 WLAN MAC address in cell phone
WLAN MAC address Identification mark
WLAN MAC1 Factory configured WLAN MAC address
WLAN MAC2 Virtual WLAN MAC address
As shown in table 1, the real WLAN MAC address of the handset is WLAN MAC1, and the virtual WLAN MAC address includes WLAN MAC2 and so on.
Alternatively, the handset may generate the virtual WLAN MAC address shown in table 1 upon detecting the networking intent of the user. Alternatively, the handset may generate a virtual WLAN MAC address when first powered on for use. The embodiment of the application does not limit the generation time of the virtual WLAN MAC address.
As another possible implementation (configuration mode 2 of WLAN MAC address), a plurality of WLAN MAC addresses are preconfigured in the handset at the time of shipment, and the plurality of WLAN MAC addresses do not collide with the WLAN MAC addresses of other devices. Illustratively, table 2 shows a plurality of WLAN MAC addresses in the handset, where the WLAN MAC addresses of WLAN MAC1, WLAN MAC2, etc. are all factory-configured into the handset.
Table 2 WLAN MAC address in cell phone
WLAN MAC address Identification mark
WLAN MAC1 Factory configured WLAN MAC address
WLAN MAC2 Factory configured WLAN MAC address
S102, the mobile phone establishes a first connection with the router according to the equipment address 1.
Alternatively, corresponding to the configuration mode 1 of the WLAN MAC address, the device address 1 may be the real WLAN MAC address of the mobile phone. For example, device address 1 is WLAN MAC1 in table 1. Alternatively, the device address 1 may be any one of a plurality of WLAN MAC addresses configured by the mobile phone factory, corresponding to the configuration mode 2 of the WLAN MAC address. For example, it may be WLAN MAC2 or WLAN MAC1 in table 2 above.
For example, when detecting the intention of the user to connect Wi-Fi, such as detecting that the user clicks the "WLAN switch" on the mobile phone screen, the mobile phone may read the factory preset real WLAN MAC1 of the mobile phone, such as shown in table 1, and the mobile phone may use the WLAN MAC address 1 to establish the first connection with the router.
Wherein the mobile phone establishes a first connection with the router using the device address 1 (such as a real WLAN MAC address of the mobile phone), may include: channel scanning, four-step handshake authentication and the like. The specific way of establishing connection between the mobile phone and the router can be referred to the related flow of establishing connection between the sound box and the router, and will not be described herein.
In the process of establishing the first connection, the sound box can acquire relevant information of the first connection. It will be appreciated that after the handset establishes a first connection with the router using the WLAN MAC1, the handset may interact with the router over the first connection using networking information of the first connection.
Optionally, the networking information of the first connection includes, but is not limited to, any one or more of the following: the method comprises the steps of transmitting a message through a first connection, wherein the message comprises a WLAN MAC address of a station corresponding to the first connection, an IP address of the station, a key used by the message transmitted through the first connection, a WLAN MAC address of a router corresponding to the first connection, an IP address of the router, a working frequency band corresponding to the first connection and a working channel corresponding to the first connection.
Alternatively, the keys include, but are not limited to: a PTK for encrypting unicast messages transmitted on the first connection, a GTK for encrypting multicast/broadcast messages transmitted on the first connection.
Illustratively, assume that networking information for the first connection is as shown in Table 3:
TABLE 3 networking information for first connection
WLAN MAC address of station WLAN MAC1
IP address of site IP1
PTK ptk1
GTK gtk1
WLAN MAC address of router WLAN MAC_router
IP address of router IP_router
Operating frequency band 2.4GHz
Working channel channel1
As in fig. 6 (a), connection 1 (first connection) is established between the handset and the router, and the networking information of connection 1 is as in table 3 above. After the connection 1 is established, the mobile phone can send a message to the router of the WLAN MAC_router and the IP_router by using the WLAN MAC1 and the IP1 in the channel 1 of the 2.4GHz frequency band. For unicast messages, the mobile phone can encrypt the messages through ptk1 and send the encrypted messages to the router. For multicast or broadcast messages, the handset can encrypt the message through gtk1 and send the encrypted message to the router.
In some embodiments, the handset may store networking information for the first connection. Therefore, when the subsequent mobile phone reenters the network coverage of the router, the mobile phone can directly interact with the router by using networking information of the first connection, the connection establishment process is not required to be executed again, and the time for the mobile phone to be re-accessed to the router network is shortened.
In some embodiments, in some networks (such as wireless networks), it may be desirable to keep the established network connection alive and maintained. For example, in a Wi-Fi network, the handset uses WLAN MAC1 and interacts with the router periodically (e.g., every 100 milliseconds) to manage frame messages over the first connection so that the router determines that the handset is within range of the network and maintains the first connection. In some examples, the router may release the first connection if the router does not receive the management frame message over the first connection for a longer period of time.
S103, the mobile phone establishes a second connection with the router according to the equipment address 2.
Wherein device address 2 is different from device address 1. Accordingly, the first connection and the second connection are different communication connections. For routers, the first connection and the second connection are considered by the router as communication connections established between different devices and themselves, since the device addresses used when creating the first connection and the second connection are different.
Alternatively, the device address 2 may be a virtual WLAN MAC address corresponding to the configuration mode 1 of the WLAN MAC address described above. For example, device address 1 is WLAN MAC2 in table 1. Alternatively, the device address 2 may be any one of a plurality of WLAN MAC addresses configured by the mobile phone factory, corresponding to the configuration mode 2 of the WLAN MAC address.
Illustratively, upon detecting the user's intent to connect Wi-Fi, such as detecting the user clicking a "WLAN switch" on the handset screen, the handset generates a virtual WLAN MAC2, such as shown in table 1, and may establish a second connection with the router using the virtual WLAN MAC2. The handset establishes a second connection with the router using device address 2 (such as a virtual address WLAN MAC), which may include: channel scanning, four-step handshake authentication and the like. The specific way of establishing connection between the mobile phone and the router can be referred to the related flow of establishing connection between the sound box and the router, and will not be described herein.
After the second connection is established between the handset and the router, the handset may interact with the router using networking information of the second connection.
Optionally, the networking information of the second connection includes, but is not limited to, any one or more of the following: the WLAN MAC address of the station corresponding to the second connection, the IP address of the station, the key used to transmit the message through the second connection, the WLAN MAC address of the router corresponding to the second connection, the IP address of the router, the working frequency band corresponding to the second connection, and the working channel corresponding to the second connection.
