CN101917713A - Networking method of wireless network - Google Patents
Networking method of wireless network Download PDFInfo
- Publication number
- CN101917713A CN101917713A CN2010102212266A CN201010221226A CN101917713A CN 101917713 A CN101917713 A CN 101917713A CN 2010102212266 A CN2010102212266 A CN 2010102212266A CN 201010221226 A CN201010221226 A CN 201010221226A CN 101917713 A CN101917713 A CN 101917713A
- Authority
- CN
- China
- Prior art keywords
- networking
- slave
- request
- secret key
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a networking method of a wireless network, comprising the following steps of: identifying and judging whether a networking secret key is accessed through a host computer, wherein if the networking secret key is accessed, no access request is allowed to be sent, and if the networking secret key is not accessed, the access request is allowed to be sent ; identifying and judging whether a networking secret key is accessed through a slave computer, wherein if the networking secret key is accessed, no access request is allowed to be sent, and if the networking secret key is not accessed, the access request is allowed to be sent.. The networking method of the wireless network has the advantages of definite networking target, simple operation, safety, reliability and no need of user judgment and is more suitable for common users.
Description
Technical field
The present invention relates to RFDC, be specifically related to a kind of networking method of wireless network.
Background technology
Along with short-range radio and Wireless Personal Network, the development of WLAN (wireless local area network), wireless networking is also more and more universal.Known wireless networking technology all is to the equipment direct control, whether whether networking successfully reaches all needs user oneself to judge with the appointed equipment networking, and general device all has only the simple LED indication, the user seldom has relevant professional knowledge again, so be difficult to successful networking, more likely causing with the networking of non-target device mistake can't operate as normal and information-leakage.
Summary of the invention
The technical issues that need to address of the present invention are, how a kind of networking method of wireless network is provided, and point-and-shoot networking and with clearly defined objective, non-interference can be provided, not divulge a secret, more can be with non-target device networking.
The above-mentioned technical problem of the present invention solves like this: make up a kind of networking method of wireless network, adopt the networking secret key, comprise step:
The identification of A main frame judges whether to insert described networking secret key, is not allow any networking request, otherwise allows the request of networking.
According to network-building method provided by the invention, also comprise step:
The identification of B slave judges whether to insert described networking secret key, is to allow to send the request of networking, otherwise does not allow to send the request of networking.
According to network-building method provided by the invention, described key can transmit the screening password between principal and subordinate's machine also can not transmit the screening password, that is:
The described networking request that is allowed in the ㈠ steps A is to carry the networking request of specifying authorization code; Described authorization code is built in the networking secret key or by slave and produces according to described networking secret key, guarantees that further non-target device adds;
Or the described networking request that is allowed in the ㈡ steps A do not carry the screening password, simple and safe reliable networking when at this moment guaranteeing the complete use of main frame of the present invention and slave, but can't limit other non-slaves of the present invention.
According to network-building method provided by the invention, add slave like this: take off and insert described networking key on the slave that needs screening from main frame, in the normal communication distance of principal and subordinate's machine, the slave that inserts described networking key sends the networking request instruction to main frame, begin normal networking flow process, as: after main frame is received and is required to add the request of network, passback confirmation code and distributing equipment number are given slave, after slave is received confirmation code and device number, main frame is given in passback again, main frame is to receive correct confirmation code and device number, and screening is finished, and has corresponding indication to tell the success of user's screening.
According to network-building method provided by the invention, include, but are not limited to following dual mode:
㈠ is automatically foolproof: slave identification judges whether to insert described networking secret key, is the request of networking that then sends automatically; Described networking flow process also is full automatic;
The common interactive mode of ㈡: slave identification judges whether to insert described networking secret key, is whether then automatic ejection sends the request menu option that networks; Described networking flow process comprises whether the automatic ejection of main frame accepts networking request menu option, and this common interactive mode requires log equipment that display screen must be arranged.
According to network-building method provided by the invention, described key can be slave distributing equipment number, also can not be slave distributing equipment number, that is: described networking key be the slave that inserts it distributing equipment number or be the slave distributing equipment of this access networking key number in the networking flow process by main frame initiatively.
According to network-building method provided by the invention, described networking secret key includes, but are not limited to by wireless RFID communication interface, wired RS232 communication interface, wired USB communication interface, wired RS485 communication interface, wired I2C communication interface, wired SPI communication interface, any in wired UART communication interface and the simple GPIO communication interface is connected with main frame or slave.
According to network-building method provided by the invention, described wireless network include, but are not limited to is Wireless Personal Network, WLAN (wireless local area network), and other non-standard short-distance wireless communications in any.
Networking method of wireless network provided by the invention, networking is with clearly defined objective, do not interfere with each other during networking, does not divulge a secret, and is simple to operate, safe and reliable simultaneously, need not the user judge, is more suitable for using in the general user.
Description of drawings
Further the present invention is described in detail below in conjunction with the drawings and specific embodiments:
Fig. 1 is a specific embodiment of the invention wireless network architecture schematic diagram;
Fig. 2 is a corresponding networking schematic flow sheet in the specific embodiment of the invention main frame;
Fig. 3 is a corresponding networking schematic flow sheet in the specific embodiment of the invention slave.
