CN101917713A - Networking method of wireless network - Google Patents

Networking method of wireless network Download PDF

Info

Publication number
CN101917713A
CN101917713A CN2010102212266A CN201010221226A CN101917713A CN 101917713 A CN101917713 A CN 101917713A CN 2010102212266 A CN2010102212266 A CN 2010102212266A CN 201010221226 A CN201010221226 A CN 201010221226A CN 101917713 A CN101917713 A CN 101917713A
Authority
CN
China
Prior art keywords
networking
slave
request
secret key
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010102212266A
Other languages
Chinese (zh)
Inventor
夏煒樑
钱三保
雷凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Computime Electronics (shenzhen) Co Ltd
Original Assignee
Computime Electronics (shenzhen) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Computime Electronics (shenzhen) Co Ltd filed Critical Computime Electronics (shenzhen) Co Ltd
Priority to CN2010102212266A priority Critical patent/CN101917713A/en
Publication of CN101917713A publication Critical patent/CN101917713A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a networking method of a wireless network, comprising the following steps of: identifying and judging whether a networking secret key is accessed through a host computer, wherein if the networking secret key is accessed, no access request is allowed to be sent, and if the networking secret key is not accessed, the access request is allowed to be sent ; identifying and judging whether a networking secret key is accessed through a slave computer, wherein if the networking secret key is accessed, no access request is allowed to be sent, and if the networking secret key is not accessed, the access request is allowed to be sent.. The networking method of the wireless network has the advantages of definite networking target, simple operation, safety, reliability and no need of user judgment and is more suitable for common users.

Description

A kind of networking method of wireless network
Technical field
The present invention relates to RFDC, be specifically related to a kind of networking method of wireless network.
Background technology
Along with short-range radio and Wireless Personal Network, the development of WLAN (wireless local area network), wireless networking is also more and more universal.Known wireless networking technology all is to the equipment direct control, whether whether networking successfully reaches all needs user oneself to judge with the appointed equipment networking, and general device all has only the simple LED indication, the user seldom has relevant professional knowledge again, so be difficult to successful networking, more likely causing with the networking of non-target device mistake can't operate as normal and information-leakage.
Summary of the invention
The technical issues that need to address of the present invention are, how a kind of networking method of wireless network is provided, and point-and-shoot networking and with clearly defined objective, non-interference can be provided, not divulge a secret, more can be with non-target device networking.
The above-mentioned technical problem of the present invention solves like this: make up a kind of networking method of wireless network, adopt the networking secret key, comprise step:
The identification of A main frame judges whether to insert described networking secret key, is not allow any networking request, otherwise allows the request of networking.
According to network-building method provided by the invention, also comprise step:
The identification of B slave judges whether to insert described networking secret key, is to allow to send the request of networking, otherwise does not allow to send the request of networking.
According to network-building method provided by the invention, described key can transmit the screening password between principal and subordinate's machine also can not transmit the screening password, that is:
The described networking request that is allowed in the ㈠ steps A is to carry the networking request of specifying authorization code; Described authorization code is built in the networking secret key or by slave and produces according to described networking secret key, guarantees that further non-target device adds;
Or the described networking request that is allowed in the ㈡ steps A do not carry the screening password, simple and safe reliable networking when at this moment guaranteeing the complete use of main frame of the present invention and slave, but can't limit other non-slaves of the present invention.
According to network-building method provided by the invention, add slave like this: take off and insert described networking key on the slave that needs screening from main frame, in the normal communication distance of principal and subordinate's machine, the slave that inserts described networking key sends the networking request instruction to main frame, begin normal networking flow process, as: after main frame is received and is required to add the request of network, passback confirmation code and distributing equipment number are given slave, after slave is received confirmation code and device number, main frame is given in passback again, main frame is to receive correct confirmation code and device number, and screening is finished, and has corresponding indication to tell the success of user's screening.
According to network-building method provided by the invention, include, but are not limited to following dual mode:
㈠ is automatically foolproof: slave identification judges whether to insert described networking secret key, is the request of networking that then sends automatically; Described networking flow process also is full automatic;
The common interactive mode of ㈡: slave identification judges whether to insert described networking secret key, is whether then automatic ejection sends the request menu option that networks; Described networking flow process comprises whether the automatic ejection of main frame accepts networking request menu option, and this common interactive mode requires log equipment that display screen must be arranged.
According to network-building method provided by the invention, described key can be slave distributing equipment number, also can not be slave distributing equipment number, that is: described networking key be the slave that inserts it distributing equipment number or be the slave distributing equipment of this access networking key number in the networking flow process by main frame initiatively.
According to network-building method provided by the invention, described networking secret key includes, but are not limited to by wireless RFID communication interface, wired RS232 communication interface, wired USB communication interface, wired RS485 communication interface, wired I2C communication interface, wired SPI communication interface, any in wired UART communication interface and the simple GPIO communication interface is connected with main frame or slave.
According to network-building method provided by the invention, described wireless network include, but are not limited to is Wireless Personal Network, WLAN (wireless local area network), and other non-standard short-distance wireless communications in any.
Networking method of wireless network provided by the invention, networking is with clearly defined objective, do not interfere with each other during networking, does not divulge a secret, and is simple to operate, safe and reliable simultaneously, need not the user judge, is more suitable for using in the general user.
Description of drawings
Further the present invention is described in detail below in conjunction with the drawings and specific embodiments:
Fig. 1 is a specific embodiment of the invention wireless network architecture schematic diagram;
Fig. 2 is a corresponding networking schematic flow sheet in the specific embodiment of the invention main frame;
Fig. 3 is a corresponding networking schematic flow sheet in the specific embodiment of the invention slave.
Embodiment
As shown in Figure 1, specific embodiment of the invention wireless network is made up of a main frame of the present invention (hereinafter to be referred as main frame) and some slaves of the present invention (hereinafter to be referred as slave), and main frame inserts networking secret key of the present invention by USB interface in the time of usually.
As shown in Figure 2, in the specific embodiment of the invention main frame, its networking control program specifically may further comprise the steps:
201) judging whether to detect the networking secret key, not, enter next step, is to return normal mode of operation;
202) judging whether to receive device request and add network requests, not, continue to receive, is to enter next step;
203) the dispatch network device number is given slave, begins to send to confirm;
204) judging whether to receive the slave screening and become function signal, is to enter next step;
205) show the success of slave screening.
As shown in Figure 3, in the specific embodiment of the invention slave, its networking control program specifically may further comprise the steps:
301) judging whether to detect the networking secret key, not, enter next step, is to return positive normal open mode of operation;
302) send the adding network requests;
303) judging whether to receive network equipment number and affirmation, is to enter next step;
304) transmission adds into function signal;
305) show the screening success;
306) judge whether to detect the networking secret key, not, return step 305), be to enter normal mode of operation;
In the above-mentioned normal mode of operation, main frame of the present invention does not receive/allows any networking request, and slave of the present invention does not send the request of networking.
At last, specifically use detailed description, comprising in conjunction with the inventive method:
1. on key is inserted on the main frame all the time during operate as normal, and slave is not insert key, and this moment, main frame and slave all were in normal operating conditions, can not comprehend any screening request;
2. when slave need be with the main frame networking, key taken off from main frame be inserted on the slave of wanting screening;
3. the main frame of at this moment not inserting key is in and allows to add net state, and the slave of plugging key also is in the state that allows to send the screening request;
4. in main frame and the normal communication distance of slave, send out from chance and to require screening to instruct to main frame, after main frame is received the request that requires screening, passback confirmation code and distributing equipment number are given slave, after slave was received confirmation code and device number, main frame was given in passback again, and main frame is to receive correct confirmation code and device number, screening is finished, and has corresponding indication to tell the success of user's screening;
5. as run into special circumstances such as interference, the success screening of failing can repeat 4 to try again;
6. after the screening success key taken off and is inserted on the main frame, main frame and slave can be in same network normal communication;
7. need be added in this network repeating step 2-6 if any other slave.
The above only is preferred embodiment of the present invention, and all equalizations of being done according to claim scope of the present invention change and modify, and all should belong to the covering scope of claim of the present invention.

