CN104717601A - Wireless network login method and system of wireless monitoring device - Google Patents

Wireless network login method and system of wireless monitoring device Download PDF

Info

Publication number
CN104717601A
CN104717601A CN201410419665.6A CN201410419665A CN104717601A CN 104717601 A CN104717601 A CN 104717601A CN 201410419665 A CN201410419665 A CN 201410419665A CN 104717601 A CN104717601 A CN 104717601A
Authority
CN
China
Prior art keywords
coding
frequency
network
sound wave
characters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410419665.6A
Other languages
Chinese (zh)
Other versions
CN104717601B (en
Inventor
杨闯
刘焕云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN ZMODO TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN ZMODO TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN ZMODO TECHNOLOGY Co Ltd filed Critical SHENZHEN ZMODO TECHNOLOGY Co Ltd
Priority to CN201410419665.6A priority Critical patent/CN104717601B/en
Publication of CN104717601A publication Critical patent/CN104717601A/en
Application granted granted Critical
Publication of CN104717601B publication Critical patent/CN104717601B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention provides a wireless network login method and system of a wireless monitoring device. The method includes the steps that a terminal obtains network identification and a network password, wherein the network identification and the network password each comprise at least one character; the terminal maps the network identification and the network password into corresponding sound wave frequencies, and voice data are generated according to the sound wave frequencies; the terminal converts the voice data into sound signals and sends out the sound signals; the wireless monitoring device receives the sound signals and decodes the sound signals to obtain the network identification and the network password; the wireless monitoring device logs in the corresponding wireless network according to the network identification and the network password. By means of the method and system, the wireless network login efficiency of the wireless monitoring device is improved.

