CN105813174A - Non-interactive equipment, and network access method and network access system for non-interactive equipment - Google Patents

Non-interactive equipment, and network access method and network access system for non-interactive equipment Download PDF

Info

Publication number
CN105813174A
CN105813174A CN201610378146.9A CN201610378146A CN105813174A CN 105813174 A CN105813174 A CN 105813174A CN 201610378146 A CN201610378146 A CN 201610378146A CN 105813174 A CN105813174 A CN 105813174A
Authority
CN
China
Prior art keywords
data frame
carrier
network
wireless signal
wifi
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610378146.9A
Other languages
Chinese (zh)
Other versions
CN105813174B (en
Inventor
潘能智
朱频频
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhizhen Intelligent Network Technology Co Ltd
Original Assignee
Shanghai Zhizhen Intelligent Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhizhen Intelligent Network Technology Co Ltd filed Critical Shanghai Zhizhen Intelligent Network Technology Co Ltd
Priority to CN201610378146.9A priority Critical patent/CN105813174B/en
Publication of CN105813174A publication Critical patent/CN105813174A/en
Application granted granted Critical
Publication of CN105813174B publication Critical patent/CN105813174B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Abstract

The invention provides non-interactive equipment, and a network access method and a network access system for the non-interactive equipment. The network access method for the non-interactive equipment includes monitoring wireless signals in working frequency bands of networks in monitoring modes; searching target wireless signals among the wireless signals; executing decoding on the basis of the lengths of various carrier data frames in the target wireless signals to obtain access parameters for accessing the networks; accessing the networks on the basis of the access parameters. The target wireless signals carry feature data frames. The non-interactive equipment, the network access method and the network access system have the advantage that low-cost, speedy and safety network access technologies can be provided.