Alternatively, the keys include, but are not limited to: a PTK for encrypting unicast messages transmitted on the second connection, a GTK for encrypting multicast/broadcast messages transmitted on the second connection.
It should be appreciated that networking information is not limited to the information listed above, but may be any other possible information for connecting to a network. Embodiments of the present application are not intended to be exhaustive of all aspects of networking information.
Illustratively, the networking information for the second connection may be as shown in table 4:
TABLE 4 networking information for the second connection
As in fig. 6 (a), the handset establishes connection 2 (second connection) with the router, and the networking information for connection 2 is as in table 4 above. After connection 2 is established, the handset can send messages to the routers of WLAN mac_router, ip_router using WLAN MAC2, IP2 over channel 2 of 2.4 GHz. For unicast messages, the mobile phone may encrypt the message by ptk2 and send the encrypted message to the router. For multicast or broadcast messages, the handset can encrypt the message by gtk2 and send the encrypted message to the router.
In some embodiments, the handset may store networking information for the first connection, the second connection, and the like. In this way, in some scenarios, when the subsequent mobile phone reenters the network coverage of the router, the mobile phone can directly interact with the router by using the networking information of the first connection and/or the second connection, without re-executing the connection establishment process, so that the time for re-accessing the mobile phone to the router network is shortened. In other scenes, when other slave devices have networking requests, the networking information of the second connection can be obtained from the mobile phone, and the networking information is used for directly interacting with the router, so that channel scanning and/or four-step handshake flow are not required to be executed, and the time for accessing the slave devices to the network can be shortened.
In some embodiments, the handset uses WLAN MAC2 and interacts with the router periodically (e.g., every 100 milliseconds) via the second connection to manage frame messages so that the router determines that the handset is within network range and maintains the second connection. In some examples, the router may release the second connection if the router does not receive the management frame message over the second connection for a longer period of time.
S104, the mobile phone and the sound box are connected in a Bluetooth mode.
Optionally, bluetooth technology used by the mobile phone and the speaker includes, but is not limited to: basic Rate (BR) bluetooth, bluetooth low energy (bluetooth low energy, BLE), enhanced rate (enhanced data rate, EDA) bluetooth.
It should be noted that the connection type established between the mobile phone and the sound box is not limited to bluetooth connection, and other types of connection can be established. For example, the mobile phone and the sound box can communicate through a near field communication (near field communication, NFC) module.
As one possible implementation, the bluetooth address of the mobile phone is MAC4, the bluetooth address of the speaker is MAC3, and the speaker uses MAC3 to establish a bluetooth connection with the mobile phone whose bluetooth address is MAC 4.
S105, the mobile phone sends networking information of the first connection to the sound box.
It will be appreciated that after the bluetooth connection is established between the handset and the loudspeaker, interaction may be via the bluetooth connection. For example, control messages are interacted with over a bluetooth connection to maintain the bluetooth connection.
In this embodiment, after the bluetooth connection between the mobile phone and the sound box is established, one communication connection may be selected from multiple connections between the mobile phone and the router (different connections are established by using different WLAN MAC addresses respectively). The handset may send networking information of the selected communication connection (e.g., the first connection) to the speaker via the bluetooth connection with the speaker so that the speaker uses the networking information of the first connection to interact with the router.
For example, as shown in fig. 5 (a), when the mobile phone is close to the speaker, the mobile phone may pop up the pop-up window 501, and the pop-up window 501 includes a "connect" button. Upon detecting that the user clicks the "connect" button, the handset may send networking information for the first connection (such as the networking information shown in table 4) to the speaker. Optionally, after the speaker receives the networking information of the first connection, a response message may be returned to the mobile phone. The mobile phone determines that the sound box has received networking information according to the response message, and considers that the sound box has been connected successfully. The mobile phone may display a prompt message "connect successful" in the pop-up window 501 as shown in fig. 5 (b).
Alternatively, the transmission link between the handset and the speaker may be securely encrypted.
S106, disconnecting the mobile phone from the first connection with the router.
It will be appreciated that in order for the loudspeaker to be able to interact with the router using the first connection, the handset needs to disconnect the first connection from the router. In this way, in the same time period, the device which uses the first connection to interact with the router is unique, and the router can accurately send the message to the opposite end device of the first connection.
Optionally, after sending the networking information of the first connection to the speaker, the handset disconnects the first connection from the router. Or, the mobile phone sends networking information of the first connection to the sound box, and after receiving a confirmation message (confirming that the sound box has received the networking information) from the sound box, the mobile phone disconnects the first connection with the router.
Alternatively, the handset may actively disconnect the first connection with the router. Or the mobile phone can no longer send the control message to the router, and the router considers that the mobile phone moves out of the network coverage area, and the router disconnects the first connection with the mobile phone. Thus, only one device can interact with the router at the same time using the networking information of the first connection, and collisions between devices can be avoided.
In some embodiments, S106 may be understood as the handset disabling the first connection. Optionally, the handset saves information of the first connection, but stops using the first connection to interact with the router. Thus, when the first connection needs to be reused later, the mobile phone can interact with the router directly through the first connection according to the stored networking information of the first connection.
Alternatively, the handset may delete the information of the first connection.
And S107, the sound box interacts messages with the router through the first connection according to the networking information of the first connection.
Meaning that the first connected side device is switched from the mobile phone to the sound box. For the router, since the networking information used by the mobile phone and the sound box is the same (both are the networking information of the first connection) before and after the switching does not occur, the router does not sense that the switching occurs on the device on one side of the first connection.
For example, as shown in fig. 6 (b), assuming that the information of the first connection received by the speaker from the handset includes the information shown in table 4 (WLAN MAC2, IP2, ptk2, gtk2, 2.4 GHz), the speaker may send a message to the router of WLAN mac_router, ip_router directly using WLAN MAC2, IP2 instead of the handset. Wherein, the receiving and dispatching frequency band of the sound box is 2.4GHz. For unicast messages, the loudspeaker can encrypt the messages through ptk2 and send the encrypted messages to the router. For multicast or broadcast messages, the loudspeaker can encrypt the message through gtk2 and send the encrypted message to the router. For the router, it does not perceive that the opposite device of connection 2 is switched from the handset to the loudspeaker.