Description

Wireless monitoring equipment logs in the method and system of wireless network
Technical field
The present invention relates to wireless communication technology field, particularly relate to the method and system that a kind of wireless monitoring equipment logs in wireless network.
Background technology
Along with socioeconomic development, the security protection consciousness of people is more and more stronger, and video monitoring plays a very important role in safety precaution, and the watch-dog on market comprises wired watch-dog and wireless monitoring equipment.The just possibility Telnet of the necessary connected with network cable of wired monitoring equipment, and wireless monitoring equipment only needs access of radio network conveniently can realize Telnet.Wireless monitoring equipment, owing to not needing loaded down with trivial details network layout, is installed simple, easy to use and be greatly favored by consumers.
The method that radio communication set up by subscriber equipment and watch-dog need be carried out following two steps and be operated: 1) be configured the network information of wireless monitoring equipment and make wireless monitoring equipment sign in wireless network; 2) wireless monitoring equipment in user equipment scans wireless network also adds.
The method that traditional wireless monitoring equipment logs in wireless network is: by Web broadcast mode and U mouth drive arrangements mode, the network information to wireless monitoring equipment is configured, and wireless monitoring equipment is signed in in corresponding wireless network.Wherein, Web broadcast mode and U mouth drive arrangements mode all need just can complete layoutprocedure by the configuration software of specialty on a user device, make mistakes to prevent configuration, usually certain training to be carried out to user, subscriber equipment and watch-dog just can be made to set up radio communication owing to needing the special configuration software of exploitation or driving, traditional wireless monitoring equipment logs in wireless network methods and is configured too complexity to the network information of wireless monitoring equipment, wireless monitoring equipment is caused to sign in the inefficiency of wireless network, extend the R&D cycle of wireless monitoring equipment, increase development difficulty.
Summary of the invention
Based on this, be necessary for above-mentioned technical problem, provide a kind of network information to configure the method and system of simple wireless monitoring equipment login wireless network.
Wireless monitoring equipment logs in a method for wireless network, and described method comprises:
Terminal obtains network identity and network cipher, and described network identity and network cipher comprise at least one character respectively;
Described network identity and network cipher are mapped as corresponding frequency of sound wave by terminal, and generate voice data according to described frequency of sound wave;
Described voice data is converted to voice signal and sends by terminal;
Wireless monitoring equipment receives described voice signal, carries out decoding obtain described network identity and network cipher to described voice signal;
Wireless monitoring equipment signs in corresponding wireless network according to described network identity and network cipher.
Wherein in an embodiment, the identification number that described frequency of sound wave is corresponding unique; Described network identity and network cipher are mapped as corresponding frequency of sound wave by described terminal, and generate the step of voice data according to described frequency of sound wave, comprising:
According to the mapping table of character and the coding preset, obtain the first coding corresponding to described network identity and corresponding second the encoding of network cipher;
Described identification number according to comprising in described first coding obtains corresponding multiple first frequency of sound wave, and obtains corresponding multiple second frequency of sound wave according to the described identification number comprised in described second coding;
Voice data is generated according to described first frequency of sound wave and described second frequency of sound wave.
Wherein in an embodiment, described network identity and network cipher are mapped as corresponding frequency of sound wave by terminal, and generate the step of voice data according to described frequency of sound wave, comprising:
According to the mapping table of character and the coding preset, obtain the first coding corresponding to described network identity and corresponding second the encoding of network cipher;
The data of preset data form are generated according to the second number of characters comprised in the first number of characters comprised in described first coding, the second coding, network identity, network cipher and default marker bit;
Corresponding multiple 3rd frequency of sound wave are obtained according to the identification number comprised in described data;
Voice data is generated according to described 3rd frequency of sound wave.
Wherein in an embodiment, in described preset data form, comprise start mark position, stop flag position, repeats bits fractionation marker bit and spaced markings position; Generate the step of the data of preset data form according to the second number of characters comprised in the first number of characters comprised in described first coding, the second coding, network identity, network cipher and default marker bit, comprising:
The start mark number preset, stop flag number, repeats bits are split mark number and spaced markings number insert start mark position in order successively, stop flag position, repeats bits split marker bit and spaced markings position; Obtain the second number of characters coding that the first number of characters corresponding to described first number of characters is encoded and the second number of characters is corresponding;
First number of characters coding is inserted between start mark number and first encode, the second number of characters coding is inserted between spaced markings position and second encodes;
Obtaining the first check digit by carrying out verify calculation to the first coding, verify calculation being carried out to the second coding and obtains the second check digit;
Obtain the first check code corresponding to the first check digit and the second check code corresponding to the second check digit;
First check code is inserted between the first coding and spaced markings number, the second check code is inserted between the second coding and end mark number.
Wherein in an embodiment, the described step generating voice data according to described 3rd frequency of sound wave, comprising:
Obtain sample frequency and transmitting time, described transmitting time refers to the time that transmission the 3rd frequency of sound wave continues;
Sampling number is calculated by sample frequency and transmitting time;
The sampling time interval in unit period is calculated by described sample frequency, the 3rd frequency of sound wave;
Generating formula by the voice data preset utilizes employing to count and sampling time interval generation voice data.
Wherein in an embodiment, described wireless monitoring equipment receives described voice signal, and decoding to described voice signal obtains the step of described network identity and network cipher, comprising:
The voice signal that receiving terminal sends, and voice signal is converted to voice data;
Fast Fourier transform is carried out to described voice data segmentation, and the 3rd frequency of sound wave obtained after recording fast Fourier change;
Obtain the 3rd coding that described 3rd frequency of sound wave is corresponding, and according to the first check code in the 3rd coding and the second check code, described 3rd coding is verified;
If verification is passed through, then decoding is carried out to the 3rd coding and obtain the first coding and the second coding;
According to the mapping table between default character and coding, obtain the network cipher of network identity corresponding to described first coding and the second coding correspondence.
Wireless monitoring equipment logs in a system for wireless network, and described system comprises terminal and wireless monitoring equipment, and wherein said terminal comprises:
Network information acquisition module, for obtaining network identity and network cipher, described network identity and network cipher comprise at least one character respectively;
Data generation module, for described network identity and described network cipher being mapped as corresponding frequency of sound wave, and generates voice data according to described frequency of sound wave;
Signal transmitting module, for described terminal also for described voice data being converted to voice signal and sending;
Described wireless monitoring equipment comprises:
Signal decoding module, for receiving described voice signal, carrying out decoding to described voice signal and obtaining described network identity and network cipher;
Network entry module, for logging in corresponding wireless network according to described network identity and network cipher.
Wherein in an embodiment, the identification number that described frequency of sound wave is corresponding unique; Described data generation module comprises:
Coding acquisition module, for the mapping table according to character and the coding preset, obtains the first coding corresponding to described network identity and corresponding second the encoding of network cipher;
Frequency acquisition module, for obtaining corresponding multiple first frequency of sound wave according to the described identification number comprised in described first coding, and obtains corresponding multiple second frequency of sound wave according to the described identification number comprised in described second coding;
First voice data generation module, for generating voice data according to described first frequency of sound wave and described second frequency of sound wave.
Wherein in an embodiment, described in root, data generation module also comprises:
Coding acquisition module, for the mapping table according to character and the coding preset, obtains the first coding corresponding to described network identity and corresponding second the encoding of network cipher;
Formatted data generation module, for generating the data of preset data form according to the second number of characters comprised in the first number of characters comprised in described first coding, the second coding, network identity, network cipher and default marker bit;
Frequency of sound wave acquisition module, for obtaining corresponding multiple 3rd frequency of sound wave according to the identification number comprised in described data;
Second audio data generation module, for generating voice data according to described 3rd frequency of sound wave.
Wherein in an embodiment, in described preset data form, comprise start mark position, stop flag position, repeats bits fractionation marker bit and spaced markings position; Described formatted data generation module comprises:
Mark insert module, start mark number, stop flag number, repeats bits for presetting split that mark number and spaced markings number insert start mark position in order successively, stop flag position, repeats bits split marker bit and spaced markings position;
Number of characters coding acquisition module, for obtaining the second number of characters coding that the first number of characters corresponding to described first number of characters is encoded and the second number of characters is corresponding;
Number of characters coding insert module, for being inserted by the first number of characters coding between start mark number and first encode, inserts between spaced markings position and second encodes by the second number of characters coding;
Check digit computing module, for obtaining the first check digit by carrying out verify calculation to the first coding, carrying out verify calculation to the second coding and obtaining the second check digit;
Check code acquisition module, first check code corresponding by acquisition first check digit and the second check code corresponding to the second check digit;
Check code insert module, for being inserted by the first check code between the first coding and spaced markings number, inserts the second check code between the second coding and end mark number.
Wherein in an embodiment, described second audio data generation module comprises:
Data obtaining module, for obtaining sample frequency and transmitting time, described transmitting time refers to the time that transmission the 3rd frequency of sound wave continues;
Sampling number computing module, for calculating sampling number by sample frequency and transmitting time;
Time interval computing module, for calculating the sampling time interval in unit period by described sample frequency, the 3rd frequency of sound wave;
3rd voice data generation module, generates formula for the voice data by presetting and utilizes employing to count and sampling time interval generation voice data.
Wherein in an embodiment, described signal decoding module comprises:
Data conversion module, for the voice signal that receiving terminal sends, and is converted to voice data by voice signal;
Frequency record module, for carrying out fast Fourier transform to described voice data segmentation, and the 3rd frequency of sound wave obtained after recording fast Fourier change;
Coding checkout module, for obtaining the 3rd coding corresponding to described 3rd frequency of sound wave, and verifies described 3rd coding according to the first check code in the 3rd coding and the second check code;
Coding and decoding module, if pass through for verification, then carries out decoding to the 3rd coding and obtains the first coding and the second coding;
Information identification module, for according to the mapping table between preset characters and coding, obtains the network cipher of network identity corresponding to described first coding and the second coding correspondence.
Above-mentioned wireless monitoring equipment logs in the method and system of wireless network, by terminal, network identity and network cipher can be sent to wireless monitoring equipment with voice signal, wireless monitoring equipment just can sign in in corresponding wireless network by receiving voice signal automatically, achieve the object of terminal to wireless monitoring equipment plug and play automation configuration network information, simplify the operating process to the configuration of the wireless monitoring equipment network information, thus, improve the efficiency that wireless monitoring equipment signs in wireless network, shorten the R&D cycle of wireless monitoring equipment, reduce R&D costs.
Accompanying drawing explanation
Fig. 1 is the method flow schematic diagram that in an embodiment, wireless monitoring equipment logs in wireless network;
Fig. 2 is the display figure in an embodiment after one section of voice signal amplification;
Fig. 3 is the oscillogram that one section of voice signal sending in an embodiment is corresponding;
Fig. 4 is the schematic flow sheet generating voice data step in an embodiment according to described frequency of sound wave;
Fig. 5 is the schematic diagram of the mapping table of character and coding in an embodiment;
Fig. 6 is that another embodiment generates the schematic flow sheet of voice data step according to described frequency of sound wave;
Fig. 7 is the schematic flow sheet generating the data step of preset data form in an embodiment;
Fig. 8 is the data mode figure generating preset data form in an embodiment;
Fig. 9 is the schematic flow sheet that in an embodiment, network identity and network cipher sign in corresponding wireless network step;
Figure 10 is the application scenarios figure that in an embodiment, wireless monitoring equipment logs in the method for wireless network;
Figure 11 is the structural representation that in an embodiment, wireless monitoring equipment logs in the system of wireless network;
Figure 12 is the structural representation of data generation module in an embodiment;
Figure 13 is the structural representation of data generation module in another embodiment;
Figure 14 is the structural representation of formatted data generation module in an embodiment;
Figure 15 is the structural representation of second audio data generation module in an embodiment;
Figure 16 is the structural representation of signal decoding module in an embodiment.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
As shown in Figure 1, in one embodiment, provide a kind of method that wireless monitoring equipment logs in wireless network, the method can be applicable to the terminal setting up radio communication with wireless monitoring equipment, terminal can control wireless monitoring equipment and show the monitoring picture that wireless monitoring equipment transmits, and these terminals include but not limited to the portable computer, personal digital assistant, panel computer, smart mobile phone etc. of being with AF playing function.The method comprises the steps:
Step 101, terminal obtains network identity and network cipher.
In the present embodiment, network identity (SSID, service set) and network cipher (PASSWORD) are the network informations that wireless monitoring equipment signs in wireless network needs.Network identity and network cipher comprise at least one character respectively.Such as, network identity and network cipher can be Route Distinguisher under wireless router and route login password respectively.Under terminal and wireless monitoring equipment are in same wireless network, terminal could set up radio communication with wireless monitoring equipment, and terminal obtains network identity and the cipher mark of the wireless network that wireless monitoring equipment will log in.
Step 102, network identity and network cipher are mapped as corresponding frequency of sound wave by terminal, and generate voice data according to frequency of sound wave.
In the present embodiment, character is represented by frequency of sound wave, the character conversion comprised in network identity and network cipher is corresponding frequency of sound wave by terminal, further, voice data is generated according to frequency of sound wave, such as, terminal is to send to wireless monitoring equipment by string number character " 123 ", first the character " 1 " in " 123 ", " 2 " and " 3 " can be converted to respectively the frequency of sound wave of corresponding 10HZ, 20HZ and 30HZ, then generate voice data according to the frequency of sound wave of 10HZ, 20HZ and 30HZ.