Embodiment
As shown in Figure 1, specific embodiment of the invention wireless network is made up of a main frame of the present invention (hereinafter to be referred as main frame) and some slaves of the present invention (hereinafter to be referred as slave), and main frame inserts networking secret key of the present invention by USB interface in the time of usually.
As shown in Figure 2, in the specific embodiment of the invention main frame, its networking control program specifically may further comprise the steps:
201) judging whether to detect the networking secret key, not, enter next step, is to return normal mode of operation;
202) judging whether to receive device request and add network requests, not, continue to receive, is to enter next step;
203) the dispatch network device number is given slave, begins to send to confirm;
204) judging whether to receive the slave screening and become function signal, is to enter next step;
205) show the success of slave screening.
As shown in Figure 3, in the specific embodiment of the invention slave, its networking control program specifically may further comprise the steps:
301) judging whether to detect the networking secret key, not, enter next step, is to return positive normal open mode of operation;
302) send the adding network requests;
303) judging whether to receive network equipment number and affirmation, is to enter next step;
304) transmission adds into function signal;
305) show the screening success;
306) judge whether to detect the networking secret key, not, return step 305), be to enter normal mode of operation;
In the above-mentioned normal mode of operation, main frame of the present invention does not receive/allows any networking request, and slave of the present invention does not send the request of networking.
At last, specifically use detailed description, comprising in conjunction with the inventive method:
1. on key is inserted on the main frame all the time during operate as normal, and slave is not insert key, and this moment, main frame and slave all were in normal operating conditions, can not comprehend any screening request;
2. when slave need be with the main frame networking, key taken off from main frame be inserted on the slave of wanting screening;
3. the main frame of at this moment not inserting key is in and allows to add net state, and the slave of plugging key also is in the state that allows to send the screening request;
4. in main frame and the normal communication distance of slave, send out from chance and to require screening to instruct to main frame, after main frame is received the request that requires screening, passback confirmation code and distributing equipment number are given slave, after slave was received confirmation code and device number, main frame was given in passback again, and main frame is to receive correct confirmation code and device number, screening is finished, and has corresponding indication to tell the success of user's screening;
5. as run into special circumstances such as interference, the success screening of failing can repeat 4 to try again;
6. after the screening success key taken off and is inserted on the main frame, main frame and slave can be in same network normal communication;
7. need be added in this network repeating step 2-6 if any other slave.
The above only is preferred embodiment of the present invention, and all equalizations of being done according to claim scope of the present invention change and modify, and all should belong to the covering scope of claim of the present invention.
Claims (10)
1. a networking method of wireless network is characterized in that, adopts the networking secret key, comprising:
The identification of A main frame judges whether to insert described networking secret key, is not allow any networking request, otherwise allows the request of networking.
2. according to the described network-building method of claim 1, it is characterized in that, also comprise:
The identification of B slave judges whether to insert described networking secret key, is to allow to send the request of networking, otherwise does not allow to send the request of networking.
3. according to the described network-building method of claim 1, it is characterized in that the described networking request that is allowed in the steps A is to carry the networking request of specifying authorization code.
4. according to the described network-building method of claim 3, it is characterized in that described authorization code is built in the networking secret key or by slave and produces according to described networking secret key.
5. according to claim 1 or 2 described network-building methods, it is characterized in that, add slave like this: take off and insert described networking key on the slave that needs screening from main frame, in the normal communication distance of principal and subordinate's machine, the slave that inserts described networking key sends the networking request instruction to main frame, begins normal networking flow process.
6. according to the described network-building method of claim 5, it is characterized in that slave identification judges whether to insert described networking secret key, is whether then automatic ejection sends the request menu option that networks; Described networking flow process comprises whether the automatic ejection of main frame accepts networking request menu option.
7. according to the described network-building method of claim 5, it is characterized in that slave identification judges whether to insert described networking secret key, is the request of networking that then sends automatically; Described networking flow process also is full automatic.
8. according to each described network-building method of claim 5, it is characterized in that described networking key is the slave that inserts it distributing equipment number or be the slave distributing equipment of this access networking key number in the networking flow process by main frame initiatively.
9. according to the described network-building method of claim 1, it is characterized in that, described networking secret key is by wireless RFID communication interface, wired RS232 communication interface, wired USB communication interface, wired RS485 communication interface, wired I2C communication interface, wired SPI communication interface, any in wired UART communication interface and the simple GPIO communication interface is connected with main frame or slave.