In the embodiment of the application, the loudspeaker box does not need to interact with the router by itself to acquire networking information such as the working frequency band and the key of the router, but directly acquires the required networking information from the mobile phone when the loudspeaker box needs to communicate with the router, and directly communicates with the router according to the networking information, so that a plurality of steps of channel scanning and four-step handshake authentication of the loudspeaker box are omitted, and therefore, the networking efficiency of the loudspeaker box can be improved.
In addition, because the communication connection used by the sound box is the communication connection successfully established by the mobile phone, the probability of network access failure caused by network jitter when the sound box establishes connection by itself can be avoided.
In some embodiments, the speaker may use device address 2 and interact with the router periodically (e.g., every 100 milliseconds) via the first connection to manage frame messages so that the router determines that the speaker is within network range and maintains the first connection. In some examples, the router may release the first connection if the router does not receive the management frame message over the first connection for a longer period of time.
In the embodiment of the application, the sound box can continuously use the networking information (such as the networking information shown in table 4) of the first connection distributed by the mobile phone to surf the internet. And the sound box and the mobile phone can manage networking information of the first connection so as to be used for accessing a network by a subsequent sound box. The mode of managing the networking information of the mobile phone and the sound box comprises the following modes:
Mode 1: the sound box stores networking information of the first connection, and when the sound box enters the radiation range of the router again, the sound box can use the stored networking information of the first connection to surf the internet.
The method flow of this implementation is as in fig. 7, after S105, the method further comprises:
s108, the sound box stores networking information of the first connection.
S109, the sound box is disconnected with the first connection between the router.
Optionally, when the loudspeaker box has no internet surfing requirement, the first connection with the router can be actively disconnected. Or the sound box does not send the management message through the first connection in time, and the router disconnects the first connection with the sound box. The embodiment of the application does not limit the time for disconnecting the first connection and the triggering condition.
S110, when the router reenters the network range of the router, the sound box uses the networking information of the first connection to transmit messages.
Therefore, when the sound box is disconnected and enters the network coverage again, networking information of the first connection can be automatically used for interacting with the router, the connection establishment process is not required to be executed again, and networking efficiency can be improved.
Mode 2: after the sound box receives the networking information of the first connection, the networking information is used for interacting with the router, and the equipment address in the networking information can be saved. After the sound box is disconnected from the first connection with the router, when the sound box enters the radiation range of the router again, the sound box can establish communication connection with the router by using the equipment address so as to interact data messages with the router through the communication connection.
Mode 3: after the sound box receives the networking information of the first connection from the mobile phone, the networking information is used for interacting with the router, and the sound box can not store the networking information. After the sound box is disconnected with the first connection between the router, when the sound box needs networking again, networking information can be requested to the mobile phone, and the networking information is used for interaction with the router. Or when the sound box needs networking again, the communication connection is established between the sound box and the router by using the device address of the sound box, and after the communication connection is established, the sound box can interact with the router by using the data message.
Mode 4: the handset sends networking information of the first connection to the loudspeaker, the networking information carrying an activation tag. The activation indicia is used to indicate an available period or an unavailable period of the networking information. After the sound box receives the networking information of the first connection, the router is interacted with the networking information of the first connection in the available period according to the activation mark.
In some embodiments, after the mobile phone sends networking information to the sound box, the sound box can surf the internet by itself, and the networking of the sound box is not affected by whether the mobile phone is networked or not. For example, as shown in fig. 4, the speaker receives and uses the networking information of the first connection to interact with the router, and in this process, even if the mobile phone disconnects the communication connection with the router, the interaction between the speaker and the router is not affected.
Scene II: a master device and a plurality of slave devices are networked
When the target slave device needs networking, networking information required for the networking may be requested from the master device. The master device may select networking information, which is not allocated to use by other slave devices, from among the maintained plurality of networking information, and transmit the networking information to the target slave device.
For example, as shown in fig. 8, taking a sound box, a camera as a slave device, a mobile phone as a master device, and a router as an access point as an example, in some scenarios, a process of the master device assisting multiple slave devices to quickly complete a network surfing function may include the following steps:
s201, the mobile phone sends networking information of the first connection to the sound box.
The mobile phone establishes a plurality of communication connections, such as a first connection, a second connection and a third connection, with the router by using a plurality of MAC addresses. The handset may determine the first connection from the three communication connections and send networking information for the first connection to the speaker.
Alternatively, the handset sends the networking information via a connection, such as a Bluetooth connection, with the speaker. The connection and maintenance of the bluetooth connection may be described in the above related description, and will not be repeated.
S202, disconnecting the first connection between the mobile phone and the router.
It will be appreciated that in order for the loudspeaker to be able to interact with the router using the first connection, the handset needs to disconnect the first connection from the router. In this way, in the same time period, the device which uses the first connection to interact with the router is unique, and the router can accurately send the message to the opposite end device of the first connection.
S203, the sound box transmits a message to the router through the first connection.
S204, disconnecting the first connection between the sound box and the router.
Optionally, when the loudspeaker box does not need to surf the internet, the first connection between the loudspeaker box and the router can be actively disconnected, or the router disconnects the first connection.
S205, the sound box sends a message A to the mobile phone.
Wherein message a may be used to indicate that the first connection between the speaker and the router has been broken.
After the mobile phone receives the message a, it may be determined that the sound box has disconnected the first connection with the router. The handset may mark the status of the networking information of the first connection as available. The handset may distribute networking information of the available status to other slave devices for use.
S206, the camera sends a networking request to the mobile phone.
Wherein the networking request is for requesting networking information required for networking.
S207, the mobile phone selects a first connection from a plurality of communication connections.
After the handset receives the networking request from the camera, a target communication connection (such as a first connection) which can be allocated to the camera for use can be determined from a plurality of communication connections according to a certain policy.
S208, the mobile phone sends networking information of the first connection to the camera.
It will be appreciated that after the handset receives a networking request from the camera, the target networking information may be determined from the maintained plurality of networking information. Illustratively, the handset maintains networking information for the first connection, the second connection, and the third connection. The handset may select a target connection (e.g., a first connection) from the three communication connections and send networking information for the first connection to the camera.
S209, the camera transmits a message through the first connection.
It will be appreciated that after the camera receives the networking information of the first connection from the handset, the first connection may be used in place of the handset to interact with the router through the first connection. The router has no perception of switching between the first connected peer devices.
In other scenarios, as shown in fig. 9, the process of the master device assisting the plurality of slave devices in performing the internet function may include the steps of:
s201, the mobile phone sends networking information of the first connection to the sound box.