In one embodiment, according to nyquist sampling theorem, in the transfer process of carrying out analog/digital signal, if when sample frequency is greater than 2 times that send signal frequency, the signal after sampling intactly could retain the information in primary signal.Network identity and network cipher are mapped as corresponding frequency of sound wave and follow this principle too by terminal, such as, the frequency of sound wave of wireless monitoring equipment sampling is 8000HZ, in order to ensure the character that the frequency of sound wave of wireless monitoring equipment energy accurate identification terminal transmission is corresponding, then the frequency of sound wave of network identity and network cipher mapping is the highest can not more than 4000HZ (8000HZ/2).
Step 103, voice data is converted to voice signal and sends by terminal.
In the present embodiment, frequency of sound wave is played out by voice signal, concrete, voice data is converted to voice signal and is play by the loud speaker carried by the sound card in terminal, because voice signal correspond to network identity and network cipher, in order to prevent wireless monitoring equipment from network identity and network cipher are done anti-, voice signal that should be first corresponding to network identity is play, and then the voice signal that playing network codon pair is answered.
Voice signal can be subject to the interference of ambient noise in communication process, therefore in the process sending voice signal, should be noted that following problem:
(1) should have enough discriminations between frequency of sound wave, should have time enough interval between the voice signal namely sent, through test, preferably, the time interval is 100 milliseconds.As shown in Figure 2, be the display figure after one section of voice signal amplifies, the line of the different density degree in figure represents different frequency of sound wave, has fixing width between different frequency of sound wave, and this width is the time interval sent between voice signal.
(2) because voice signal has certain loss and superimposed noise in the air, wireless monitoring equipment reception voice signal is made will to be slightly less than the voice signal of terminal transmission.As shown in Figure 3, be the oscillogram that one section of voice signal in the voice signal of transmission is corresponding, the impact seeing that ambient noise causes voice signal can be known from figure.Therefore, sending voice signal needs stable transmission a period of time (SendTime) guarantee wireless monitoring equipment can to receiving voice signal analysis, and preferential after tested, SendTime gets 50 milliseconds.
(3) in order to avoid there is voice signal aliasing, in the process sending voice signal, after needing after sending voice signal corresponding to network identity to wait for a period of time, the voice signal that just transmission network cipher is corresponding.A period of time of this wait is transmission time interval (SendInterTime), and after tested preferably, SendInterTime is 1 second.
Step 104, wireless monitoring equipment receives voice signal, carries out decoding obtain network identity and network cipher to voice signal.
Step 105, wireless monitoring equipment signs in corresponding wireless network according to network identity and network cipher.
The voice signal that terminal sends is propagated in atmosphere, after the microphone of wireless monitoring equipment collects the voice signal that terminal sends over, carrying out after voice signal being converted to voice data decodes gets corresponding frequency of sound wave, get network identity and network cipher according to frequency of sound wave, wireless monitoring equipment can sign in corresponding wireless network by network identity and network cipher.Terminal scans this wireless monitoring equipment under this wireless network, makes this wireless monitoring equipment be automatically registered in terminal, makes terminal establish radio communication between wireless monitoring equipment.
Above-mentioned wireless monitoring equipment logs in the method for wireless network, by terminal, network identity and network cipher can be sent to wireless monitoring equipment with voice signal, wireless monitoring equipment just can sign in in corresponding wireless network by receiving voice signal automatically, achieve the object of terminal to wireless monitoring equipment plug and play automation configuration network information, simplify the operating process to the configuration of the wireless monitoring equipment network information, thus, high wireless monitoring equipment signs in the efficiency of wireless network, shorten the R&D cycle of wireless monitoring equipment, reduce R&D costs.
In one embodiment, as shown in Figure 4, step 102, network identity and network cipher are mapped as corresponding frequency of sound wave by terminal, and comprise according to frequency of sound wave generation voice data:
Step 401, according to the mapping table of character and the coding preset, obtains the first coding corresponding to network identity and corresponding second the encoding of network cipher.
Coding identification number forms, and the character that network identity and network cipher comprise is made up of character conventional on keyboard, and each character has unique coding, establishes the mapping table establishing character and coding in terminal in advance.According to the mapping table of character and coding, the first coding corresponding to network identity and the second coding corresponding to network cipher can be got.
In one embodiment, the character that network identity and network cipher comprise is character totally 90 conventional on keyboard, coding dibit numerical character as identification number represent.Concrete, as shown in Figure 5, be the mapping table of 90 characters and coding.
Step 402, the identification number according to comprising in the first coding obtains corresponding multiple first frequency of sound wave, and obtains corresponding multiple second frequency of sound wave according to the identification number comprised in the second coding.
Due to the corresponding unique identification number of frequency of sound wave, according to the corresponding relation of frequency of sound wave with identification number, obtain respectively first encode in frequency of sound wave corresponding to each identification number of comprising, i.e. the first frequency of sound wave; The frequency of sound wave that each identification number comprised in acquisition second coding is respectively corresponding, i.e. the second frequency of sound wave.
Step 403, generates voice data according to the first frequency of sound wave and the second frequency of sound wave.
In the present embodiment, obtain sample frequency and transmitting time; Wherein, sample frequency refers to that terminal is per second and extracts from voice signal and form the sampling number of discrete signal, and transmitting time is the time that a frequency of sound wave continues to send.Sampling number is calculated by sample frequency and transmitting time; The sampling time interval in unit period is obtained by sample frequency, the first frequency of sound wave and the second sound wave frequency computation part; Generating formula by voice data utilizes sample frequency and sampling time interval to generate the first frequency of sound wave and voice data corresponding to the second frequency of sound wave.
In one embodiment, the sampling time interval in following formulae discovery unit period can be adopted:
per = 1 ( SendRate * SendTime / 1000 SigRate * SendTime / 1000 ) * 2 π = SigRate SendRate * 2 π
Wherein per is sampling time interval in the unit cycle, and SendRate is the sample frequency that terminal sends, and SigRate is the single frequency of sound wave in the first frequency of sound wave and the second frequency of sound wave, and SendTime is transmitting time.The sampling number of the transmission in transmitting time is SendNum; Then SendNum=SendRate*SendTime/1000;
It is SIN function formula that voice data generates formula, and what in transmitting time, the first frequency of sound wave and the second frequency of sound wave generated voice data can use following code description:
The data obtained in out [i] are the first frequency of sound wave and voice data corresponding to the second frequency of sound wave.
In another embodiment, as shown in Figure 6, network identity and network cipher are mapped as corresponding frequency of sound wave by step 102 terminal, and comprise according to frequency of sound wave generation voice data:
Step 601, according to the mapping table of character and the coding preset, obtains the first coding corresponding to network identity and corresponding second the encoding of network cipher.
Step 602, generates the data of preset data form according to the second number of characters comprised in the first number of characters comprised in the first coding, the second coding, network identity, network cipher and default marker bit.
Network identity can be obtained and network cipher is more accurate to after voice signal decoding to make wireless monitoring equipment, terminal needs to carry out preliminary treatment to the first coding and the second coding, and preliminary treatment refers to the data according to the first coding, the second coding, the first number of characters, the second number of characters and marker bit generation preset data form.Wherein each marker bit has specific implication, is used for the decoding of auxiliary wireless monitoring equipment to voice signal.