Claims (10)

1. a networking method of wireless network is characterized in that, adopts the networking secret key, comprising:
The identification of A main frame judges whether to insert described networking secret key, is not allow any networking request, otherwise allows the request of networking.
2. according to the described network-building method of claim 1, it is characterized in that, also comprise:
The identification of B slave judges whether to insert described networking secret key, is to allow to send the request of networking, otherwise does not allow to send the request of networking.
3. according to the described network-building method of claim 1, it is characterized in that the described networking request that is allowed in the steps A is to carry the networking request of specifying authorization code.
4. according to the described network-building method of claim 3, it is characterized in that described authorization code is built in the networking secret key or by slave and produces according to described networking secret key.
5. according to claim 1 or 2 described network-building methods, it is characterized in that, add slave like this: take off and insert described networking key on the slave that needs screening from main frame, in the normal communication distance of principal and subordinate's machine, the slave that inserts described networking key sends the networking request instruction to main frame, begins normal networking flow process.
6. according to the described network-building method of claim 5, it is characterized in that slave identification judges whether to insert described networking secret key, is whether then automatic ejection sends the request menu option that networks; Described networking flow process comprises whether the automatic ejection of main frame accepts networking request menu option.
7. according to the described network-building method of claim 5, it is characterized in that slave identification judges whether to insert described networking secret key, is the request of networking that then sends automatically; Described networking flow process also is full automatic.
8. according to each described network-building method of claim 5, it is characterized in that described networking key is the slave that inserts it distributing equipment number or be the slave distributing equipment of this access networking key number in the networking flow process by main frame initiatively.
9. according to the described network-building method of claim 1, it is characterized in that, described networking secret key is by wireless RFID communication interface, wired RS232 communication interface, wired USB communication interface, wired RS485 communication interface, wired I2C communication interface, wired SPI communication interface, any in wired UART communication interface and the simple GPIO communication interface is connected with main frame or slave.
10. according to the described network-building method of claim 1, it is characterized in that, described wireless network be Wireless Personal Network, WLAN (wireless local area network), and other non-standard short-distance wireless communications in any.
CN2010102212266A 2010-07-08 2010-07-08 Networking method of wireless network Pending CN101917713A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010102212266A CN101917713A (en) 2010-07-08 2010-07-08 Networking method of wireless network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102212266A CN101917713A (en) 2010-07-08 2010-07-08 Networking method of wireless network