Illustratively, assume that the handset has established three communication connections with the router, connection 1 (one example of a first connection), connection 2, and connection 3, respectively. The handset may determine the first connection from the three communication connections and send networking information for the first connection to the speaker.
S202, disconnecting the mobile phone from the first connection with the router.
S203, the sound box transmits a message through the first connection.
It will be appreciated that the speaker receives networking information of the first connection (e.g., working channel of the router, key, etc.), and may interact with the router through the first connection instead of using the networking information of the first connection with the handset. The steps of negotiating a secret key, scanning a channel and the like are not required to be executed, and the time required by sound box networking is greatly shortened.
S301, the camera sends a networking request to the mobile phone.
Wherein the networking request is for requesting networking information required for networking.
S302, the mobile phone determines a third connection from the maintained communication connections.
Illustratively, the handset maintains a first connection (connection 1), connection 2, and connection 3. In contrast to the scenario shown in fig. 8, in the scenario shown in fig. 9, the first connection is used by the loudspeaker, and therefore, during the period of time that the loudspeaker uses the first connection, the first connection may no longer be allocated for use by other devices. The handset may determine a communication connection (such as connection 3) from connections 2 and 3 and assign connection 3 to the camera to be networked for use.
And S303, the mobile phone sends networking information of the connection 3 to the camera.
S304, the camera transmits a message through the connection 3.
In other scenarios, the slave device may also use its own MAC address to establish a communication connection with the access point during the process of surfing the internet using the networking information assigned by the master device. After the slave device establishes a communication connection using its own MAC address, the master device may retrieve networking information allocated to the slave device and allocate the retrieved networking information to other slave devices for use. Thus, the utilization rate of networking information can be improved. The flow of the method is illustrated in fig. 10, and the method comprises the following steps:
s201, the mobile phone sends networking information of the first connection to the sound box.
S202, disconnecting the mobile phone from the first connection with the router.
S203, the sound box transmits a message to the router through the first connection.
S401, the sound box uses the device address of the sound box to establish a connection 4 with the router.
Illustratively, assuming that the WLAN MAC of the speaker itself is MAC5, the speaker may use MAC5 to establish connection 4 with the router.
S402, the sound box transmits a message to the router through the connection 4.
In the embodiment of the application, the sound box firstly uses networking information of the first connection distributed by the mobile phone, and directly interacts with the router through the first connection, so that the time for network access of the sound box is shortened. After that, after network access, the loudspeaker box can additionally establish a connection 4. Because the loudspeaker box is connected with the network when the loudspeaker box establishes the connection 4, the connection 4 is established without affecting the existing first connection of the loudspeaker box, which means that the surfing experience of the user is not affected.
S403, disconnecting the first connection of the sound box.
In some examples, after the speaker establishes connection 4 with the router, the speaker may actively disconnect the first connection with the router because the speaker may already be in communication with the router through connection 4.
Alternatively, after the loudspeaker has established the connection 4 with the router, the first connection may continue to be used. When the first condition is met, the loudspeaker fails the first connection (e.g., connection 1) and interacts with the router via connection 4. For example, when the transmission of the sound box is completed or at other times, the sound box can disconnect the first connection with the router when the sound box no longer needs to use the first connection. For another example, after the connection 4 is established, the speaker fails the first connection after a preset period of time. For another example, the first connection may be disabled when the loudspeaker is not currently requiring a higher transmission bandwidth.
In other examples, the loudspeaker may not fail the first connection, but rather interact with the router through the first connection (e.g., connection 1) and connection 4 to improve transmission efficiency.
S404, the sound box sends a message B to the mobile phone.
Wherein message B may be used to indicate that the loudspeaker has disconnected the first connection.
Optionally, the speaker may actively send the message B to the mobile phone after disconnecting the first connection. Or, the mobile phone sends a query message to the sound box according to a certain policy (such as according to a period or according to an event) for querying whether the sound box has disconnected the first connection. After the sound box receives the inquiry message from the mobile phone, a message B is returned to the mobile phone to indicate that the sound box has disconnected the first connection.
Optionally, the sound box sends the message B through a bluetooth connection with the mobile phone.
S405, the camera sends a networking request to the mobile phone.
Wherein the networking request is for requesting networking information required for networking.
S406, the mobile phone sends networking information of the first connection to the camera.
After the handset receives the networking request from the camera, the target communication connection may be determined from the maintained plurality of communication connections, such as the first connection (connection 1), connection 2. Optionally, the first connection is not currently used by the slave device and is an idle communication connection, and the mobile phone may take the first connection as a target communication connection and send networking information of the first connection to the camera.
S407, the camera transmits a message to the router through the first connection.
By way of example, fig. 11 illustrates yet another flow of a networking method of an embodiment of the present application. Compared with the process of fig. 10 in which the sound box actively disconnects the first connection, in the process of fig. 11, the mobile phone indicates that the sound box disconnects the first connection. Specifically, as shown in fig. 11, the method includes the following steps:
s201, the mobile phone sends networking information of the first connection to the sound box.
S202, disconnecting the mobile phone from the first connection with the router.
S203, the sound box transmits a message to the router through the first connection.
S401, the sound box uses the device address of the sound box to establish a connection 4 with the router.
S501, the sound box sends a message C to the mobile phone.
Wherein message C may be used to indicate that the loudspeaker has established a connection 4 with the router. After the mobile phone receives the message C, the mobile phone can know that the sound box has established communication connection between the sound box and the router. Thus, subsequently, the mobile phone may instruct the sound box to disconnect the first connection allocated to the sound box by the mobile phone when the condition is satisfied, so as to allocate the first connection to other slave devices (such as a camera) for use. In this process, since the loudspeaker has established connection 4, even if the loudspeaker is disconnected from the first connection with the router, the normal internet function of the loudspeaker is not affected.
S402, the sound box transmits a message to the router through the connection 4.
S502, the camera sends a networking request to the mobile phone.
Wherein the networking request is for requesting networking information required for networking.
S503, the mobile phone sends a message D to the sound box.
Wherein the message D may be used to instruct the loudspeaker to disconnect the first connection.
It will be appreciated that after the handset receives a networking request from the camera, the networking information for the target connection may be determined from the plurality of networking information maintained. In one example, assume that the handset has the first connection as the target connection. After the mobile phone obtains that the first connection is used by the sound box, the sound box can be instructed to disconnect the first connection, so that the mobile phone can distribute the first connection to the camera for use.