Step 603, obtains corresponding multiple 3rd frequency of sound wave according to the identification number comprised in data.
Step 604, generates voice data according to the 3rd frequency of sound wave.
Concrete, the process generating voice data according to the 3rd frequency of sound wave is as follows: obtain sample frequency and transmitting time, and transmitting time refers to the time that transmission the 3rd frequency of sound wave continues.Sampling number is calculated by sample frequency and transmitting time.The sampling time interval in unit period is calculated by sample frequency, the 3rd frequency of sound wave.Generating formula by the voice data preset utilizes employing to count and sampling time interval generation voice data.
In one embodiment, as shown in Figure 7, step 602, the data generating preset data form according to the second number of characters comprised in the first number of characters comprised in the first coding, the second coding, network identity, network cipher and default marker bit comprise:
Step 701, splits the start mark number preset, stop flag number, repeats bits that mark number and spaced markings number insert start mark position in order successively, stop flag position, repeats bits split marker bit and spaced markings position.
In the present embodiment, in preset data form, comprise start mark position, stop flag position, repeats bits fractionation marker bit and spaced markings position.Wherein, spaced markings position is between the first coding and the second coding, start mark position is before the first coding, and stop flag position, after the second coding, is repeats bits fractionation marker bit in the first coding or the second coding between consecutive identical two marks of comprising number.Default start mark number, stop flag number, repeats bits are split mark number by terminal and spaced markings number inserts corresponding marker bit successively.
Step 702, obtains the second number of characters coding that the first number of characters corresponding to the first number of characters is encoded and the second number of characters is corresponding.
Step 703, inserts between start mark number and first encode by the first number of characters coding, inserted by the second number of characters coding between spaced markings position and second encodes.
Statistics network identifies character quantity i.e. the first number of characters comprised respectively, and the character quantity that network cipher comprises i.e. the second number of characters.According to the mapping table of character and the coding preset, obtain the first number of characters coding that the first number of characters is corresponding, the second number of characters that the second number of characters is corresponding is encoded.Such as, network identity is " abc123 ", and network cipher is " def45 ", and the first number of characters is the 6, second number of characters is 5, and be encoded to 06 according to the first number of characters that the mapping table of character as shown in Figure 5 and coding obtains, the second number of characters is encoded to 05.Between start mark number and the first coding, insert the first number of characters coding, between spaced markings number and second are encoded, insert the second number of characters encode.
Step 704, obtaining the first check digit by carrying out verify calculation to the first coding, carrying out verify calculation obtain the second check digit to the second coding.
Step 705, obtains the first check code corresponding to the first check digit and the second check code corresponding to the second check digit.
Step 706, inserts between the first coding and spaced markings number by the first check code, inserted by the second check code between the second coding and end mark number.
Check digit is the data numeral of whether makeing mistakes by being used for checking transmission after calculating the data in the first coding and the second coding, calculates the first check bit sum second check digit respectively according to check digit computing formula to the first coding and the second coding.First check code is inserted between the first coding and spaced markings number, the second check code is inserted between the second coding and end mark number.
Concrete, check digit computing formula is: add the computing formula with mould ten: K=(a 1+ a 2+ a 3+ a 4+ ... + a n) %10, wherein a nfor the identification number comprised in coding.Carry out computing obtain the first check digit by adding the numeral corresponding to the first coding with the operational formula of mould ten, the numeral corresponding to the second coding obtains the second check digit.According to the character preset and the mapping table of coding, obtain the first check code corresponding to the first check digit and the second check code corresponding to the second check digit.
Such as, first is encoded to (02092531), is: (2+9+25+31) %10=7 according to above-mentioned adding with the computational process of mould ten operational formula.What obtain is the first check digit, and according to mapping table as shown in Figure 5, what character " 7 " was corresponding is encoded to 07, and namely the first check code is 07.
In the present embodiment, generate the data mode of preset data form as shown in Figure 8 according to the second number of characters comprised in the first number of characters comprised in the first coding, the second coding, network identity, network cipher and default marker bit.
The process generating the data of preset data form in lower technical scheme of the present invention according to the second number of characters comprised in the first coding, the second coding, the first number of characters comprised in network identity, network cipher and default marker bit is described below in conjunction with a specific embodiment: 10 frequency of sound wave that 1400HZ to 2600HZ is spaced apart 100HZ respectively corresponding 0 to 9 10 Digital IDs, concrete as following table 1-1:
Table 1-1
0 1 2 3 4 5 6 7 8 9
1400HZ 1500HZ 1600HZ 1700HZ 1800HZ 1900HZ 2000HZ 2100HZ 2200HZ 2300HZ
2400HZ, 2500HZ and 2600HZ tri-frequency of sound wave respectively corresponding initial/stop flag number, repeats bits split mark number and spaced markings number identifies, concrete as following table 1-2:
Table 1-2
Initial/stop flag number Repeats bits splits mark number Spaced markings number
2400HZ 2500HZ 2600HZ
If the network identity that terminal obtains is " zmodo123 ", network cipher is " abcd ".Then by the character as shown in Figure 5 mapping table with coding, the first coding got and second is encoded as following table 1-3:
Table 1-3
Network identity zmodo123 35 22 24 13 24 01 02 03
Network cipher abcd 10 11 12 13
The first number of characters comprised in network identity is 8, and the first number of characters of its correspondence is encoded to 08; The second number of characters comprised in network cipher is 4, and the second number of characters of its correspondence is encoded to 04.The calculating process first coding being summed up to mould ten is: (35+22+24+13+24+01+02+03) %10=4, and namely the first check digit is 4, and the first syndrome encoded of its correspondence is 04; The calculating process second coding being summed up to mould ten is: (10+11+12+13) %10=6, i.e. the second check digit position 6, the second check digit position 06 of its correspondence.Therefore, the data generating preset data form are:
0 8 3 5 2●2●2 4 1 3 2 4 0 1 0 2 0 3 0 4★0 4 1 0 1●1●1 2 1 3 0 6▲
Wherein first ▲ be start mark number, second ▲ be stop flag number, ● for repeats bits splits mark number, ★ is spaced markings number.
In one embodiment, as shown in Figure 9, step 104, wireless monitoring equipment receives voice signal, carries out decoding obtain network identity and network cipher to voice signal, and signs in comprising of corresponding wireless network according to network identity and network cipher:
Step 901, the voice signal that receiving terminal sends, and voice signal is converted to voice data.
Step 902, carries out fast Fourier transform to voice data segmentation, and the 3rd frequency of sound wave obtained after recording fast Fourier change.
Step 903, obtains the 3rd coding that the 3rd frequency of sound wave is corresponding, and verifies the 3rd coding according to the first check code in the 3rd coding and the second check code.
Step 904, if verification is passed through, then carries out decoding to the 3rd coding and obtains the first coding and the second coding;
Step 905, according to the mapping table between preset characters and coding, obtains network identity corresponding to the first coding and network cipher corresponding to the second coding.
In the present embodiment, voice data is resolved into voice data one by one by wireless monitoring equipment, and copy the voice data in units of frame to extra buffer, then from extra buffer, voice data is copied to and carry out in buffering area that fast Fourier (FFT) converts; If the voice data quantity in buffering area meets the data volume of a FFT conversion, then FFT conversion is carried out to the voice data of its buffering area.