10. according to the described network-building method of claim 1, it is characterized in that, described wireless network be Wireless Personal Network, WLAN (wireless local area network), and other non-standard short-distance wireless communications in any.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102212266A CN101917713A (en) | 2010-07-08 | 2010-07-08 | Networking method of wireless network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102212266A CN101917713A (en) | 2010-07-08 | 2010-07-08 | Networking method of wireless network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101917713A true CN101917713A (en) | 2010-12-15 |
Family
ID=43325074
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010102212266A Pending CN101917713A (en) | 2010-07-08 | 2010-07-08 | Networking method of wireless network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101917713A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107465998A (en) * | 2017-08-02 | 2017-12-12 | 青岛朗思信息科技有限公司 | Multi Date Acquisition System |
CN107483494A (en) * | 2017-09-20 | 2017-12-15 | 宁波工程学院 | A kind of automatic search of internal home network equipment and matching process |
CN110944370A (en) * | 2019-02-19 | 2020-03-31 | 深圳梧童科技有限公司 | Wireless networking system and method |
CN113225139A (en) * | 2021-03-23 | 2021-08-06 | 深之蓝(天津)水下智能科技有限公司 | Underwater real-time bidirectional wireless communication method and device, electronic device and underwater equipment |
CN114739460A (en) * | 2022-04-25 | 2022-07-12 | 重庆大学 | Self-powered wireless temperature/acceleration sensor device with filtering algorithm |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1333617A (en) * | 2000-07-06 | 2002-01-30 | 三星电子株式会社 | MAC address based telecommunication limiting method |
CN1812417A (en) * | 2006-02-28 | 2006-08-02 | 西安西电捷通无线网络通信有限公司 | Method for testing safety switch-in protocol conformity of turn-on point and system thereof |
CN1988552A (en) * | 2005-12-20 | 2007-06-27 | 中国电信股份有限公司 | Method for automatic identifying and configurating terminal |
-
2010
- 2010-07-08 CN CN2010102212266A patent/CN101917713A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1333617A (en) * | 2000-07-06 | 2002-01-30 | 三星电子株式会社 | MAC address based telecommunication limiting method |
CN1988552A (en) * | 2005-12-20 | 2007-06-27 | 中国电信股份有限公司 | Method for automatic identifying and configurating terminal |
CN1812417A (en) * | 2006-02-28 | 2006-08-02 | 西安西电捷通无线网络通信有限公司 | Method for testing safety switch-in protocol conformity of turn-on point and system thereof |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107465998A (en) * | 2017-08-02 | 2017-12-12 | 青岛朗思信息科技有限公司 | Multi Date Acquisition System |
CN107483494A (en) * | 2017-09-20 | 2017-12-15 | 宁波工程学院 | A kind of automatic search of internal home network equipment and matching process |
CN107483494B (en) * | 2017-09-20 | 2020-06-19 | 宁波工程学院 | Automatic searching and matching method for indoor network equipment |
CN110944370A (en) * | 2019-02-19 | 2020-03-31 | 深圳梧童科技有限公司 | Wireless networking system and method |
CN113225139A (en) * | 2021-03-23 | 2021-08-06 | 深之蓝(天津)水下智能科技有限公司 | Underwater real-time bidirectional wireless communication method and device, electronic device and underwater equipment |
CN113225139B (en) * | 2021-03-23 | 2022-08-19 | 深之蓝(天津)水下智能科技有限公司 | Underwater real-time two-way wireless communication method and device, electronic device and underwater equipment |
CN114739460A (en) * | 2022-04-25 | 2022-07-12 | 重庆大学 | Self-powered wireless temperature/acceleration sensor device with filtering algorithm |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107291068B (en) | Vehicle diagnostic method and vehicle diagnostic apparatus | |
CN103385013B (en) | Method for the wireless security communication between enabled device | |
CN103916537B (en) | Bluetooth device and quick pairing method and system thereof | |
CN103365688B (en) | A kind of method for automatic installation and synchronization of software between Android intelligent devices | |
CN101917713A (en) | Networking method of wireless network | |
CN209000096U (en) | A kind of separate type access control system based on recognition of face | |
EP3214891B1 (en) | Switching-on method, base station and storage medium | |
CN102385519A (en) | Method and system for installing software | |
WO2014089229A1 (en) | Apparatus and methods for utilizing a wireless charger in a wireless docking environment | |
CN102118186A (en) | Connection method of Bluetooth device | |
CN106341834A (en) | Internet-of-things device configuration method, Internet-of-things device configuration apparatus, Internet-of-things device configuration system and Internet-of-things device | |
CN105357214A (en) | Remote control method, remote control device, terminal and remote control system | |
EP2961211B1 (en) | Method and device for pairing devices | |
CN102833876A (en) | Wireless communication device | |
CN103019981B (en) | Signal converting control method and signal adapting device | |
CN103517272B (en) | Wireless network user authentication system and wireless network connection method thereof | |
CN104540091A (en) | Automatic pairing system and automatic pairing method based on bluetooth equipment | |
CN102840992B (en) | Satellite-borne self-testing method based on satellite network | |
CN104247484B (en) | Terminal installation, communication means, computer-readable recording medium and communication system | |
CN103312382A (en) | Data transmission method, operating equipment and system | |
CN105516889A (en) | Bluetooth connection method and terminal | |
JP2007282052A5 (en) | ||
CN103514389A (en) | Equipment authentication method and device | |
CN103781098B (en) | Wireless network adapter and its self-configuration method | |
US20080279164A1 (en) | Method for connecting to a wireless network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20101215 |