S504, disconnecting the first connection of the sound box.
After the loudspeaker receives the message D, the first connection with the router is disconnected according to the message D.
S505, the mobile phone sends networking information of the first connection to the camera.
Optionally, after the mobile phone sends a message D (indicating that the speaker disconnects the first connection with the router) to the speaker, the networking information of the first connection may be sent to the camera. Or, the mobile phone sends the message D to the sound box, and sends networking information of the first connection to the camera after receiving the response message of the disconnected first connection from the sound box.
S506, the camera transmits a message to the router through the first connection.
Scene III: one slave device and a plurality of master devices are networked
The target slave device may receive a plurality of networking information from the plurality of master devices, and when networking is required, the target slave device may determine target networking information from the plurality of networking information and interact with the access point using the target networking information.
For example, as shown in fig. 12, taking a sound box as a slave device, a mobile phone a and a mobile phone B as a master device, and a router as an access point as an example, in some scenarios, a process of the master device assisting the slave device to quickly complete a network surfing function may include the following steps:
S601, bluetooth connection is established between the mobile phone A and the sound box.
Handset a is networked and maintains two communication connections with the router, a first connection (connection 1) and a connection 2, respectively.
S602, the mobile phone A sends networking information of the first connection to the sound box.
Alternatively, the mobile phone a may send networking information of the first connection to the sound box after establishing the bluetooth connection with the sound box. Alternatively, handset a may send networking information for the first connection to the speaker after receiving the networking request from the speaker. The embodiment of the application does not limit the time and the triggering condition for sending the networking information by the mobile phone A.
For example, as shown in fig. 13 (a), after the mobile phone a approaches and finds the sound box, the pop-up window 501 may be popped up. Upon detecting that the user clicks the "connect" button in the pop-up window 501, handset a determines that the user wants to configure networking for the speaker, handset a may send networking information for the first connection to the speaker.
S603, disconnecting the mobile phone A from the first connection with the router.
S604, the sound box transmits a message through the first connection.
As in fig. 13 (b), after the speaker receives the networking information of the first connection from the handset a, the first connection may be used to interact with the router through the first connection.
S605, the sound box is disconnected with Bluetooth connection between the mobile phone A.
Alternatively, the bluetooth connection with the sound box may be disconnected by the mobile phone a. For example, the user controls the mobile phone A to disconnect the Bluetooth connection with the sound box through the Bluetooth setting interface of the mobile phone A. Or, when the Bluetooth signal is bad, the sound box can disconnect the Bluetooth connection with the mobile phone A.
S606, the sound box establishes Bluetooth connection with the mobile phone B.
For example, the user controls the mobile phone B to establish bluetooth connection with the sound box through a bluetooth setting interface of the mobile phone B. Where handset B is networked and maintains connections 5 and 6 with routers.
S607, the mobile phone B sends networking information of the connection 6 to the sound box.
Handset B determines a target communication connection (such as connection 6) from a plurality of available communication connections and sends networking information for connection 6 to the speaker via the bluetooth connection with the speaker.
Illustratively, as in fig. 14 (a), upon detecting that the user clicks the "connect" button in the pop-up window 501, handset B determines that the user wants to network for the speaker, handset B may send networking information for connection 6 to the speaker.
S608, the handset B disconnects the connection 6 with the router.
S609, the sound box transmits a message through the connection 6.
In some examples, as in fig. 14 (B), after the speaker receives networking information for connection 6 from handset B, the connection 6 may be used to interact with the router through connection 6. The loudspeaker no longer uses the first connection to interact with the router. In other words, the latest networking information allocated to the speaker box by handset B overrides the old networking information allocated to the speaker box by handset a.
In other examples, as in fig. 14 (B), after the speaker receives networking information for connection 6 from handset B, the speaker may interact with the router through connection 6 using the networking information for connection 6. At the same time, the loudspeaker may continue to interact with the router using the first connection (as shown by the dashed line). In other words, the latest networking information allocated to the sound box by the mobile phone B does not cover the old networking information allocated to the sound box by the mobile phone a, but adds the networking information based on the old networking information. Therefore, the loudspeaker box can interact with the router through a plurality of communication connections, parallel transmission of messages can be realized through the plurality of communication connections, and message transmission efficiency is improved.
In some embodiments, the speakers may store the assigned networking information, and the speakers may use the stored networking information to surf the internet when the speakers reenter the radiation range of the router.
Optionally, if the sound box is assigned a plurality of networking information, the sound box may determine target networking information from the plurality of networking information and interact with the router using the target networking information. Alternatively, the speakers may interact with the router through multiple communication connections using multiple networking information.
Scene four:
in this scenario, the communication parameters of the router may change during interaction of the slave device with the router. For example, due to the change of the wireless channel, the working channel or frequency band of the router is switched, and the router is switched to the channel or frequency band with better signal to work. In this case, the networked slave device may request new networking information from the central control device and interact with the router using the new networking information.
Illustratively, as in fig. 15 (a), the speakers interact with the router using networking information for the mobile-assigned connection 2. Wherein, the audio amplifier communicates with the router on 2.4GHz frequency channel. Then, as shown in fig. 15 (b), the condition of the wireless channel changes, the working frequency band of the router is switched from 2.4GHz to 5GHz, and the sound box networking fails. In some examples, as in fig. 15 (c), the sound box may request new networking information from the central control device. The central control device may obtain networking information of the communication connection that is currently able to be used normally. For example, handset a currently exists throughout the house and interacts with the router at 5 GHZ. The communication connection between handset a and the router is assumed to include connection 3 and connection 4. The central control device may obtain networking information of an available communication connection (such as connection 3) between the handset a and the router, and distribute the networking information of the connection 3 to the speaker. Thus, the loudspeaker box can replace the mobile phone A to interact with the router. In the method, when the communication parameters of the router are changed, the sound box can acquire and directly use the new networking information to surf the internet from the central control equipment, the connection establishment flow is not required to be re-executed, the steps of channel scanning, four-step handshake and the like can be omitted, and the efficiency of re-networking of the sound box is improved.
Further exemplary, the interaction between the speaker and the router is performed over channel 2 via connection 2. Then, the working channel of the router is switched from channel 2 to channel 3, resulting in the disconnection of the loudspeaker. After the loudspeaker is disconnected from the router, new networking information can be requested from the central control device. Assume that a communication connection exists between the router and handset a, handset B. The central control device may obtain networking information from either handset a or handset B. Assuming that the central control device obtains certain networking information from the mobile phone a, the central control device may send the networking information to the sound box. Thus, the loudspeaker box can replace the mobile phone A to interact with the router.