The data volume of FFT conversion is the power that the sampled point number required for 1/3rd, FFT conversion of wireless monitoring equipment sampled point number in transmitting time is necessary for 2.When the sampled point number obtained is not the power of 2, zero padding operation is carried out to it, then carries out FFT conversion.Such as, transmitting time is 50 milliseconds, the sample frequency RecvRate=8000HZ of wireless monitoring equipment, the sampled point number RecvNum=SendTime*RecvRate/1000=400 so received in wireless monitoring equipment in transmitting time; Namely the data volume needed for a FFT conversion is RecvNum/3=134, because 134 can not represent by the power of 2, therefore carries out zero padding operation with the power meeting 2 to it.
After carrying out FFT conversion, obtain the frequency of sound wave that FFT peak value is corresponding, in identification number, then search identification number corresponding to this frequency of sound wave, if search failure, continue to analyze next section audio data, if search successfully, the result of analysis is kept in list to be decoded.Repeat said process until carry out fast Fourier transform to the 3rd voice data segmentation and complete.
Wireless monitoring equipment according to preset data form to the decoding data in list to be decoded, concrete, to split number according to start mark number, stop flag number, repeats bits and spaced markings number is carried out fractionation to the 3rd coding and obtained the first coding and the second coding, the first syndrome encoded in encoding according to the 3rd verifies the first coding and the second syndrome encoded verifies the second check code, if verification is passed through, network identity corresponding to the first coding and second can be obtained according to character with mapping table of encoding and to encode corresponding network cipher.Wireless monitoring equipment can be signed in in corresponding wireless network by this wireless network password.
Below in conjunction with a specific embodiment, lower technical scheme of the present invention is described, as shown in Figure 10, terminal comprises: smart mobile phone 13, panel computer 14 and desktop computer 15, and wireless network refers to that the network that wireless router 12 covers, wireless monitoring equipment are wireless monitor cameras 11.For smart mobile phone 13, smart mobile phone 13 is connected to wireless router 12 by Route Distinguisher and route password, and Route Distinguisher and route password are converted to voice signal are played out by loud speaker.Wireless monitor camera 11 receives after voice signal and obtains Route Distinguisher and route password by decoding, and according to Route Distinguisher and route password login in wireless router 12.Smart mobile phone 13 and wireless monitor camera 11 can set up radio communication under wireless network.
In one embodiment, as shown in figure 11, a kind of wireless monitoring equipment provided logs in the system of wireless network, and this system comprises terminal 20 and wireless monitoring equipment 30, and wherein terminal 20 comprises:
Network information acquisition module 21, for obtaining network identity and network cipher, network identity and network cipher comprise at least one character respectively.
Data generation module 22, for network identity and network cipher being mapped as corresponding frequency of sound wave, and generates voice data according to frequency of sound wave.
Signal transmitting module 23, for terminal also for voice data being converted to voice signal and sending.
Wireless monitoring equipment 30 comprises:
Signal decoding module 31, for receiving voice signal, carrying out decoding to voice signal and obtaining network identity and network cipher.
Network entry module 32, logs in corresponding wireless network according to network identity and network cipher.
In one embodiment, as shown in figure 12, data generation module 22 comprises:
Coding acquisition module 221, for the mapping table according to character and the coding preset, obtains the first coding corresponding to network identity and corresponding second the encoding of network cipher.
Frequency acquisition module 222, for obtaining corresponding multiple first frequency of sound wave according to the identification number comprised in the first coding, and obtains corresponding multiple second frequency of sound wave according to the identification number comprised in the second coding.
First voice data generation module 223, for generating voice data according to the first frequency of sound wave and the second frequency of sound wave.
In another embodiment, as shown in figure 13, data generation module 22 also comprises:
Coding acquisition module 221, for the mapping table according to character and the coding preset, obtains the first coding corresponding to network identity and corresponding second the encoding of network cipher.
Formatted data generation module 224, for generating the data of preset data form according to the second number of characters comprised in the first number of characters comprised in the first coding, the second coding, network identity, network cipher and default marker bit.
Frequency of sound wave acquisition module 225, for obtaining corresponding multiple 3rd frequency of sound wave according to the identification number comprised in data.
Second audio data generation module 226, for generating voice data according to the 3rd frequency of sound wave.
In one embodiment, as shown in figure 14, formatted data generation module 224 comprises:
Mark insert module 2241, start mark number, stop flag number, repeats bits for presetting split that mark number and spaced markings number insert start mark position in order successively, stop flag position, repeats bits split marker bit and spaced markings position.
Number of characters coding acquisition module 2242, for obtaining the second number of characters coding that the first number of characters corresponding to the first number of characters is encoded and the second number of characters is corresponding.
In the present embodiment, in preset data form, comprise start mark position, stop flag position, repeats bits fractionation marker bit and spaced markings position.Wherein, spaced markings position is between the first coding and the second coding, start mark position is before the first coding, and stop flag position, after the second coding, is repeats bits fractionation marker bit in the first coding or the second coding between consecutive identical two marks of comprising number.
Number of characters coding insert module 2243, for being inserted by the first number of characters coding between start mark number and first encode, inserts between spaced markings position and second encodes by the second number of characters coding.
Check digit computing module 2244, for obtaining the first check digit by carrying out verify calculation to the first coding, carrying out verify calculation to the second coding and obtaining the second check digit.
Check code acquisition module 2245, first check code corresponding by acquisition first check digit and the second check code corresponding to the second check digit.
Check code insert module 2246, for being inserted by the first check code between the first coding and spaced markings number, inserts the second check code between the second coding and end mark number.
In one embodiment, as shown in figure 15, second audio data generation module 226 comprises:
Data obtaining module 2261, for obtaining sample frequency and transmitting time, transmitting time refers to the time that transmission the 3rd frequency of sound wave continues.
Sampling number computing module 2262, for calculating sampling number by sample frequency and transmitting time;
Time interval computing module 2263, for calculating the sampling time interval in unit period by sample frequency, the 3rd frequency of sound wave.
3rd voice data generation module 2264, generates formula for the voice data by presetting and utilizes employing to count and sampling time interval generation voice data.
In one embodiment, as shown in figure 16, signal decoding module 31 comprises:
Data conversion module 311, for the voice signal that receiving terminal sends, and is converted to voice data by voice signal.
Frequency record module 312, for carrying out fast Fourier transform to voice data segmentation, and the 3rd frequency of sound wave obtained after recording fast Fourier change.
Coding checkout module 313, for obtaining the 3rd coding corresponding to the 3rd frequency of sound wave, and verifies the 3rd coding according to the first check code in the 3rd coding and the second check code.
Coding and decoding module 314, if pass through for verification, then carries out decoding to the 3rd coding and obtains the first coding and the second coding.
Code identification module 315, for according to the mapping table between preset characters and coding, obtains network identity corresponding to the first coding and network cipher corresponding to the second coding.
Above embodiment only have expressed several execution mode of the present invention, and it describes comparatively concrete and detailed, but therefore can not be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection range of patent of the present invention should be as the criterion with claims.