Publications (1)

Publication Number Publication Date
CN101917713A true CN101917713A (en) 2010-12-15

Family

ID=43325074

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102212266A Pending CN101917713A (en) 2010-07-08 2010-07-08 Networking method of wireless network

Country Status (1)

Country Link
CN (1) CN101917713A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107465998A (en) * 2017-08-02 2017-12-12 青岛朗思信息科技有限公司 Multi Date Acquisition System
CN107483494A (en) * 2017-09-20 2017-12-15 宁波工程学院 A kind of automatic search of internal home network equipment and matching process
CN110944370A (en) * 2019-02-19 2020-03-31 深圳梧童科技有限公司 Wireless networking system and method
CN113225139A (en) * 2021-03-23 2021-08-06 深之蓝(天津)水下智能科技有限公司 Underwater real-time bidirectional wireless communication method and device, electronic device and underwater equipment
CN114739460A (en) * 2022-04-25 2022-07-12 重庆大学 Self-powered wireless temperature/acceleration sensor device with filtering algorithm

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1333617A (en) * 2000-07-06 2002-01-30 三星电子株式会社 MAC address based telecommunication limiting method
CN1812417A (en) * 2006-02-28 2006-08-02 西安西电捷通无线网络通信有限公司 Method for testing safety switch-in protocol conformity of turn-on point and system thereof
CN1988552A (en) * 2005-12-20 2007-06-27 中国电信股份有限公司 Method for automatic identifying and configurating terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1333617A (en) * 2000-07-06 2002-01-30 三星电子株式会社 MAC address based telecommunication limiting method
CN1988552A (en) * 2005-12-20 2007-06-27 中国电信股份有限公司 Method for automatic identifying and configurating terminal
CN1812417A (en) * 2006-02-28 2006-08-02 西安西电捷通无线网络通信有限公司 Method for testing safety switch-in protocol conformity of turn-on point and system thereof

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107465998A (en) * 2017-08-02 2017-12-12 青岛朗思信息科技有限公司 Multi Date Acquisition System
CN107483494A (en) * 2017-09-20 2017-12-15 宁波工程学院 A kind of automatic search of internal home network equipment and matching process
CN107483494B (en) * 2017-09-20 2020-06-19 宁波工程学院 Automatic searching and matching method for indoor network equipment
CN110944370A (en) * 2019-02-19 2020-03-31 深圳梧童科技有限公司 Wireless networking system and method
CN113225139A (en) * 2021-03-23 2021-08-06 深之蓝(天津)水下智能科技有限公司 Underwater real-time bidirectional wireless communication method and device, electronic device and underwater equipment
CN113225139B (en) * 2021-03-23 2022-08-19 深之蓝(天津)水下智能科技有限公司 Underwater real-time two-way wireless communication method and device, electronic device and underwater equipment
CN114739460A (en) * 2022-04-25 2022-07-12 重庆大学 Self-powered wireless temperature/acceleration sensor device with filtering algorithm

Similar Documents

Publication Publication Date Title
CN107291068B (en) Vehicle diagnostic method and vehicle diagnostic apparatus
CN103385013B (en) Method for the wireless security communication between enabled device
CN103916537B (en) Bluetooth device and quick pairing method and system thereof
CN103365688B (en) A kind of method for automatic installation and synchronization of software between Android intelligent devices
CN101917713A (en) Networking method of wireless network
CN209000096U (en) A kind of separate type access control system based on recognition of face
EP3214891B1 (en) Switching-on method, base station and storage medium
CN102385519A (en) Method and system for installing software
WO2014089229A1 (en) Apparatus and methods for utilizing a wireless charger in a wireless docking environment
CN102118186A (en) Connection method of Bluetooth device
CN106341834A (en) Internet-of-things device configuration method, Internet-of-things device configuration apparatus, Internet-of-things device configuration system and Internet-of-things device
CN105357214A (en) Remote control method, remote control device, terminal and remote control system
EP2961211B1 (en) Method and device for pairing devices
CN102833876A (en) Wireless communication device
CN103019981B (en) Signal converting control method and signal adapting device
CN103517272B (en) Wireless network user authentication system and wireless network connection method thereof
CN104540091A (en) Automatic pairing system and automatic pairing method based on bluetooth equipment
CN102840992B (en) Satellite-borne self-testing method based on satellite network
CN104247484B (en) Terminal installation, communication means, computer-readable recording medium and communication system
CN103312382A (en) Data transmission method, operating equipment and system
CN105516889A (en) Bluetooth connection method and terminal
JP2007282052A5 (en)
CN103514389A (en) Equipment authentication method and device
CN103781098B (en) Wireless network adapter and its self-configuration method
US20080279164A1 (en) Method for connecting to a wireless network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20101215