In other embodiments, if the communication parameters of the router change, resulting in a network disconnection of the speaker, the speaker may re-perform the connection establishment procedure, such as re-performing the steps of channel scanning, four-step handshaking, and the like. After reestablishing the communication connection with the router, the loudspeaker may interact with the router through the established communication connection.
The foregoing description mainly uses the access point as the router, and in other embodiments, the terminal device may also be used as the access point. Illustratively, as in fig. 16 (a), handset a turns on the hotspot. And establishing a WLAN connection 1 and a WLAN connection 2 between the mobile phone B and the mobile phone A. Then, as shown in fig. 17, when the user turns on the "one-touch networking" switch in the WLAN setting interface 170 of the watch, the watch can obtain the networking information of the mobile phone a through the bluetooth connection with the mobile phone B. As in fig. 16 (B), assuming that handset B sends networking information of WLAN connection 2 to the watch, the watch can use the networking information of WLAN connection 2 to interact with the hotspot handset a with WLAN messages.
In some embodiments, the user may set, via the master or slave, whether master off-network affects slave off-network. For example, as in fig. 17, the watch WLAN setup interface 170 may include a switch 1702. If the user turns on the switch 1702, the wristwatch, after detecting that the host device (e.g., handset B of fig. 16) is disconnected, also disconnects the communication with the access point (e.g., hotspot handset a of fig. 16).
In some embodiments, the functionality to assist the slave device in surfing the internet may be enabled through a master device setup. For example, as shown in fig. 18, the WLAN setup interface 180 of the handset may include a switch 1801. If switch 1801 is turned on, the handset may perform the methods of embodiments of the present application to facilitate rapid networking of the slave devices.
The above description mainly uses a WLAN scenario as an example to describe the technical solution of the embodiments of the present application, and it should be understood that the technical solution of the embodiments of the present application may also be applied to other wireless network scenarios, so that the master device can assist the slave device in fast networking.
Wherein the networking information may be different when applied in different wireless network scenarios. For example, as already described above, in a Wi-Fi network, networking information may include: the information required by the network receiving and transmitting messages such as MAC, IP, secret key of the station, MAC, IP, working channel, working frequency band of the access point and the like. In a data network, networking information may include: key, user identification, identification information. Optionally, the data network includes, but is not limited to, a cellular network. Optionally, the user identification includes a user number in the SIM card or eSIM card. In a bluetooth scenario, networking information includes, but is not limited to: identification information, a key. The identification information includes, but is not limited to, the MAC address of the device.
Illustratively, taking a wristwatch and a mobile phone as examples, the method includes:
s701, the watch sends a Bluetooth connection request.
Illustratively, as shown in fig. 20, upon detecting a user clicking a "one-touch pairing" button on the watch's bluetooth setup interface 200, the watch may send a connect bluetooth request to the central control device.
S702, the central control equipment determines information of available target Bluetooth connection.
Optionally, the information of the bluetooth connection includes, but is not limited to: bluetooth MAC address, key of the Bluetooth connected end side device.
It will be appreciated that after the central control device receives the connection bluetooth request, it may select an available target bluetooth connection from bluetooth connections created by other devices, and determine information corresponding to the target bluetooth connection. For example, assuming historically that the speaker has established a first bluetooth connection with the handset and the camera has established a second bluetooth connection and a third bluetooth connection with the handset, the central control device may select a target bluetooth connection from the first bluetooth connection, the second bluetooth connection, and the third bluetooth connection and determine information of the target bluetooth connection.
And S703, the central control equipment returns information of the target Bluetooth connection to the watch.
For example, assuming that the target bluetooth connection is the third bluetooth connection, the central control device transmits information of the third bluetooth connection to the wristwatch. The information hypothesis for the third connection includes: virtual bluetooth MAC address 3 of the camera, MAC address of the handset, key.
S704, the watch transmits the message through the target Bluetooth connection.
In the process, the watch does not need to execute steps such as key negotiation, and the like, and can directly use the information of the target Bluetooth connection distributed by the central control equipment to interact with the Bluetooth message by the mobile phone, so that the Bluetooth connection efficiency of the watch is improved.
The above embodiments may be combined and the combined solution may be implemented. Optionally, some operations in the flow of method embodiments are optionally combined, and/or the order of some operations is optionally changed. The order of execution of the steps in each flow is merely exemplary, and is not limited to the order of execution of the steps, and other orders of execution may be used between the steps. And is not intended to suggest that the order of execution is the only order in which the operations may be performed. Those of ordinary skill in the art will recognize a variety of ways to reorder the operations described herein. In addition, it should be noted that details of processes involved in a certain embodiment herein apply to other embodiments as well in a similar manner, or that different embodiments may be used in combination.
Moreover, some steps in method embodiments may be equivalently replaced with other possible steps. Alternatively, some steps in method embodiments may be optional and may be deleted in some usage scenarios. Alternatively, other possible steps may be added to the method embodiments. Alternatively, the execution subject (e.g., functional module) of some steps in the method embodiment may be replaced with another execution subject.
Moreover, the method embodiments described above may be implemented alone or in combination.
Further embodiments of the present application provide an apparatus, which may be the first electronic device, the third electronic device, or the like. The apparatus may include: a display screen, a memory, and one or more processors. The display, memory, and processor are coupled. The memory is for storing computer program code, the computer program code comprising computer instructions. When the processor executes the computer instructions, the apparatus may perform the functions or steps performed by the mobile phone in the method embodiments described above. The structure of the apparatus can be referred to as an electronic device (apparatus) shown in fig. 21.
The core structure of the device may be represented as the structure shown in fig. 21, where the device includes: a processing module 1301, an input module 1302, a storage module 1303, and a display module 1304.
Processing module 1301 may include at least one of a Central Processing Unit (CPU), an application processor (Application Processor, AP), or a communication processor (Communication Processor, CP). Processing module 1301 may perform operations or data processing related to control and/or communication of at least one of the other elements of the consumer electronic device. Specifically, the processing module 1301 may be configured to control the content displayed on the home screen according to a certain trigger condition. The processing module 1301 is further configured to process the input instruction or data, and determine a display style according to the processed data.