Claims (12)

1. wireless monitoring equipment logs in a method for wireless network, and described method comprises:
Terminal obtains network identity and network cipher, and described network identity and network cipher comprise at least one character respectively;
Described network identity and network cipher are mapped as corresponding frequency of sound wave by terminal, and generate voice data according to described frequency of sound wave;
Described voice data is converted to voice signal and sends by terminal;
Wireless monitoring equipment receives described voice signal, carries out decoding obtain described network identity and network cipher to described voice signal;
Wireless monitoring equipment signs in corresponding wireless network according to described network identity and network cipher.
2. method according to claim 1, is characterized in that, the identification number that described frequency of sound wave is corresponding unique; Described network identity and network cipher are mapped as corresponding frequency of sound wave by described terminal, and generate the step of voice data according to described frequency of sound wave, comprising:
According to the mapping table of character and the coding preset, obtain the first coding corresponding to described network identity and corresponding second the encoding of network cipher;
Described identification number according to comprising in described first coding obtains corresponding multiple first frequency of sound wave, and obtains corresponding multiple second frequency of sound wave according to the described identification number comprised in described second coding;
Voice data is generated according to described first frequency of sound wave and described second frequency of sound wave.
3. method according to claim 1, is characterized in that, described network identity and network cipher are mapped as corresponding frequency of sound wave by terminal, and generates the step of voice data according to described frequency of sound wave, comprising:
According to the mapping table of character and the coding preset, obtain the first coding corresponding to described network identity and corresponding second the encoding of network cipher;
The data of preset data form are generated according to the second number of characters comprised in the first number of characters comprised in described first coding, the second coding, network identity, network cipher and default marker bit;
Corresponding multiple 3rd frequency of sound wave are obtained according to the identification number comprised in described data;
Voice data is generated according to described 3rd frequency of sound wave.
4. method according to claim 3, is characterized in that, comprises start mark position, stop flag position, repeats bits fractionation marker bit and spaced markings position in described preset data form; Generate the step of the data of preset data form according to the second number of characters comprised in the first number of characters comprised in described first coding, the second coding, network identity, network cipher and default marker bit, comprising:
The start mark number preset, stop flag number, repeats bits are split mark number and spaced markings number insert start mark position in order successively, stop flag position, repeats bits split marker bit and spaced markings position; Obtain the second number of characters coding that the first number of characters corresponding to described first number of characters is encoded and the second number of characters is corresponding;
First number of characters coding is inserted between start mark number and first encode, the second number of characters coding is inserted between spaced markings position and second encodes;
Obtaining the first check digit by carrying out verify calculation to the first coding, verify calculation being carried out to the second coding and obtains the second check digit;
Obtain the first check code corresponding to the first check digit and the second check code corresponding to the second check digit;
First check code is inserted between the first coding and spaced markings number, the second check code is inserted between the second coding and end mark number.
5. method according to claim 3, is characterized in that, the described step generating voice data according to described 3rd frequency of sound wave, comprising:
Obtain sample frequency and transmitting time, described transmitting time refers to the time that transmission the 3rd frequency of sound wave continues;
Sampling number is calculated by sample frequency and transmitting time;
The sampling time interval in unit period is calculated by described sample frequency, the 3rd frequency of sound wave;
Generating formula by the voice data preset utilizes employing to count and sampling time interval generation voice data.
6. method according to claim 3, is characterized in that, described wireless monitoring equipment receives described voice signal, and decoding to described voice signal obtains the step of described network identity and network cipher, comprising:
The voice signal that receiving terminal sends, and voice signal is converted to voice data;
Fast Fourier transform is carried out to described voice data segmentation, and the 3rd frequency of sound wave obtained after recording fast Fourier change;
Obtain the 3rd coding that described 3rd frequency of sound wave is corresponding, and according to the first check code in the 3rd coding and the second check code, described 3rd coding is verified;
If verification is passed through, then decoding is carried out to the 3rd coding and obtain the first coding and the second coding;
According to the mapping table between default character and coding, obtain the network cipher of network identity corresponding to described first coding and the second coding correspondence.
7. wireless monitoring equipment logs in a system for wireless network, and it is characterized in that, described system comprises terminal and wireless monitoring equipment, and wherein said terminal comprises:
Network information acquisition module, for obtaining network identity and network cipher, described network identity and network cipher comprise at least one character respectively;
Data generation module, for described network identity and described network cipher being mapped as corresponding frequency of sound wave, and generates voice data according to described frequency of sound wave;
Signal transmitting module, for described terminal also for described voice data being converted to voice signal and sending;
Described wireless monitoring equipment comprises:
Signal decoding module, for receiving described voice signal, carrying out decoding to described voice signal and obtaining described network identity and network cipher;
Network entry module, for logging in corresponding wireless network according to described network identity and network cipher.
8. system according to claim 7, is characterized in that, the identification number that described frequency of sound wave is corresponding unique; Described data generation module comprises:
Coding acquisition module, for the mapping table according to character and the coding preset, obtains the first coding corresponding to described network identity and corresponding second the encoding of network cipher;
Frequency acquisition module, for obtaining corresponding multiple first frequency of sound wave according to the described identification number comprised in described first coding, and obtains corresponding multiple second frequency of sound wave according to the described identification number comprised in described second coding;
First voice data generation module, for generating voice data according to described first frequency of sound wave and described second frequency of sound wave.
9. system according to claim 7, is characterized in that, described in root, data generation module also comprises:
Coding acquisition module, for the mapping table according to character and the coding preset, obtains the first coding corresponding to described network identity and corresponding second the encoding of network cipher;
Formatted data generation module, for generating the data of preset data form according to the second number of characters comprised in the first number of characters comprised in described first coding, the second coding, network identity, network cipher and default marker bit;
Frequency of sound wave acquisition module, for obtaining corresponding multiple 3rd frequency of sound wave according to the identification number comprised in described data;
Second audio data generation module, for generating voice data according to described 3rd frequency of sound wave.
10. system according to claim 9, is characterized in that, comprises start mark position, stop flag position, repeats bits fractionation marker bit and spaced markings position in described preset data form; Described formatted data generation module comprises:
Mark insert module, start mark number, stop flag number, repeats bits for presetting split that mark number and spaced markings number insert start mark position in order successively, stop flag position, repeats bits split marker bit and spaced markings position;
Number of characters coding acquisition module, for obtaining the second number of characters coding that the first number of characters corresponding to described first number of characters is encoded and the second number of characters is corresponding;
Number of characters coding insert module, for being inserted by the first number of characters coding between start mark number and first encode, inserts between spaced markings position and second encodes by the second number of characters coding;
Check digit computing module, for obtaining the first check digit by carrying out verify calculation to the first coding, carrying out verify calculation to the second coding and obtaining the second check digit;
Check code acquisition module, first check code corresponding by acquisition first check digit and the second check code corresponding to the second check digit;
Check code insert module, for being inserted by the first check code between the first coding and spaced markings number, inserts the second check code between the second coding and end mark number.
11. systems according to claim 9, is characterized in that, described second audio data generation module comprises:
Data obtaining module, for obtaining sample frequency and transmitting time, described transmitting time refers to the time that transmission the 3rd frequency of sound wave continues;
Sampling number computing module, for calculating sampling number by sample frequency and transmitting time;
Time interval computing module, for calculating the sampling time interval in unit period by described sample frequency, the 3rd frequency of sound wave;
3rd voice data generation module, generates formula for the voice data by presetting and utilizes employing to count and sampling time interval generation voice data.
12. systems according to claim 9, is characterized in that, described signal decoding module comprises:
Data conversion module, for the voice signal that receiving terminal sends, and is converted to voice data by voice signal;
Frequency record module, for carrying out fast Fourier transform to described voice data segmentation, and the 3rd frequency of sound wave obtained after recording fast Fourier change;
Coding checkout module, for obtaining the 3rd coding corresponding to described 3rd frequency of sound wave, and verifies described 3rd coding according to the first check code in the 3rd coding and the second check code;
Coding and decoding module, if pass through for verification, then carries out decoding to the 3rd coding and obtains the first coding and the second coding;
Information identification module, for according to the mapping table between preset characters and coding, obtains the network cipher of network identity corresponding to described first coding and the second coding correspondence.
CN201410419665.6A 2014-08-22 2014-08-22 Wireless monitoring equipment logs in the method and system of wireless network Active CN104717601B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410419665.6A CN104717601B (en) 2014-08-22 2014-08-22 Wireless monitoring equipment logs in the method and system of wireless network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410419665.6A CN104717601B (en) 2014-08-22 2014-08-22 Wireless monitoring equipment logs in the method and system of wireless network

Publications (2)

Publication Number Publication Date
CN104717601A true CN104717601A (en) 2015-06-17
CN104717601B CN104717601B (en) 2018-10-23

Family

ID=53416469

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410419665.6A Active CN104717601B (en) 2014-08-22 2014-08-22 Wireless monitoring equipment logs in the method and system of wireless network

Country Status (1)

Country Link
CN (1) CN104717601B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106658504A (en) * 2015-07-15 2017-05-10 贝斯科技国际有限公司 Wireless network configuration for dwelling safety equipment based on audio information
CN106686639A (en) * 2017-01-16 2017-05-17 上海智臻智能网络科技股份有限公司 Network configuration method and device for intelligent voice interaction equipment, and related equipment
CN107977562A (en) * 2017-11-30 2018-05-01 努比亚技术有限公司 Personal identification method, identification terminal and storage medium
CN108243481A (en) * 2018-01-19 2018-07-03 腾讯科技(深圳)有限公司 Document transmission method and device
CN108492831A (en) * 2018-01-29 2018-09-04 歌尔科技有限公司 A kind of data transmission method, audio frequency apparatus, intelligent terminal
CN109344283A (en) * 2018-08-14 2019-02-15 上海箧书网络科技有限公司 Information interacting method and device based on background music
CN110581791A (en) * 2018-06-11 2019-12-17 佛山市顺德区美的电热电器制造有限公司 Household appliance networking method, household appliance equipment, mobile terminal and computer storage medium
CN110784294A (en) * 2019-09-20 2020-02-11 浙江大华技术股份有限公司 Background sound self-adaptive sound wave distribution network method, system, equipment and storage medium
CN112201268A (en) * 2020-09-09 2021-01-08 北京小米松果电子有限公司 Echo cancellation method, echo cancellation device, and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1642133A (en) * 2004-01-18 2005-07-20 华为技术有限公司 Intelligent network accessing method
CN101282450A (en) * 2007-04-02 2008-10-08 厦门瑞科技术有限公司 Method capable of immediate access and management of network camera
US20120016985A1 (en) * 2005-12-22 2012-01-19 Axis Ab Monitoring system and method for connecting a monitoring device to a service server
CN103166702A (en) * 2013-02-05 2013-06-19 何建亿 Method and device for configuring wireless network in voice frequency mode

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1642133A (en) * 2004-01-18 2005-07-20 华为技术有限公司 Intelligent network accessing method
US20120016985A1 (en) * 2005-12-22 2012-01-19 Axis Ab Monitoring system and method for connecting a monitoring device to a service server
CN101282450A (en) * 2007-04-02 2008-10-08 厦门瑞科技术有限公司 Method capable of immediate access and management of network camera
CN103166702A (en) * 2013-02-05 2013-06-19 何建亿 Method and device for configuring wireless network in voice frequency mode

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106658504A (en) * 2015-07-15 2017-05-10 贝斯科技国际有限公司 Wireless network configuration for dwelling safety equipment based on audio information
CN106686639A (en) * 2017-01-16 2017-05-17 上海智臻智能网络科技股份有限公司 Network configuration method and device for intelligent voice interaction equipment, and related equipment
CN107977562A (en) * 2017-11-30 2018-05-01 努比亚技术有限公司 Personal identification method, identification terminal and storage medium
CN108243481A (en) * 2018-01-19 2018-07-03 腾讯科技(深圳)有限公司 Document transmission method and device
CN108243481B (en) * 2018-01-19 2021-02-23 腾讯科技(深圳)有限公司 File transmission method and device
WO2019144726A1 (en) * 2018-01-29 2019-08-01 歌尔股份有限公司 Data transmission method, audio device, and smart terminal
CN108492831B (en) * 2018-01-29 2020-10-27 歌尔科技有限公司 Data transmission method, audio equipment and intelligent terminal
CN108492831A (en) * 2018-01-29 2018-09-04 歌尔科技有限公司 A kind of data transmission method, audio frequency apparatus, intelligent terminal
CN110581791A (en) * 2018-06-11 2019-12-17 佛山市顺德区美的电热电器制造有限公司 Household appliance networking method, household appliance equipment, mobile terminal and computer storage medium
CN109344283A (en) * 2018-08-14 2019-02-15 上海箧书网络科技有限公司 Information interacting method and device based on background music
CN110784294A (en) * 2019-09-20 2020-02-11 浙江大华技术股份有限公司 Background sound self-adaptive sound wave distribution network method, system, equipment and storage medium
CN110784294B (en) * 2019-09-20 2023-01-03 浙江大华技术股份有限公司 Background sound self-adaptive sound wave distribution network method, system, equipment and storage medium
CN112201268A (en) * 2020-09-09 2021-01-08 北京小米松果电子有限公司 Echo cancellation method, echo cancellation device, and storage medium

Also Published As

Publication number Publication date
CN104717601B (en) 2018-10-23

Similar Documents

Publication Publication Date Title
CN104717601A (en) Wireless network login method and system of wireless monitoring device
CN102509216B (en) Method and device for realizing on-site mobile payment by using audio signal
CN103250205B (en) Audio fingerprint differences for end-to-end quality of experience measurement
CN102722812B (en) Method and the device that consumption certificate number realizes as seen is transmitted by sound signal
CN105303659A (en) Method and device for identifying access control identity based on ultrasonic waves
CN104702437B (en) A kind of device for using Quick Response Code to carry out network configuration for equipment
CN105438900A (en) Mobile phone elevator taking system
FI20020733A0 (en) Method and system for verifying the user of a data transfer device
US7764716B2 (en) System and method for wirelessly transmitting and receiving digital data using acoustical tones
CN102710420A (en) Method, system and device for setting password
CN103023580A (en) Method for achieving data transmission through voice
CN105376189A (en) Sound wave communication method and system
TW201607357A (en) Toning control method of WiFi device setting by smart device
CN103299364A (en) Devices for encoding and decoding a watermarked signal
CN106686639A (en) Network configuration method and device for intelligent voice interaction equipment, and related equipment
CN103095814A (en) Voice driven close distance sharing method, client-terminal, server and system based on information network
CN101753487A (en) Mobile electronic device for transmitting and receiving Morse code
CN105120012B (en) Smart machine and its networking cut-in method, message receiving method and device
CN103606201A (en) Attendance checking method, system and device based on sound data transmission
JP2015162903A (en) Monitoring system and operation method thereof
CN104363092B (en) The device authentication based on audio physical fingerprint under the conditions of spacing
Rehman et al. Effective model for real time end to end secure communication over gsm voice channel
CN106330902B (en) Dual factors rapid authentication method based on ambient sound
CN103200005B (en) It is suitable for the control method of the intelligent code key of multiple mobile device network trading
CN103209399A (en) Short message transmission and receiving system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PP01 Preservation of patent right

Effective date of registration: 20200727

Granted publication date: 20181023

PP01 Preservation of patent right
PD01 Discharge of preservation of patent

Date of cancellation: 20230727

Granted publication date: 20181023

PD01 Discharge of preservation of patent