Description

Non-interactive type equipment and method for network access, system
Technical field
The present invention relates to network access technique, particularly relate to non-interactive type equipment and method for network access, system.
Background technology
Along with the development of Smart Home, various smart machines also get more and more, and in order to synchronize and analyzing and processing data, and by learning the purpose to reach intelligent control, most of smart machines are required for carrying out accessing network, for instance usually wireless network.Owing to itself not comprising network access parameters information (such as WiFi account number and password etc.) time equipment dispatches from the factory, belong to isolated island equipment, so needing user to configure according to the geographical position of characteristic and hot information around.But the smart machine of many low profile edges, such as socket, fan etc. is all without providing interactive interface (such as keyboard, display etc.) to input network access parameters information, and such smart machine is referred to alternatively as non-interactive type equipment.
The traditional method configuring network for non-interactive type equipment is that this equipment is first configured to AP (access point) pattern, equipment (being called interactive device) this AP of upper access having interactive interface is used by user, input and configure its network access parameters, again the pattern of non-interactive type equipment is switched to normal STA mode after having configured, before searching for and accessing among the wireless network of configuration, Fig. 1 illustrates the workflow schematic diagram that this legacy network configures.
The drawback of this traditional pattern is complicated operation, needs to carry out repeatedly alternately between user and non-interactive type equipment, and needs frequently to switch between different focuses.On from a safety viewpoint also not fully up to expectations, the non-interactive type equipment of ap mode has fixed the account number cipher own as AP when dispatching from the factory, any equipment that may search for focus can be inquired about presetting cipher and be attached, thus likely being accessed by third party when configuration network, thus causing the risk of information leakage.
Therefore, this area needs a kind of efficient, safe non-interactive type device network access scheme.
Summary of the invention
The brief overview of one or more aspect given below is to provide the basic comprehension to these aspects.This summarizes the extensive overview of the not all aspect contemplated, and is both not intended to identify the key or decisive key element also non-scope attempting to define any or all aspect of all aspects.Its some concepts being uniquely intended to provide in simplified form one or more aspect think the sequence of more detailed description given later.
According to an aspect of the present invention, it is provided that a kind of for non-interactive type equipment access network method, including:
Monitor the wireless signal in the working frequency range of this network in the listen mode;
Search for the Target Wireless signal with feature data frame in the middle of this wireless signal;
Length based on carrier data frame each in this Target Wireless signal performs decoding to obtain the access parameter accessing this network;And
This network is accessed based on this access parameter.
In one example, this network is WLAN, and the working frequency range of this network is 2412MHZ-2484MHZ or 5170MHz-6100MHz.
In one example, this feature data frame is continuous predetermined number the Frame that respective length changes by known rules.
In one example, the method also includes: determine the source address of this Target Wireless signal from the head of this feature data frame;Lock the frequency of this Target Wireless signal to perform reception;And filter the wireless signal being not from this source address to obtain this carrier data frame of this Target Wireless signal.
In one example, this execution decoding includes: determine encryption length increment based on this feature data frame;The physical length of the payload of each carrier data frame is determined based on this encryption length increment;And the physical length based on the payload of each carrier data frame determines this access parameter.
In one example, should based on this feature data frame determine encryption length increment include: length after the encryption of the payload of this feature data frame is deducted this feature data frame payload encryption before physical length to obtain this encryption length increment, wherein the physical length before the encryption of the payload of this feature data frame is known.
In one example, should determine that this access parameter included based on the physical length of the payload of each carrier data frame: obtaining carrier data frame number information based on the physical length decoding of the payload of first carrier data frame after this feature data frame, this carrier data frame number information indicates the number of this carrier data frame;Physical length decoding based on the payload of each carrier data frame in residue carrier data frame obtains corresponding decoded information fragment, each of which decoded information fragment includes control bit and carrier information, and this control bit indicates the attribute of carrier information associated there;And optionally combine the carrier information of each decoded information fragment to obtain this access parameter based on the attribute indicated by the control bit of each decoded information fragment.
In one example, the attribute of this control bit instruction includes WiFi account attribute and WiFi cryptographic properties to represent that corresponding carrier information is for WiFi account and WiFi password respectively, and this optionally combines the carrier information of each decoded information fragment and includes to obtain this access parameter: be sequentially connected in series all carrier informations of this WiFi account attribute to form the WiFi account of the part as this access parameter;And be sequentially connected in series to form the WiFi password of the another part as this access parameter by all carrier informations of this WiFi cryptographic properties.
In one example, the attribute of this control bit instruction also includes check code attribute to represent that corresponding carrier information is for check code, and the method also includes: this WiFi account and WiFi password are performed verification by the carrier information based on this check code attribute;In response to verifying successfully, access this network based on this WiFi account and this WiFi password;In response to verifying unsuccessfully, abandon this WiFi account and WiFi password.
In one example, the attribute of this control bit instruction also includes random number attribute to represent that corresponding carrier information is for the random code being associated with this network configuration, the method also includes: in response to verifying successfully, by the source address of this random code transmission to this Target Wireless signal to confirm being properly received of this access parameter.
According to a further aspect in the invention, it is provided that a kind of non-interactive type equipment, including:
Transceiver module, is used for the wireless signal monitoring in the working frequency range of this network in the listen mode;
Search module, for searching for the central Target Wireless signal with feature data frame of this wireless signal;And
Decoder module, the length based on carrier data frame each in this Target Wireless signal performs decoding to obtain the access parameter accessing this network, and this transceiver module accesses this network based on this access parameter.
In one example, this network is WLAN, and the working frequency range of this network is 2412MHZ-2484MHZ or 5170MHz-6100MHz.
In one example, this feature data frame is continuous predetermined number the Frame that respective length changes by known rules.
In one example, this search module is further used for the head from this feature data frame and determines the source address of this Target Wireless signal, and this transceiver module locks the frequency of this Target Wireless signal to perform reception;Wherein, this search module filters the wireless signal being not from this source address to obtain this carrier data frame of this Target Wireless signal.
In one example, this decoder module includes: length computation module, for determining encryption length increment based on this feature data frame, and determines the physical length of the payload of each carrier data frame based on this encryption length increment;And wherein, this decoder module is further used for the physical length of the payload based on each carrier data frame and determines this access parameter.
In one example, this length computation module is further used for length after the encryption of the payload of this feature data frame deducting the physical length before the encryption of the payload of this feature data frame to obtain this encryption length increment, and wherein the physical length before the encryption of the payload of this feature data frame is known.
In one example, this decoder module farther includes: length decoder module, for obtaining carrier data frame number information based on the physical length decoding of the payload of first carrier data frame after this feature data frame, this carrier data frame number information indicates the number of this carrier data frame, and the physical length decoding based on the payload of each carrier data frame in residue carrier data frame obtains corresponding decoded information fragment, each of which decoded information fragment includes control bit and carrier information, and this control bit indicates the attribute of carrier information associated there;And composite module, for optionally combining the carrier information of each decoded information fragment to obtain this access parameter based on the attribute indicated by the control bit of each decoded information fragment.
In one example, the attribute of this control bit instruction includes WiFi account attribute and WiFi cryptographic properties to represent that corresponding carrier information is for WiFi account and WiFi password respectively, and this composite module is further used for: be sequentially connected in series all carrier informations of this WiFi account attribute to form the WiFi account of the part as this access parameter;And be sequentially connected in series to form the WiFi password of the another part as this access parameter by all carrier informations of this WiFi cryptographic properties.
In one example, the attribute of this control bit instruction also includes check code attribute to represent that corresponding carrier information is for check code, this non-interactive type equipment also includes: correction verification module, for this WiFi account and WiFi password being performed verification based on the carrier information of this check code attribute, this transceiver module is further used in response to verifying successfully, accessing this network based on this WiFi account and this WiFi password, in response to verifying unsuccessfully, this WiFi account and WiFi password are abandoned.
In one example, the attribute of this control bit instruction also includes random number attribute to represent that corresponding carrier information is for the random code being associated with this network configuration, this transceiver module is further used in response to verifying successfully, by the source address of this random code transmission to this Target Wireless signal to confirm being properly received of this access parameter.
In one example, this non-interactive type equipment is robot voice module.
In accordance with a further aspect of the present invention, it is provided that the system of a kind of networking, including aforesaid non-interactive type equipment;And interactive device, this interactive device is used for launching this Target Wireless signal.
Accompanying drawing explanation
After reading the detailed description that embodiment of the disclosure in conjunction with the following drawings, it is possible to be more fully understood that features described above and the advantage of the present invention.In the accompanying drawings, each assembly is not necessarily drawn to scale, and the assembly with similar correlation properties or feature is likely to be of same or like accompanying drawing labelling.
Fig. 1 shows the schematic diagram of the network access parameters conventional arrangement scheme of non-interactive type equipment;
Fig. 2 shows the schematic diagram of the environment that can adopt the solution of the present invention;
Fig. 3 shows the block diagram of non-interactive type equipment according to an aspect of the present invention;
Fig. 4 shows the flow chart that non-interactive type equipment according to an aspect of the present invention accesses the method for network;And
Fig. 5 shows the configuration schematic diagram of the network access parameters of the non-interactive type equipment according to the solution of the present invention.
Detailed description of the invention
Below in conjunction with the drawings and specific embodiments, the present invention is described in detail.Noting, the aspects described below in conjunction with the drawings and specific embodiments is merely illustrative of, and is understood not to protection scope of the present invention is carried out any restriction.
Wireless communication system is widely deployed to provide such as example various types of Content of Communication such as voice, data.Exemplary radio communication system can be able to by shared free system resources (such as, bandwidth, transmitting power ...) support the multi-address system of communication with multiple users.Fig. 2 shows the schematic diagram of the system that can adopt the solution of the present invention.
The network 210 illustrated in Fig. 2 can be any network system needing network access parameters to access, for instance adopt Ultra-Mobile Broadband (UMB), IEEE802.11 (Wi-Fi), IEEE802.16 (WiMAX), IEEE802.20,Or the like radiotechnics.In addition, network 210 may also include equity (such as, moving movement) self-organizing (adhoc) network system being frequently used non-matching without licensed spectrum, 802.xx WLAN, bluetooth and any other short distance or long-range wireless communication technology.
Interactive device 220 and non-interactive type equipment 230 is included at network 210.Here, interactive device 220 is in the state accessing network 210.Such as, the user of interactive device 220 have input the access parameter for accessing network 210 artificially already by with the mutual of interactive device 220, thus obtaining being successfully accessed network 210.Typically, network 210 can be WiFi WLAN, and the working frequency range of network 210 is 2412MHZ-2484MHZ or 5170MHz-6100MHz.Network access parameters can be WiFi account and the WiFi password of network 210.In the access state, interactive device 220 can obtain various types of service such as voice, data by network 210.
Although non-interactive type equipment 230 is also in network 210, but non-interactive type equipment 230 is due to cannot be mutual with user, so network access parameters cannot be inputted artificially.Accordingly, it would be desirable to come for its configuration access parameter by interactive device 220.Exemplarily, non-interactive type equipment 230 can be robot voice module.
Fig. 1 illustrates the access parameter allocation plan being traditionally used for non-interactive type equipment.
As it is shown in figure 1, traditional allocation plan mainly includes following step:
S101: first interactive device disconnects from network;
S102: non-interactive type equipment switches to ap mode;
S103: interactive device is connected to be in the non-interactive type equipment of ap mode;
S104: interactive device sends access parameter to non-interactive type equipment;
S105: non-interactive type equipment from be in ap mode non-interactive type equipment disconnect;
S106: interactive device reconnects to network;
S107: non-interactive type equipment switches to normal STA mode;
S108: non-interactive type equipment accesses network.
From the foregoing, it will be observed that in order to reach configuration purpose, it is necessary to the AP that constantly switching WIFI and login equity end are set up, the switching of non-interactive type equipment is frequently as seen from the figure, and the spent time includes the time of 2 WPA authentications and DHCP, and operates relative complex.
Fig. 3 shows the block diagram of non-interactive type equipment 230 according to an aspect of the present invention.
Exemplarily, this network 210 can be in compliance with the WLAN of 802.11 agreements.Typically, the working frequency range of network 210 is 2412MHZ-2484MHZ or 5170MHz-6100MHz.As it was previously stated, non-interactive type equipment 230 is before accessing network 210, it is impossible to obtain network service.Because the data of transmitting-receiving are all encrypted through WPA/WPA2 on the working frequency range of network 210, actual content for unsuccessful access network 210 non-interactive type equipment 230 now and invisible.
While it is true, non-interactive type equipment 230 is able to listen to the signal on the working frequency range of network 210.Specifically, non-interactive type equipment 230 can include transceiver module 231.Transceiver module 231 is responsible for the communication of non-interactive type equipment 230 and external entity, it is possible to be sent out signal, it is also possible to receive signal.The operating frequency of transceiver module 231 is identical with the working frequency range of network 210, so as to communicate in network 210.Therefore, the transceiver module 231 of non-interactive type equipment 230 can monitor the wireless signal in the working frequency range of network 210.In other words, the equipment of all access networks 210, the signal sent including interactive device 220 can be received by non-interactive type equipment 230, although can not correctly understand these signals received before not accessing network 210 according to traditional scheme non-interactive type equipment 230.
According to the solution of the present invention, pass on access parameter by the wireless signal sending " special " to the non-interactive type equipment 230 of hope acquisition access parameter by interactive device 220.This special wireless signal includes the information that correctly can be identified by non-interactive type equipment 230, thus passing on access parameter to it.
Owing to the signal of network 210 is all encrypted through WPA/AWPA2, so the information that non-interactive type equipment 230 can correctly identify only has the length of Frame in signal.According to an aspect of the present invention, by sending, to non-interactive type equipment 230, the signal that data length " meaningfully " changes, access parameter is passed on to non-interactive type equipment 230.
For this, non-interactive type equipment 230 initially enters monitoring pattern, transceiver module 231 monitor the wireless signal in the working frequency range of network 210 in the listen mode.But, the working frequency range of network 210 is likely to have some wireless devices to launch signal.Therefore, non-interactive type equipment 230 is firstly the need of identifying the signal in order to pass on access parameter that interactive device 220 sends from these numerous wireless signals.
Non-interactive type equipment 230 can include search module 232, and search module 232 can be used for searching out Target Wireless signal in the middle of these wireless signals listened to, and this Target Wireless signal is the signal for passing on access parameter that interactive device 220 sends.For identification purposes, Target Wireless signal is the wireless signal with feature data frame.That is, search module 232 searches for Target Wireless signal by searching for the signal with feature data frame.
As mentioned above, owing to non-interactive type equipment 230 does not also access network 210, therefore cannot wireless signal on the working frequency range of decryption network 210, but in wireless signal, the length of Frame may identify which, therefore, it can by identifying that in signal, signal is understood by the length of Frame.
According to an aspect of the present invention, feature data frame can be continuous print predetermined number Frame, and the length of these Frames presses known rules change.Such as, feature data frame can be the Frame that length is incremented by gradually according to predetermined amplification.This feature of feature data frame can be known by non-interactive device 230 in advance, and therefore, as long as search module 232 retrieves the wireless signal with feature data frame, can know this wireless signal is Target Wireless signal.
Each Frame can include head and payload.The length of head is fixing, and therefore the length change of Frame is to cause owing to the length of payload changes.The head of Frame is expressly to send, and payload portions is through encryption.Payload is regarded as the encryption version of sent data.Length variable quantity after each data are encrypted is certain, such as, if length one byte of difference of two data, then the two data are through encrypting the payload portions respectively as two Frames, and the length of the payload of the two Frame also differs a byte.So, the transmission of feature data frame can be realized by regulating the length of the sent data of each Frame at transmitting terminal.
Exemplarily, such as interactive device 220 can send 5 continuous print Frames, the payload portions of first Frame is formed by the data encryption of 1 byte length, the payload portions of second Frame is formed by the data encryption of 2 byte lengths, the payload portions of the 3rd Frame is formed by the data encryption of 3 byte lengths, the payload portions of fourth data frame is formed by the data encryption of 4 byte lengths, and the payload portions of the 5th Frame is formed by the data encryption of 5 byte lengths.Owing to the length increment after encryption is identical, so the length of the payload of these 5 Frames is also be incremented by 1 byte one by one.
Such 5 Frames can be considered feature data frame, because their length presses known rules change, namely the size of each Frame is incremented by 1 byte gradually.
Feature data frame is identified thus after searching Target Wireless signal, in order to save process resource, transceiver module 231 can lock the frequency of this Target Wireless signal and be received at search module 232.The signal sent in the frequency of Target Wireless signal is likely to also there is multiple signal source, it is therefore desirable to filter out the signal being not from interactive device 220.
For this, search module 232 can determine the source address of this Target Wireless signal from the head of feature data frame, the such as MAC Address of interactive device 220, thus filtering out the wireless signal being not from this source address, thus can obtain the follow-up carrier data frame of interactive device 220.
So-called carrier data frame is to send the volume of data frame being positioned in the Target Wireless signal of interactive device 220 after feature data frame.The regular change of length of these Frames, non-interactive type equipment 230 obtains network access parameters by understanding the change of this length.
As it is shown on figure 3, non-interactive type equipment 230 can include decoder module 233, perform decoding with the length of carrier data frame each in based target wireless signal, to obtain the access parameter accessing network.Specifically, decoder module 233 can determine access parameter based on the physical length of the payload of each carrier data frame.The physical length of payload here is the length of the data before unencryption that transmitting terminal sends.
In one example, decoder module 233 can include length computation module 2331, determines encryption length increment for feature based Frame.As it was previously stated, feature data frame can be the continuous data frame that predetermined number length changes according to known rules.The characteristic of feature data frame can be that non-interactive device 230 is known, for instance the physical length of the payload portions of each Frame in feature data frame, namely the length of the data before payload not encrypted can be known.Length computation module 2331 can deduct the physical length before its encryption to obtain this encryption length increment by length after the encryption by the payload of this feature data frame.
As it was previously stated, data are constant at the encryption length increment after encryption, therefore, length computation module 2331 can determine the physical length before the encryption of the payload of each carrier data frame based on this encryption length increment.
Decoder module 233 may also include length decoder module 2332, and this length decoder module 2332 can decode significant information based on the physical length of the payload of each carrier data frame.
In one example, length decoder module 2332 the physical length decoding of payload of first carrier data frame after feature based Frame can obtain the information of number of carrier data frame, in order to knowing has in Target Wireless signal to have how many carrier data frames.After the number learning carrier data frame, remaining carrier data frame can be decoded.
Specifically, length decoder module 2332 can obtain a corresponding decoded information fragment based on the physical length decoding of the payload of each carrier data frame in residue carrier data frame.Each decoded information fragment includes control bit and carrier information, and control bit indicates the attribute of carrier information associated there.Decoder module 233 may also include composite module 2333, optionally combines the carrier information of each decoded information fragment to obtain access parameter for the attribute indicated by the control bit based on each decoded information fragment.
In one example, the attribute of control bit instruction includes WiFi account attribute and WiFi cryptographic properties, and this represents the part that carrier information associated therewith is the part of WiFi account or WiFi password.Therefore, all carrier informations of WiFi account attribute can be sequentially connected in series the WiFi account of the part using composition as access parameter by composite module 2333, are additionally sequentially connected in series all carrier informations of WiFi cryptographic properties to form the WiFi password of the another part as access parameter.
In one example, the attribute of control bit instruction also includes check code attribute, and this represents that carrier information associated therewith is check code.This check code can be used to WiFi account that early decoding is obtained and WiFi password performs verification.
Correspondingly, non-interactive type equipment 230 can include correction verification module 234.After decoding obtains check code, correction verification module 234 can perform verification based on the WiFi account that decoding is obtained by this check code and WiFi password.Only after verifying successfully, transceiver module 231 just can access network 210 based on WiFi account and the WiFi password through verification.
In one example, the attribute of control bit instruction may also include random number attribute, to represent that corresponding carrier information is for the random code being associated with this network configuration.After verifying successfully, this random code can be sent the source address to Target Wireless signal by transceiver module 231, and namely interactive device 220 is to confirm being properly received of access parameter.
In the present invention, access parameter information is passed on by the change of data length.For example, it is assumed that the greatest length of data is 512 bytes, then can be changed the carrier information carrying log511=9 bit long by length every time.And the size needed for representing a character is only log127=7 bit, remaining 2 bits can be used to the control bit as 4 kinds of different conditions.Such as 01 represents transmission WIFI account number, and 00 represents transmission WiFi password, and 10 expressions send check code etc..
It is now assumed that WiFi account number is LINK001, WiFi password is 12345678.Then the final carrier data sent is LINK001ab12345678, and wherein ab is every time different random number, is used for differentiating every time different configuration processes.To send " L ", the overall information passed on is: 011001100, and wherein " 01 " is control bit, represents that the carrier information being associated is WiFi password, and " 1001100 " are the ASCII character binary representations of ' L ', for carrier information.Therefore user program sends the actual size of data is 011001100=204.The like, to send follow-up each numeral or letter.
Fig. 4 shows the flow chart that non-interactive type equipment according to an aspect of the present invention accesses the method 400 of network.As shown in Figure 4, method 400 can comprise the following steps.
Step 401, monitors the wireless signal in the working frequency range of network in the listen mode.
In one example, this network is WLAN, and the working frequency range of network is 2412MHZ-2484MHZ or 5170MHz-6100MHz.
Step 402, with the Target Wireless signal of feature data frame in the middle of search wireless signal.
In the present invention, feature data frame is continuous predetermined number the Frame that respective length changes by known rules.In one example, after searching Target Wireless signal, it is possible to determine the source address of Target Wireless signal from the head of feature data frame, for instance the MAC Address of transmitting terminal, then lock the frequency of this Target Wireless signal to perform reception, process power with saving.Then, after filtering the wireless signal being not from this source address to obtain the carrier data frame of this Target Wireless signal.
In step 403, based target wireless signal, the length of each carrier data frame performs decoding to obtain the access parameter accessing network.
In one example, this decoding process can include being primarily based on feature data frame and determines encryption length increment.Such as, the physical length before the encryption of the payload of feature data frame is known, then length after the encryption of the payload of feature data frame can deduct the physical length before its encryption to obtain encryption length increment.Thus, the physical length of the payload of each carrier data frame can be determined based on this encryption length increment.
Access parameter may finally be determined based on the physical length of the payload of each carrier data frame.In one example, the physical length decoding of the payload of first carrier data frame carrier data frame number information can be obtained after feature based Frame, the number of this carrier data frame number information instruction carrier data frame.
After knowing the number of carrier data frame, corresponding decoded information fragment can be obtained based on the physical length decoding of the payload of each carrier data frame in residue carrier data frame.Each decoded information fragment includes control bit and carrier information, and control bit indicates the attribute of carrier information associated there.
Thus, the carrier information of each decoded information fragment can optionally be combined to obtain access parameter based on the attribute indicated by the control bit of each decoded information fragment.
Such as, the attribute of control bit instruction includes WiFi account attribute and WiFi cryptographic properties to represent that corresponding carrier information is for WiFi account and WiFi password respectively.Correspondingly, can be sequentially connected in series all carrier informations of WiFi account attribute to form the WiFi account of the part as access parameter, additionally be sequentially connected in series all carrier informations of WiFi cryptographic properties to form the WiFi password of the another part as access parameter.
Again such as, the attribute of control bit instruction also includes check code attribute to represent that corresponding carrier information is for check code.Correspondingly based on check code, WiFi account and WiFi password can be performed verification.In response to verifying successfully, then access network based on this WiFi account and WiFi password, otherwise abandon this WiFi account and WiFi password.
Again such as, the attribute of control bit instruction also includes random number attribute to represent that corresponding carrier information is for the random code being associated with this network configuration.In this case, in response to verifying successfully, can by the source address of random code transmission to this Target Wireless signal to confirm being properly received of access parameter.
In step 404, access this network based on access parameter.
Although said method is illustrated for making explanation simplify and is described as a series of actions, it should be understood that and understand, these methods not order by action is limit, because according to one or more embodiments, some actions can occur in different order and/or with from depicted and described herein or not shown herein and describe but other actions that it will be appreciated by those skilled in the art that occur concomitantly.
Fig. 5 shows the configuration schematic diagram of the network access parameters of the non-interactive type equipment according to the solution of the present invention.As it can be seen, the configuration of the network access parameters of the present invention mainly includes following several stages:
S501: send access parameter;
S502: receive and decode access parameter;
S503: receive, notifies transmitting terminal;
S504: connect WiFi.
It can be seen that interactive device has only to send SSID and encrypted message in current network conditions, the information entrained by data after decoding WPA encryption by the algorithm of non-interactive type equipment can complete information transmission.In this process, user remains that network connects without frequently cutting off.Therefore the time window transmitted can obtain huge compression, also can ensure its safety during transmission data.
The invention provides a kind of low cost, quickly, the method that safety networks.Low cost is embodied in the existing radio band of use, it is not necessary to extra other wireless signal transceivers of increase.The flow process being quickly embodied in whole configuration has only to 5 to 10 seconds, and customer-side is simple to operate, have only to input WIFI password then send, and traditional approach needs user to switch focus for twice and embedded device switches focus for twice, the get off people of skilled operation of whole flow process also to spend 3 to 5 minutes.Short being difficult to is eavesdropped at safety body present transmission flow interval.
As used in this application, term " module ", " assembly ", " system " and similar terms are intended to include computer related entity, such as but be not limited to the combination of hardware, firmware, hardware and software, software or executory software.Such as, module can be but not limited to run on a processor process, processor, object, can executive item, the thread of execution, program and/or computer.Can be all assembly as explanation, the application run on the computing device and this computing equipment.One or more assemblies can reside in the thread of process and/or execution, and assembly can localize on one computer and/or be distributed between two or multiple stage computer.Additionally, the various computer-readable mediums that these assemblies can store various data structure from it perform.These assemblies can communicate by locally and/or remotely process, such as communicate according to the signal with one or more packet, such packet such as originate from by this signal with in local system, distributed system another component interaction and/or the data of an assembly that network across such as the Internet etc is mutual with other system.
Additionally, term "or" is intended to indicate that inclusive "or" and nonexcludability "or".That is, except as otherwise noted or from context energy it is clearly seen that otherwise phrase " X adopts A or B " be intended to indicate that any arrangement of naturally can holding concurrently.That is, phrase " X adopts A or B " obtains meeting of following any example: X adopts A;X adopts B;Or X adopts both A and B.
Those skilled in the art will further appreciate that, the various illustrative logic plates, module, circuit and the algorithm steps that describe in conjunction with the embodiments described herein can be embodied as electronic hardware, computer software or combination of the two.For clearly explaining orally this interchangeability of hardware and software, various illustrative components, frame, module, circuit and step are done vague generalization with its functional form herein above and are described.This type of is functional is implemented as hardware or software depends on specifically applying and putting on the design constraint of total system.Technical staff can realize described functional for every kind of application-specific by different modes, but such realize decision-making and should not be interpreted to and cause departing from the scope of the present invention.
The various illustrative logic modules and the circuit that describe in conjunction with presently disclosed embodiment can realize with general processor, digital signal processor (DSP), special IC (ASIC), field programmable gate array (FPGA) or other PLD, discrete door or transistor logic, discrete nextport hardware component NextPort or its any combination being designed to carry out function described herein or perform.General processor can be microprocessor, but in alternative, this processor can be the processor of any routine, controller, microcontroller or state machine.Processor is also implemented as the combination of computing equipment, for instance one or more microprocessors that DSP cooperates with DSP core with the combination of microprocessor, multi-microprocessor or any other this type of configuration.
The method described in conjunction with embodiment disclosed herein or the step of algorithm can be embodied directly in hardware, in the software module performed by processor or embody in combination of the two.Software module can reside in the storage medium of RAM memory, flash memory, ROM memory, eprom memory, eeprom memory, depositor, hard disk, removable dish, CD-ROM or any other form known in the art.Exemplary storage medium is coupled to processor so that this processor can read and write information from/to this storage medium.In alternative, storage medium can be integrated into processor.Processor and storage medium can reside in ASIC.ASIC can reside in user terminal.In alternative, processor and storage medium can be resident in the user terminal as discrete assembly.
In one or more exemplary embodiments, described function can realize in hardware, software, firmware or its any combination.If being embodied as computer program in software, then each function can store on a computer-readable medium as one or more bar instructions or code or mat its transmit.Computer-readable medium includes computer-readable storage medium and communication media, and it includes any medium facilitating computer program to shift to another ground from a ground.Storage medium can be any usable medium that can be accessed by the computer.Exemplarily non-limiting, such computer-readable medium can include RAM, ROM, EEPROM, CD-ROM or other optical disc storage, disk storage or other magnetic storage apparatus, the desirable program code that maybe can be used to carry or store instruction or data structure form and other medium any that can be accessed by the computer.Any connection is also properly termed a computer-readable medium.Such as, if software is to use coaxial cable, fiber optic cables, twisted-pair feeder, numeral subscriber's line (DSL) or the wireless technology of such as infrared, radio and microwave etc from web site, server or other remote source transmission, then the wireless technology of this coaxial cable, fiber optic cables, twisted-pair feeder, DSL or such as infrared, radio and microwave etc is just included among the definition of medium.Dish as used herein (disk) and dish (disc) include compact disc (CD), laser dish, laser disc, digital versatile dish (DVD), floppy disk and blu-ray disc, its mid-game (disk) often reproduces data in the way of magnetic, and dish (disc) reproduces data optically with laser.Combinations of the above also should be included within the scope of computer readable media.
Thering is provided of this disclosure being previously described is for making any person skilled in the art all can make or use the disclosure.Various amendment of this disclosure all will be apparent from for a person skilled in the art, and the generic principles defined herein can be applied to other variants spirit or scope without departing from the disclosure.Thus, the disclosure is not intended to be limited to example described herein and design, but with disclosed herein principle and novel features consistent the widest scope should be awarded.

Claims (22)

1. for the method accessing network of non-interactive type equipment, including:
Monitor the wireless signal in the working frequency range of described network in the listen mode;
Search for the Target Wireless signal with feature data frame in the middle of described wireless signal;
Length based on carrier data frame each in described Target Wireless signal performs decoding to obtain the access parameter accessing described network;And
Described network is accessed based on described access parameter.
2. the method accessing network as claimed in claim 1, it is characterised in that described network is WLAN, and the working frequency range of described network is 2412MHZ-2484MHZ or 5170MHz-6100MHz.
3. the method accessing network as claimed in claim 1, it is characterised in that described feature data frame is continuous predetermined number the Frame that respective length changes by known rules.
4. the method accessing network as claimed in claim 3, it is characterised in that also include:
The source address of described Target Wireless signal is determined from the head of described feature data frame;
Lock the frequency of described Target Wireless signal to perform reception;And
Filter the wireless signal being not from described source address to obtain the described carrier data frame of described Target Wireless signal.
5. the method accessing network as claimed in claim 1, it is characterised in that described execution decoding includes:
Encryption length increment is determined based on described feature data frame;
The physical length of the payload of each carrier data frame is determined based on described encryption length increment;And
Physical length based on the payload of each carrier data frame determines described access parameter.
6. the as claimed in claim 5 method accessing network, it is characterised in that described determine that encryption length increment includes based on described feature data frame:
Length after the encryption of the payload of described feature data frame is deducted described feature data frame payload encryption before physical length to obtain described encryption length increment, the physical length before the encryption of the payload of wherein said feature data frame is known.
7. the method accessing network as claimed in claim 5, it is characterised in that the described physical length based on the payload of each carrier data frame determines that described access parameter includes:
Obtaining carrier data frame number information based on the physical length decoding of the payload of first carrier data frame after described feature data frame, described carrier data frame number information indicates the number of described carrier data frame;
Physical length decoding based on the payload of each carrier data frame in residue carrier data frame obtains corresponding decoded information fragment, each of which decoded information fragment includes control bit and carrier information, and described control bit indicates the attribute of carrier information associated there;And
The carrier information of each decoded information fragment is optionally combined to obtain described access parameter based on the attribute indicated by the control bit of each decoded information fragment.
8. the method accessing network as claimed in claim 7, it is characterized in that, the attribute of described control bit instruction includes WiFi account attribute and WiFi cryptographic properties to represent that corresponding carrier information is for WiFi account and WiFi password respectively, and the described carrier information optionally combining each decoded information fragment includes to obtain described access parameter:
It is sequentially connected in series all carrier informations of described WiFi account attribute to form the WiFi account of the part as described access parameter;And
It is sequentially connected in series all carrier informations of described WiFi cryptographic properties to form the WiFi password of the another part as described access parameter.
9. the method accessing network as claimed in claim 8, it is characterised in that the attribute of described control bit instruction also includes check code attribute to represent that corresponding carrier information is for check code, and described method also includes:
Described WiFi account and WiFi password are performed verification by the carrier information based on described check code attribute;
In response to verifying successfully, access described network based on described WiFi account and described WiFi password;
In response to verifying unsuccessfully, abandon described WiFi account and WiFi password.
10. the method accessing network as claimed in claim 9, it is characterised in that the attribute of described control bit instruction also includes random number attribute to represent that corresponding carrier information is for the random code being associated with this network configuration, and described method also includes:
In response to verifying successfully, described random code is sent the source address of extremely described Target Wireless signal to confirm being properly received of described access parameter.
11. a non-interactive type equipment, including:
Transceiver module, is used for the wireless signal monitoring in the working frequency range of described network in the listen mode;
Search module, for searching for the central Target Wireless signal with feature data frame of described wireless signal;And
Decoder module, the length based on carrier data frame each in described Target Wireless signal performs decoding to obtain the access parameter accessing described network, and described transceiver module accesses described network based on described access parameter.
12. non-interactive type equipment as claimed in claim 11, it is characterised in that described network is WLAN, and the working frequency range of described network is 2412MHZ-2484MHZ or 5170MHz-6100MHz.
13. non-interactive type equipment as claimed in claim 11, it is characterised in that described feature data frame is continuous predetermined number the Frame that respective length changes by known rules.
14. non-interactive type equipment as claimed in claim 13, it is characterized in that, described search module is further used for determining the source address of described Target Wireless signal from the head of described feature data frame, and described transceiver module locks the frequency of described Target Wireless signal to perform reception;
Wherein, described search module filters the wireless signal being not from described source address to obtain the described carrier data frame of described Target Wireless signal.
15. non-interactive type equipment as claimed in claim 11, it is characterised in that described decoder module includes:
Length computation module, for determining encryption length increment based on described feature data frame, and determines the physical length of the payload of each carrier data frame based on described encryption length increment;And
Wherein, described decoder module is further used for the physical length of the payload based on each carrier data frame and determines described access parameter.
16. non-interactive type equipment as claimed in claim 15, it is characterized in that, described length computation module be further used for the encryption of the payload by described feature data frame after length deduct described feature data frame payload encryption before physical length to obtain described encryption length increment, the physical length before the encryption of the payload of wherein said feature data frame is known.
17. non-interactive type equipment as claimed in claim 15, it is characterised in that described decoder module farther includes:
Length decoder module, for obtaining carrier data frame number information based on the physical length decoding of the payload of first carrier data frame after described feature data frame, described carrier data frame number information indicates the number of described carrier data frame, and the physical length decoding based on the payload of each carrier data frame in residue carrier data frame obtains corresponding decoded information fragment, each of which decoded information fragment includes control bit and carrier information, and described control bit indicates the attribute of carrier information associated there;And
Composite module, for optionally combining the carrier information of each decoded information fragment to obtain described access parameter based on the attribute indicated by the control bit of each decoded information fragment.
18. non-interactive type equipment as claimed in claim 17, it is characterized in that, the attribute of described control bit instruction includes WiFi account attribute and WiFi cryptographic properties to represent that corresponding carrier information is for WiFi account and WiFi password respectively, and described composite module is further used for:
It is sequentially connected in series all carrier informations of described WiFi account attribute to form the WiFi account of the part as described access parameter;And
It is sequentially connected in series all carrier informations of described WiFi cryptographic properties to form the WiFi password of the another part as described access parameter.
19. non-interactive type equipment as claimed in claim 18, it is characterised in that the attribute of described control bit instruction also includes check code attribute to represent that corresponding carrier information is for check code, and described non-interactive type equipment also includes:
Correction verification module, performs verification for the carrier information based on described check code attribute to described WiFi account and WiFi password,
Described transceiver module is further used in response to verifying successfully, accesses described network based on described WiFi account and described WiFi password, and in response to verifying unsuccessfully, described WiFi account and WiFi password are abandoned.
20. non-interactive type equipment as claimed in claim 19, it is characterised in that the attribute of described control bit instruction also includes random number attribute to represent that corresponding carrier information is for the random code being associated with this network configuration,
Described transceiver module is further used in response to verifying successfully, described random code sends the source address of extremely described Target Wireless signal to confirm being properly received of described access parameter.
21. non-interactive type equipment as claimed in claim 20, it is characterised in that described non-interactive type equipment is robot voice module.
22. a system for networking, including:
Non-interactive type equipment as according to any one of claim 11 to 21;And
Interactive device, described interactive device is used for launching described Target Wireless signal.
CN201610378146.9A 2016-05-31 2016-05-31 Non-interactive type equipment and its method for network access, system Active CN105813174B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610378146.9A CN105813174B (en) 2016-05-31 2016-05-31 Non-interactive type equipment and its method for network access, system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610378146.9A CN105813174B (en) 2016-05-31 2016-05-31 Non-interactive type equipment and its method for network access, system

Publications (2)

Publication Number Publication Date
CN105813174A true CN105813174A (en) 2016-07-27
CN105813174B CN105813174B (en) 2019-07-26

Family

ID=56428120

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610378146.9A Active CN105813174B (en) 2016-05-31 2016-05-31 Non-interactive type equipment and its method for network access, system

Country Status (1)

Country Link
CN (1) CN105813174B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106550358A (en) * 2016-10-28 2017-03-29 上海智臻智能网络科技股份有限公司 Non-interactive type equipment and its method for network access, system
CN113115153A (en) * 2021-03-30 2021-07-13 联想(北京)有限公司 Processing method, Bluetooth headset and management platform

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013033883A1 (en) * 2011-09-05 2013-03-14 华为技术有限公司 Switchover processing method, mobility management network element, and wireless access network element and system
CN104080194A (en) * 2014-06-25 2014-10-01 扬州芯云智能系统有限公司 Method for wirelessly configuring WIFI access parameters of zero-input terminal equipment through mobile phone
CN104837178A (en) * 2015-01-29 2015-08-12 小米科技有限责任公司 Network accessing method and device
CN105207790A (en) * 2015-08-29 2015-12-30 宇龙计算机通信科技(深圳)有限公司 Information processing method, device and system
CN105554754A (en) * 2015-12-16 2016-05-04 Tcl集团股份有限公司 Method and system for accessing WIFI module of the internet of things to network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013033883A1 (en) * 2011-09-05 2013-03-14 华为技术有限公司 Switchover processing method, mobility management network element, and wireless access network element and system
CN104080194A (en) * 2014-06-25 2014-10-01 扬州芯云智能系统有限公司 Method for wirelessly configuring WIFI access parameters of zero-input terminal equipment through mobile phone
CN104837178A (en) * 2015-01-29 2015-08-12 小米科技有限责任公司 Network accessing method and device
CN105207790A (en) * 2015-08-29 2015-12-30 宇龙计算机通信科技(深圳)有限公司 Information processing method, device and system
CN105554754A (en) * 2015-12-16 2016-05-04 Tcl集团股份有限公司 Method and system for accessing WIFI module of the internet of things to network

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106550358A (en) * 2016-10-28 2017-03-29 上海智臻智能网络科技股份有限公司 Non-interactive type equipment and its method for network access, system
CN113115153A (en) * 2021-03-30 2021-07-13 联想(北京)有限公司 Processing method, Bluetooth headset and management platform

Also Published As

Publication number Publication date
CN105813174B (en) 2019-07-26

Similar Documents

Publication Publication Date Title
Medaglia et al. An overview of privacy and security issues in the internet of things
US11184767B2 (en) Methods and systems for automatically connecting to a network
US7974606B2 (en) System and method for configuring devices for wireless communication
US11184768B2 (en) Methods and systems for automatically connecting to a network
CN103945369B (en) A kind of length by checking WIFI packets realizes the Internet-surfing configuration method of WIFI equipment
US10477397B2 (en) Method and apparatus for passpoint EAP session tracking
CN105072665B (en) Networking control, cut-in method and corresponding terminal and equipment
CN106921963A (en) A kind of smart machine accesses the method and device of WLAN
CN108293185A (en) Wireless device authentication method and apparatus
US10701524B2 (en) Multicast transmission method, information extraction method and corresponding terminal and device
EP2183903A1 (en) Method and apparatus for propagating encryption keys between wireless communication devices
CN103841626A (en) Internet of Things wireless terminal, configuration method thereof and mobile terminal
CN112291780A (en) Identity obfuscation for wireless stations
CN105188058A (en) Authentication method for performing identity recognition at WIFI (Wireless Fidelity) scanning stage
CN105119900A (en) Information secure transmission method, network access method and corresponding terminals
CN108430092A (en) Obtain, provide method, equipment and the medium of wireless access point access information
US11564092B2 (en) Methods and systems for automatically connecting to a network
CN106550362A (en) The method and system of smart machine secure accessing WLAN
CN105120454A (en) Information transmission method, network access method and corresponding terminals
CN105813174A (en) Non-interactive equipment, and network access method and network access system for non-interactive equipment
CN109460646A (en) Method for identifying ID, device, system, electronic equipment and readable medium
US11233588B2 (en) Devices, systems and methods for determining a proximity of a peripheral BLE device
US20200374692A1 (en) System and Method for Processing of Private Beacons in a Mesh Network
US20210266989A1 (en) System and Method for Onboarding in a Wi-Fi Mesh Network
CN117501653A (en) Apparatus, system and method for operating a wireless network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Non-interactive equipment and its network access method and system

Effective date of registration: 20230223

Granted publication date: 20190726

Pledgee: China Construction Bank Corporation Shanghai No.5 Sub-branch

Pledgor: SHANGHAI XIAOI ROBOT TECHNOLOGY Co.,Ltd.

Registration number: Y2023980033272