The input module 1302 is configured to obtain an instruction or data input by a user, and transmit the obtained instruction or data to other modules of the electronic device. Specifically, the input mode of the input module 1302 may include touch, gesture, proximity screen, or voice input. For example, the input module may be a screen of an electronic device, acquire an input operation of a user, generate an input signal according to the acquired input operation, and transmit the input signal to the processing module 1301.
The storage module 1303 may include volatile memory and/or nonvolatile memory. The storage module is used for storing at least one relevant instruction or data in other modules of the user equipment device, in particular, the storage module can record the position of an interface where the device interface element UI is located.
Display module 1304, which may include, for example, a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display, an Organic Light Emitting Diode (OLED) display, a microelectromechanical system (MEMS) display, or an electronic paper display. For displaying user viewable content (e.g., text, images, video, icons, symbols, etc.).
Optionally, a communication module 1305 is also included for supporting the personal device to communicate with other personal devices (via a communication network). For example, the communication module may be connected to a network via wireless communication or wired communication to communicate with other personal devices or web servers. The wireless communication may employ at least one of cellular communication protocols, such as Long Term Evolution (LTE), long term evolution-advanced (LTE-a), code Division Multiple Access (CDMA), wideband Code Division Multiple Access (WCDMA), universal Mobile Telecommunications System (UMTS), wireless broadband (WiBro), or global system for mobile communications (GSM). The wireless communication may include, for example, short-range communication. The short-range communication may include at least one of wireless fidelity (Wi-Fi), bluetooth, near Field Communication (NFC), magnetic Stripe Transmission (MST), or GNSS.
It should be noted that each functional module of the apparatus may perform one or more steps of the above-described method embodiments.
Embodiments of the present application also provide a chip system, as shown in fig. 22, comprising at least one processor 1401 and at least one interface circuit 1402. The processor 1401 and the interface circuit 1402 may be interconnected by wires. For example, interface circuit 1402 may be used to receive signals from other devices (e.g., a memory of an electronic apparatus). For another example, interface circuit 1402 may be used to send signals to other devices (e.g., processor 1401). Illustratively, the interface circuit 1402 may read instructions stored in the memory and send the instructions to the processor 1401. The instructions, when executed by the processor 1401, may cause the electronic device to perform the various steps of the embodiments described above. Of course, the chip system may also include other discrete devices, which are not specifically limited in this embodiment of the present application.
The embodiment of the application also provides a computer storage medium, which comprises computer instructions, when the computer instructions run on the electronic device, the electronic device is caused to execute the functions or steps executed by the mobile phone in the embodiment of the method.
The present application also provides a computer program product, which when run on a computer, causes the computer to perform the functions or steps performed by the mobile phone in the above-mentioned method embodiments.
It will be apparent to those skilled in the art from this description that, for convenience and brevity of description, only the above-described division of the functional modules is illustrated, and in practical application, the above-described functional allocation may be performed by different functional modules according to needs, i.e. the internal structure of the apparatus is divided into different functional modules to perform all or part of the functions described above.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, and the division of modules or units, for example, is merely a logical function division, and there may be additional divisions when actually implemented, for example, multiple units or components may be combined or integrated into another apparatus, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and the parts displayed as units may be one physical unit or a plurality of physical units, may be located in one place, or may be distributed in a plurality of different places. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a readable storage medium. Based on such understanding, the technical solution of the embodiments of the present application may be essentially or a part contributing to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, including several instructions for causing a device (may be a single-chip microcomputer, a chip or the like) or a processor (processor) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read Only Memory (ROM), a random access memory (random access memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely a specific embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions within the technical scope of the present disclosure should be covered in the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (28)

1. A network connection method, applied to a first electronic device, the method comprising:
acquiring networking information of the first connection; the first connection is a communication connection between the first electronic device and a second electronic device, wherein the communication connection is established between the first electronic device and the second electronic device;
and sending the networking information of the first connection to a third electronic device, so that the third electronic device interacts with the second electronic device through the first connection by using the networking information of the first connection.
2. The method of claim 1, wherein prior to obtaining networking information for the first connection, the method further comprises:
acquiring one or more pieces of identification information;
establishing one or more communication connections with the second electronic device according to the one or more identification information; the one or more communication connections include the first connection.
3. The method of claim 1 or 2, wherein after sending the first connected networking information to a third electronic device, the method further comprises:
the first connection between the second electronic device and the first electronic device is disabled.
4. A method according to any of claims 1-3, characterized in that the networking information of the first connection is networking information that was sent for use by other devices and is not currently used by other devices, or that the networking information of the first connection is networking information that was not sent for use by other devices.
5. The method of claims 1-4, wherein after sending the first connected networking information to a third electronic device, the method further comprises:
a first message is received from a third electronic device, the first message being used to indicate that the third electronic device has established a second connection, the second connection being a communication connection between the third electronic device and the second electronic device.
6. The method of claim 5, wherein a first connection between the third electronic device and the second electronic device is reserved or a first connection between the third electronic device and the second electronic device is disabled after the second connection is established.
7. The method of claim 6, wherein after the first connection between the third electronic device and the second electronic device is failed, the method further comprises:
a second message is received from the third electronic device, the second message indicating that the first connection between the third electronic device and the second electronic device has failed.
8. The method of claim 7, wherein prior to receiving a second message from the third electronic device, the method further comprises:
and sending a third message to the third electronic device, wherein the third message is used for indicating that the first connection is invalid.
9. The method according to any one of claims 1-8, further comprising:
displaying a first interface, wherein the first interface comprises a first control;
detecting the operation of the user on the first control, and starting the function of network connection.
10. The method of any of claims 1-9, wherein in a wireless fidelity Wi-Fi network, the networking information of the first connection comprises any one or more of the following: the first identification information, a secret key used for transmitting a message through the first connection, an address of the second electronic equipment, a working frequency band corresponding to the first connection and a working channel corresponding to the first connection;
In a data network, the networking information includes any one or more of the following: a key, a user identification and the first identification information;
in a bluetooth scenario, networking information includes, but is not limited to: the first identification information and the secret key.
11. A network connection method, applied to a third electronic device, the method comprising:
receiving networking information of the first connection; the first connection is a communication connection between the first electronic device and the second electronic device, wherein the communication connection is established between the first electronic device and the second electronic device;
interaction with the second electronic device is performed over the first connection using networking information of the first connection.
12. The method of claim 11, wherein after receiving the networking information for the first connection, the method further comprises:
networking information of the first connection is stored.
13. The method of claim 12, wherein after storing the networking information for the first connection, the method further comprises:
disabling the first connection with the second electronic device;
when re-entering the network range of the second electronic device, interacting with the second electronic device through the first connection using networking information of the first connection.
14. The method of claim 13, wherein after disabling the first connection with the second electronic device, the method further comprises:
and sending a second message to the first electronic device, wherein the second message is used for indicating that the first connection between the third electronic device and the second electronic device is invalid.
15. The method of claim 11 or 12, wherein after receiving networking information for the first connection, the method further comprises:
establishing a second connection with the second electronic equipment by using the identification information of the second electronic equipment;
interact with the second electronic device through the second connection.
16. The method of claim 15, wherein after establishing the second connection with the second electronic device, the method further comprises:
a first message is sent to the first electronic device, with the first message being used to indicate that the second connection with the second electronic device has been established.
17. The method according to claim 15 or 16, wherein after establishing the second connection with the second electronic device, the method further comprises:
The first connection between the second electronic device and the first electronic device is disabled.
18. The method of claim 17, wherein disabling the first connection with the second electronic device comprises:
disabling the first connection when a first condition is satisfied;
the first condition includes any one or more of the following: after a second connection with the second electronic device is established, a first period of time is reached, and high-bandwidth communication connection is not needed for current service.
19. The method of any of claims 13-18, wherein prior to disabling the first connection with the second electronic device, the method further comprises:
a third message is received from the first electronic device, the third message indicating that the first connection is to be disabled.
20. The method according to any one of claims 11-19, further comprising:
receiving networking information of the third connection from the fourth electronic device;
and interacting with the second electronic device through the third connection using networking information of the third connection.
21. The method of claim 20, wherein after receiving the third connected networking information from the fourth electronic device, the method further comprises:
The first connection is disabled.
22. The method according to any one of claims 11-21, further comprising:
under the condition that the communication parameters of the second electronic equipment are changed, scanning to obtain networking information of fourth connection; the networking information of the fourth connection is matched with the communication parameters of the second electronic equipment;
interact with the second electronic device through the fourth connection.
23. The method according to any one of claims 11-21, further comprising:
receiving fourth connection networking information from a fourth electronic device, the fourth connection networking information being matched with the communication parameters of the second electronic device, in case the communication parameters of the second electronic device are changed;
interact with the second electronic device through the fourth connection.
24. The method according to any one of claims 11-23, further comprising:
displaying a second interface, wherein the second interface comprises a second control;
and detecting the operation of the user on the second control, and starting the function of network connection.
25. A computer readable storage medium comprising a program or instructions which, when executed, implement the method of any one of claims 1 to 10 or the method of any one of claims 11 to 24.
26. An electronic device, wherein the access device comprises a processor and a memory;
the memory is configured to store computer-executable instructions that, when executed by the electronic device, cause the electronic device to perform the method of any of claims 1-10.
27. An electronic device, wherein the access device comprises a processor and a memory;
the memory is configured to store computer-executable instructions that, when executed by the electronic device, cause the electronic device to perform the method of any of claims 11-24.
28. A network connection system, characterized in that the system comprises an electronic device according to claim 26 and an electronic device according to claim 27.
CN202211194288.1A 2022-09-28 2022-09-28 Network connection method, electronic equipment and system Pending CN117793678A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202211194288.1A CN117793678A (en) 2022-09-28 2022-09-28 Network connection method, electronic equipment and system
PCT/CN2023/120278 WO2024067334A1 (en) 2022-09-28 2023-09-21 Network connection method, electronic device, and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211194288.1A CN117793678A (en) 2022-09-28 2022-09-28 Network connection method, electronic equipment and system

Publications (1)

Publication Number Publication Date
CN117793678A true CN117793678A (en) 2024-03-29

Family

ID=90387933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211194288.1A Pending CN117793678A (en) 2022-09-28 2022-09-28 Network connection method, electronic equipment and system

Country Status (2)

Country Link
CN (1) CN117793678A (en)
WO (1) WO2024067334A1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2669780C2 (en) * 2014-09-05 2018-10-16 Телефонактиеболагет Лм Эрикссон (Пабл) Interaction and integration of various networks of radio access
CN109041036A (en) * 2018-10-29 2018-12-18 青岛海信传媒网络技术有限公司 WIFI connection method and equipment
CN110611905B (en) * 2019-08-09 2023-11-21 华为技术有限公司 Information sharing method, terminal device, storage medium, and computer program product
CN114615660A (en) * 2020-12-04 2022-06-10 华为技术有限公司 Access method, system and electronic equipment

Also Published As

Publication number Publication date
WO2024067334A1 (en) 2024-04-04

Similar Documents

Publication Publication Date Title
CA2911210C (en) Method and terminal for establishing communication connection
KR101117712B1 (en) Communication terminal for multiple standby and method for operating thereof
US9125238B2 (en) Wireless communication device, wireless communication method
US8929276B2 (en) Repeater WPS connection method and apparatus
EP3512118B1 (en) Method and device for transmitting response message
CN101621800B (en) Method for exchanging authentication information between wireless terminal and wireless router
US20190045476A1 (en) User device and message forwarding method
EP2723137B1 (en) Apparatus for setting up network for ip communication in mobile terminal
CN108886685B (en) Terminal matching method and device
CN105764058B (en) Method, device and system for accessing network
CN102215052B (en) Bluetooth radio and the management for integrating with communication network are applied
EP3007515B1 (en) Method, terminal, client and system for accessing wireless network
WO2009008627A2 (en) A method of establishing fast security association for handover between heterogeneous radio access networks
US9781579B2 (en) Method and device for realizing terminal WIFI talkback
KR20130093953A (en) Method and apparatus for supporting device to device communications
JP2015534404A (en) Channel switching method, apparatus, and device
CN105451368B (en) Communication method and device
CN111954199A (en) Wireless network access method, mobile terminal and readable storage medium
US10070289B1 (en) Client association for provisioning devices in a communication network
CN110519762A (en) A method of based on the shared roaming of Bluetooth pairing authentication information
US10390278B2 (en) Method for automatic switching between access points, and wireless routing device
KR20140113230A (en) Method for wireless link setup of access point utilizing multiple channels
CN103442450B (en) Wireless communications method and Wireless Telecom Equipment
CN117793678A (en) Network connection method, electronic equipment and system
JP2012216952A (en) Information processing device and communication control method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination