CN105813174B - Non-interactive type equipment and its method for network access, system - Google Patents

Non-interactive type equipment and its method for network access, system Download PDF

Info

Publication number
CN105813174B
CN105813174B CN201610378146.9A CN201610378146A CN105813174B CN 105813174 B CN105813174 B CN 105813174B CN 201610378146 A CN201610378146 A CN 201610378146A CN 105813174 B CN105813174 B CN 105813174B
Authority
CN
China
Prior art keywords
data frame
carrier
network
wireless signal
length
Prior art date
Application number
CN201610378146.9A
Other languages
Chinese (zh)
Other versions
CN105813174A (en
Inventor
潘能智
朱频频
Original Assignee
上海智臻智能网络科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海智臻智能网络科技股份有限公司 filed Critical 上海智臻智能网络科技股份有限公司
Priority to CN201610378146.9A priority Critical patent/CN105813174B/en
Publication of CN105813174A publication Critical patent/CN105813174A/en
Application granted granted Critical
Publication of CN105813174B publication Critical patent/CN105813174B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Abstract

The present invention provides a kind of non-interactive type equipment and its method for network access, system.The wherein method of the access network of non-interactive type equipment, comprising: monitor the wireless signal in the working frequency range of the network in the listen mode;Search for the Target Wireless signal that feature data frame is had in the wireless signal;Length based on each carrier data frame in the Target Wireless signal executes decoding to obtain the access parameter for accessing the network;And the network is accessed based on the access parameter.The present invention provides a kind of low costs, quickly, the technology to network safely.

Description

Non-interactive type equipment and its method for network access, system

Technical field

The present invention relates to network access technique more particularly to non-interactive type equipment and its method for network access, system.

Background technique

With the development of smart home, various smart machines are also more and more, for synchronous and analyzing and processing data, and lead to Overfitting is to achieve the purpose that intelligent control, most of smart machines require to carry out access network, such as usually wireless network Network.Do not include network access parameters information (such as WiFi account number and password) when due to equipment factory itself, belongs to isolated island Equipment, so needing user according to the hot information of the geographical location of characteristic and surrounding to configure.However it is many small-sized Embedded smart machine, such as socket, fan etc. all connect without providing interactive interface (such as keyboard, display) to input network Enter parameter information, such smart machine is referred to alternatively as non-interactive type equipment.

Traditional method for non-interactive type device configuration network is first to configure the equipment to AP (access point) mode, by with Family inputs and configures its network access parameters using this AP is accessed in the equipment (referred to as interactive device) for having interactive interface, match It by the pattern switching of non-interactive type equipment is again normal STA mode after the completion of setting, the wireless network configured before searching for and accessing Among, Fig. 1 shows the workflow schematic diagram of this traditional network configuration.

The drawbacks of this traditional mode be it is complicated for operation, need repeatedly to be handed between user and non-interactive type equipment Mutually, and the frequent switching between different hot spots is needed.It is also not fully up to expectations from the point of view of on from a safety viewpoint, the non-friendship of ap mode Mutual formula equipment has fixed the account number cipher own as AP when leaving the factory, and any equipment that may search for hot spot can inquire Presetting cipher is attached, to be possible to be accessed by third party when Configuration network, so as to cause the wind of information leakage Danger.

Therefore, this field needs a kind of non-interactive type device network access scheme efficiently, safe.

Summary of the invention

A brief summary of one or more aspects is given below to provide to the basic comprehension in terms of these.This general introduction is not The extensive overview of all aspects contemplated, and be both not intended to identify critical or decisive element in all aspects also non- Attempt to define the range in terms of any or all.Its unique purpose is to provide the one of one or more aspects in simplified form A little concepts are with the sequence for more detailed description given later.

According to an aspect of the present invention, a kind of method of access network for non-interactive type equipment is provided, comprising:

The wireless signal in the working frequency range of the network is monitored in the listen mode;

Search for the Target Wireless signal that feature data frame is had in the wireless signal;

Length based on each carrier data frame in the Target Wireless signal executes decoding to obtain the access for accessing the network Parameter;And

The network is accessed based on the access parameter.

In one example, which is WLAN, the working frequency range of the network be 2412MHZ-2484MHZ or 5170MHz-6100MHz。

In one example, this feature data frame is the continuous predetermined number data that respective length presses known rules variation Frame.

In one example, this method further include: with determining the source of the Target Wireless signal from the head of this feature data frame Location;The frequency of the Target Wireless signal is locked to execute reception;And filtering is not from the wireless signal of the source address to obtain Take the carrier data frame of the Target Wireless signal.

In one example, execution decoding includes: to determine encryption length increment based on this feature data frame;Based on the encryption Length increment determines the physical length of the payload of each carrier data frame;And the payload based on each carrier data frame Physical length determines the access parameter.

In one example, it should determine that encryption length increment included: having by this feature data frame based on this feature data frame The physical length before encrypting for the payload that length subtracts this feature data frame after the encryption of effect load is long to obtain the encryption Increment is spent, wherein the physical length before encrypting of the payload of this feature data frame is known.

In one example, it should determine that the access parameter included: based on the physical length of the payload of each carrier data frame Physical length based on the payload of first carrier data frame after this feature data frame decodes to obtain carrier data frame number Information, the carrier data frame number information indicate the number of the carrier data frame;Based on each load in remaining carrier data frame The physical length of the payload of volume data frame decodes to obtain corresponding decoded information segment, wherein each decoded information segment packet Control bit and carrier information are included, which indicates the attribute of carrier information associated there;And believed based on each decoding Attribute indicated by the control bit of segment is ceased to combine the carrier information of each decoded information segment selectively to obtain the access Parameter.

In one example, the attribute of control bit instruction includes WiFi account attribute and WiFi cryptographic properties to respectively indicate Corresponding carrier information is WiFi account and WiFi password, this combines the carrier information of each decoded information segment selectively to obtain Obtaining the access parameter includes: that all carrier informations of the WiFi account attribute are sequentially connected in series to form as the access parameter The WiFi account of a part;And all carrier informations of the WiFi cryptographic properties is sequentially connected in series to form as the access and is joined The WiFi password of several another part.

In one example, the attribute of control bit instruction further includes check code attribute to indicate corresponding carrier information as school Test code, this method further include: the carrier information based on the check code attribute executes verification to the WiFi account and WiFi password;It rings The network should be accessed based on the WiFi account and the WiFi password in verifying successfully;Fail in response to verification, abandons the WiFi account Number and WiFi password.

In one example, the attribute of control bit instruction further include random number attribute with indicate corresponding carrier information be with The associated random code of this network configuration, this method further include: in response to verifying successfully, which is sent to the target The source address of wireless signal is to confirm being properly received for the access parameter.

According to another aspect of the present invention, a kind of non-interactive type equipment is provided, comprising:

Transceiver module, the wireless signal in working frequency range for monitoring the network in the listen mode;

Search module, for searching in the wireless signal Target Wireless signal for having feature data frame;And

Decoder module, the length based on each carrier data frame in the Target Wireless signal execute decoding and access the net to obtain The access parameter of network, the transceiver module are based on the access parameter and access the network.

In one example, which is WLAN, the working frequency range of the network be 2412MHZ-2484MHZ or 5170MHz-6100MHz。

In one example, this feature data frame is the continuous predetermined number data that respective length presses known rules variation Frame.

In one example, which is further used for determining the Target Wireless signal from the head of this feature data frame Source address, which locks the frequency of the Target Wireless signal to execute reception;Wherein, which, which filters, is not Wireless signal from the source address is to obtain the carrier data frame of the Target Wireless signal.

In one example, which includes: length computation module, for determining encryption length based on this feature data frame Increment is spent, and determines based on the encryption length increment physical length of the payload of each carrier data frame;And wherein, should Decoder module is further used for determining the access parameter based on the physical length of the payload of each carrier data frame.

In one example, which is further used for grow after the encryption of the payload of this feature data frame Degree subtracts the physical length before encrypting of the payload of this feature data frame to obtain the encryption length increment, wherein this feature The physical length before encrypting of the payload of data frame is known.

In one example, which further comprises: length decoder module, for based on after this feature data frame the The physical length of the payload of one carrier data frame decodes to obtain carrier data frame number information, the carrier data frame number Information indicates the number of the carrier data frame, and the payload based on each carrier data frame in remaining carrier data frame Physical length decode to obtain corresponding decoded information segment, wherein each decoded information segment include control bit and carrier letter Breath, the control bit indicate the attribute of carrier information associated there;And composite module, for being based on each decoded information piece Attribute indicated by the control bit of section combines the carrier information of each decoded information segment selectively to obtain the access parameter.

In one example, the attribute of control bit instruction includes WiFi account attribute and WiFi cryptographic properties to respectively indicate Corresponding carrier information is WiFi account and WiFi password, which is further used for: by the institute of the WiFi account attribute It is sequentially connected in series by carrier information to form the WiFi account as a part of the access parameter;And by the WiFi cryptographic properties All carrier informations be sequentially connected in series to form the WiFi password as another part of the access parameter.

In one example, the attribute of control bit instruction further includes check code attribute to indicate corresponding carrier information as school Code is tested, the non-interactive type equipment further include: correction verification module, for the carrier information based on the check code attribute to the WiFi account Verification is executed with WiFi password, which is further used in response to verifying successfully, based on the WiFi account and the WiFi Password accesses the network, fails in response to verification, the WiFi account and WiFi password are abandoned.

In one example, the attribute of control bit instruction further include random number attribute with indicate corresponding carrier information be with The associated random code of this network configuration, the transceiver module are further used for sending the random code in response to verifying successfully To the source address of the Target Wireless signal to confirm being properly received for the access parameter.

In one example, which is robot voice module.

In accordance with a further aspect of the present invention, a kind of system of networking is provided, comprising: non-interactive type equipment above-mentioned;With And interactive device, the interactive device is for emitting the Target Wireless signal.

Detailed description of the invention

After the detailed description for reading embodiment of the disclosure in conjunction with the following drawings, it better understood when of the invention Features described above and advantage.In the accompanying drawings, each component is not necessarily drawn to scale, and has similar correlation properties or feature Component may have same or similar appended drawing reference.

Fig. 1 is to show the schematic diagram of the network access parameters conventional arrangement scheme of non-interactive type equipment;

Fig. 2 is to show the schematic diagram for the environment that the solution of the present invention can be used;

Fig. 3 is to show the block diagram of non-interactive type equipment according to an aspect of the present invention;

Fig. 4 is to show the flow chart of the method for non-interactive type equipment access network according to an aspect of the present invention;With And

Fig. 5 is to show the configuration schematic diagram of the network access parameters of non-interactive type equipment according to the solution of the present invention.

Specific embodiment

Below in conjunction with the drawings and specific embodiments, the present invention is described in detail.Note that below in conjunction with attached drawing and specifically real The aspects for applying example description is merely exemplary, and is understood not to carry out any restrictions to protection scope of the present invention.

Wireless communication system is widely deployed to provide in for example various types of communications such as voice, data Hold.Exemplary radio communication system can be can be by shared free system resources (for example, bandwidth, transmission power ...) come branch Hold the multi-address system with the communication of multiple users.Fig. 2 is to show the schematic diagram for the system that the solution of the present invention can be used.

The network 210 shown in Fig. 2 can be the network system that any required network access parameters could access, such as Using Ultra-Mobile Broadband (UMB), IEEE 802.11 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802.20,Or the like radio technology.In addition, network 210 may also include usually using non-matching without license frequency The equity of spectrum, 802.xx Wireless LAN, bluetooth and any other short distance or long-range wireless communication technology is (for example, mobile to shifting It is dynamic) self-organizing (ad hoc) network system.

It include interactive device 220 and non-interactive type equipment 230 in network 210.Herein, at interactive device 220 In the state for having accessed network 210.For example, the user of interactive device 220 passes through the interaction with interactive device 220 The access parameter for accessing network 210 is artificially had input, to obtain being successfully accessed to network 210.Typically, net Network 210 can be WiFi WLAN, and the working frequency range of network 210 is 2412MHZ-2484MHZ or 5170MHz- 6100MHz.Network access parameters can be the WiFi account and WiFi password of network 210.In the access state, interactive device 220 can obtain various types of services such as voice, data by network 210.

Although non-interactive type equipment 230 is also in network 210, non-interactive type equipment 230 with user due to that can not hand over Mutually, so network access parameters can not be inputted artificially.Therefore, it is necessary to configure access ginseng by interactive device 220 for it Number.As an example, non-interactive type equipment 230 can be robot voice module.

Fig. 1 shows the access parameter allocation plan for being traditionally used for non-interactive type equipment.

As shown in Figure 1, traditional allocation plan is main including the following steps:

S101: interactive device is disconnected from network first;

S102: non-interactive type equipment is switched to ap mode;

S103: interactive device is connected to the non-interactive type equipment in ap mode;

S104: interactive device sends access parameter to non-interactive type equipment;

S105: non-interactive type equipment is disconnected from the non-interactive type equipment in ap mode;

S106: interactive device reconnects to network;

S107: non-interactive type equipment is switched to normal STA mode;

S108: non-interactive type equipment accesses network.

From the foregoing, it will be observed that needing constantly to switch WIFI in order to reach configuration purpose and logging in the AP that reciprocity end is established, from figure In the switching of visible non-interactive type equipment frequently, the spent time includes 2 WPA authentications and the time of DHCP, and is operated It is relative complex.

Fig. 3 is to show the block diagram of non-interactive type equipment 230 according to an aspect of the present invention.

As an example, the network 210 can be the WLAN for following 802.11 agreements.Typically, the work of network 210 Making frequency range is 2412MHZ-2484MHZ or 5170MHz-6100MHz.As previously mentioned, non-interactive type equipment 230 is in access network Before 210, network service can not be obtained.Because the data received and dispatched on the working frequency range of network 210 are added by WPA/WPA2 Close, actual content is at this time and invisible for the non-interactive type equipment 230 for accessing network 210 not successfully.

Nevertheless, non-interactive type equipment 230 is the signal on the working frequency range for can listen to network 210.Specifically For, non-interactive type equipment 230 may include transceiver module 231.Transceiver module 231 is responsible for non-interactive type equipment 230 and outside is real The communication of body can be sent out signal, also can receive signal.The working frequency of transceiver module 231 and the work of network 210 Frequency range is identical, so as to communicate in network 210.Therefore, the transceiver module 231 of non-interactive type equipment 230 can monitor net Wireless signal in the working frequency range of network 210.In other words, the equipment of all access networks 210, including interactive device 220 are sent out Signal out can be received by non-interactive type equipment 230, although not accessed according to traditional scheme non-interactive type equipment 230 These signals received can not be correctly interpreted before network 210.

According to the solution of the present invention, by being set by interactive device 220 to the non-interactive type for wishing acquisition access parameter Standby 230 send the wireless signal of " special " to convey access parameter.The special wireless signal includes that can be set by non-interactive type Standby 230 information correctly identified, to convey access parameter to it.

Since the signal of network 210 is encrypted by WPA/AWPA2, so non-interactive type equipment 230 can be correct The information of identification only has the length of data frame in signal.According to an aspect of the present invention, by being sent to non-interactive type equipment 230 The signal of data length " meaningfully " variation conveys access parameter to non-interactive type equipment 230.

For this purpose, non-interactive type equipment 230 initially enters listening mode, net is monitored by transceiver module 231 in the listen mode Wireless signal in the working frequency range of network 210.However, may there are several wireless devices to emit on the working frequency range of network 210 Signal.Therefore, non-interactive type equipment 230 firstly the need of identified from these numerous wireless signals interactive device 220 send The signal to convey access parameter.

Non-interactive type equipment 230 may include search module 232, search module 232 can be used for from listen to these are wireless Target Wireless signal is searched out in signal, which is that the reception and registration that is used for that interactive device 220 is sent accesses ginseng Several signals.For identification purposes, Target Wireless signal is the wireless signal with feature data frame.That is, search module 232 Target Wireless signal is searched for by searching for the signal with feature data frame.

As noted previously, as non-interactive type equipment 230 does not access network 210 also, thus can not decryption network 210 work Wireless signal in frequency range, but the length of data frame can identify in wireless signal, therefore, can pass through identification signal The length of middle data frame interprets signal.

According to an aspect of the present invention, feature data frame can be continuous predetermined number data frame, these data frames Length by known rules change.For example, feature data frame can be the data frame that length is gradually incremented by according to predetermined amplification.It is special This feature of sign data frame can be what non-interactive type equipment 230 knew in advance, therefore, as long as search module 232 is retrieved To the wireless signal for having feature data frame, i.e., the knowable wireless signal is Target Wireless signal.

Each data frame may include head and payload.The length on head is fixed, therefore the length of data frame becomes Caused by change is the length variation payload.The head of data frame is sent with plaintext, and payload portions It is by encryption.Payload is regarded as the encryption version of transmitted data.Length after each data are encrypted becomes Change amount is certain, for example, if the length of two data differs a byte, the two data by encryption respectively as When the payload portions of two data frames, the length of the payload of the two data frames also differs a byte.So Transmitting terminal can realize the transmission of feature data frame by adjusting the length of data transmitted by each data frame.

As an example, such as interactive device 220 can send 5 continuous data frames, first data frame it is effective Payload segment is formed by the data encryption of 1 byte length, and the payload portions of second data frame are by 2 byte lengths Data encryption forms, and the payload portions of third data frame are formed by the data encryption of 3 byte lengths, fourth data The payload portions of frame are formed by the data encryption of 4 byte lengths, and the payload portions of the 5th data frame are by 5 words The data encryption of section length forms.Since encrypted length increment is identical, so the payload of this 5 data frames Length is also incremental 1 byte one by one.

Such 5 data frames can be considered as feature data frame, because their length is changed by known rules, i.e., often The size of a data frame is gradually incremented by 1 byte.

After identifying feature data frame in search module 232 to search Target Wireless signal, in order to save processing money Source, the frequency that transceiver module 231 can lock the Target Wireless signal are received.It is sent in the frequency of Target Wireless signal Signal may also have multiple signal sources, it is therefore desirable to filter out the signal for being not from interactive device 220.

For this purpose, search module 232 can determine the source address of the Target Wireless signal from the head of feature data frame, such as The MAC Address of interactive device 220, so that the wireless signal for being not from the source address is filtered out, it is possible thereby to obtain interaction The subsequent carrier data frame of formula equipment 220.

So-called carrier data frame be send from the Target Wireless signal of interactive device 220 be located at feature data frame it Volume of data frame afterwards.The regular variation of the length of these data frames, non-interactive type equipment 230 is by interpreting this length Variation obtain network access parameters.

As shown in figure 3, non-interactive type equipment 230 may include decoder module 233, based on each carrier in Target Wireless signal The length of data frame executes decoding, to obtain the access parameter of access network.Specifically, decoder module 233 can be based on each load The physical length of the payload of volume data frame determines access parameter.Here the physical length of payload is transmitting terminal hair The length for the data before unencryption sent.

In one example, decoder module 233 may include length computation module 2331, to be used for based on feature data frame come really Surely length increment is encrypted.As previously mentioned, feature data frame can be predetermined number length change according to known rules it is continuous Data frame.The characteristic of feature data frame can be known to non-interactive type equipment 230, such as each data in feature data frame The length of data before the physical length namely payload of the payload portions of frame are not encrypted can be known. Length computation module 2331 can be by subtracting its reality before encrypting for length after the encryption of the payload of this feature data frame Border length is to obtain the encryption length increment.

As previously mentioned, data by encryption after encryption length increment be it is constant, therefore, length computation module 2331 can determine the physical length before encrypting of the payload of each carrier data frame based on the encryption length increment.

Decoder module 233 may also include length decoder module 2332, which can be based on each carrier The physical length of the payload of data frame decodes significant information.

In one example, length decoder module 2332 can be based on the effective of first carrier data frame after feature data frame The physical length of load decodes to obtain the information of number of carrier data frame, so that how many load in Target Wireless signal known to have Volume data frame.After the number for learning carrier data frame, remaining carrier data frame can be decoded.

Specifically, length decoder module 2332 can be based on the effective of each carrier data frame in remaining carrier data frame The physical length of load decodes to obtain a corresponding decoded information segment.Each decoded information segment includes control bit and carrier Information, control bit indicate the attribute of carrier information associated there.Decoder module 233 may also include composite module 2333, with The load of each decoded information segment is selectively combined for attribute indicated by the control bit based on each decoded information segment Body information is to obtain access parameter.

In one example, the attribute of control bit instruction includes WiFi account attribute and WiFi cryptographic properties, this is indicated therewith Associated carrier information is a part of WiFi account or a part of WiFi password.Therefore, composite module 2333 can incite somebody to action All carrier informations of WiFi account attribute are sequentially connected in series to form the WiFi account as a part of access parameter, in addition will All carrier informations of WiFi cryptographic properties are sequentially connected in series to form the WiFi password as another part of access parameter.

In one example, the attribute of control bit instruction further includes check code attribute, this indicates carrier letter associated therewith Breath is check code.The WiFi account and WiFi password that the check code can be used to obtain early decoding executes verification.

Correspondingly, non-interactive type equipment 230 may include correction verification module 234.After decoding obtains check code, correction verification module 234 can execute verification to the obtained WiFi account of decoding and WiFi password based on the check code.Only after verifying successfully, transmitting-receiving Module 231 just can be based on the WiFi account and WiFi password access network 210 by verification.

In one example, the attribute of control bit instruction may also include random number attribute, to indicate that corresponding carrier information is Random code associated with this network configuration.After verifying successfully, which can be sent to target by transceiver module 231 The source address of wireless signal, i.e. interactive device 220 are to confirm being properly received for access parameter.

In the present invention, access parameter information is conveyed by the variation of data length.For example, it is assumed that data most greatly enhance Degree is 512 bytes, then can carry the carrier information of log511=9 bit long by length variation every time.And indicate one Size needed for a character is only log127=7 bit, and remaining 2 bit can be used as the control bit of 4 kinds of different conditions. Such as 01 indicate to send WIFI account number, 00 indicates to send WiFi password, and 10 indicate to send check codes etc..

It is now assumed that WiFi account number is LINK001, WiFi password is 12345678.The carrier data then finally sent is LINK001ab12345678, wherein ab is random number different every time, for identifying configuration process different every time.To send For " L ", the overall information conveyed are as follows: 011001100, wherein " 01 " is control bit, indicate that associated carrier information is WiFi password, " 1001100 " are the ASCII character binary representations of ' L ', are carrier information.Therefore user program sends data Actual size is 011001100=204.And so on, to send subsequent each number or letter.

Fig. 4 is to show the flow chart of the method 400 of non-interactive type equipment access network according to an aspect of the present invention. As shown in figure 4, method 400 may include following steps.

Step 401, the wireless signal in the working frequency range of network is monitored in the listen mode.

In one example, which is WLAN, the working frequency range of network be 2412MHZ-2484MHZ or 5170MHz-6100MHz。

Step 402, the Target Wireless signal of feature data frame is had in search wireless signal.

In the present invention, feature data frame is the continuous predetermined number data frame that respective length presses known rules variation. In one example, after searching Target Wireless signal, the source of Target Wireless signal can be determined from the head of feature data frame Then address, such as the MAC Address of transmitting terminal lock the frequency of the Target Wireless signal to execute reception, to save processing function Rate.Then, after filtering the wireless signal that is not from the source address to obtain the carrier data frame of the Target Wireless signal.

In step 403, the length based on carrier data frame each in Target Wireless signal executes decoding to obtain access network Access parameter.

In one example, this decoding process may include being primarily based on feature data frame to determine encryption length increment.For example, special Levy data frame payload physical length before encrypting be it is known, then can be by the encryption of the payload of feature data frame Length subtracts its physical length before encrypting to obtain encryption length increment afterwards.It can be determined as a result, based on the encryption length increment The physical length of the payload of each carrier data frame.

Finally access parameter can be determined based on the physical length of the payload of each carrier data frame.In one example, may be used Physical length based on the payload of first carrier data frame after feature data frame decodes to obtain carrier data frame number letter Breath, the carrier data frame number information indicate the number of carrier data frame.

It, can be based on each carrier data frame in remaining carrier data frame after the number for knowing carrier data frame The physical length of payload decodes to obtain corresponding decoded information segment.Each decoded information segment includes control bit and carrier Information, control bit indicate the attribute of carrier information associated there.

As a result, can attribute indicated by the control bit based on each decoded information segment selectively combine each decoding letter The carrier information of segment is ceased to obtain access parameter.

For example, the attribute of control bit instruction includes WiFi account attribute and WiFi cryptographic properties to respectively indicate corresponding load Body information is WiFi account and WiFi password.Correspondingly, all carrier informations of WiFi account attribute can be sequentially connected in series with group At the WiFi account of a part as access parameter, in addition all carrier informations of WiFi cryptographic properties are sequentially connected in series with group At the WiFi password of another part as access parameter.

For another example the attribute of control bit instruction further includes check code attribute to indicate corresponding carrier information as check code. Correspondingly verification can be executed to WiFi account and WiFi password based on check code.In response to verifying successfully, then the WiFi account is based on Number and WiFi password access network, otherwise abandon the WiFi account and WiFi password.

For another example the attribute of control bit instruction further includes random number attribute to indicate that corresponding carrier information is and this net Network configures associated random code.In this case, in response to verifying successfully, random code can be sent to the Target Wireless signal Source address to confirm being properly received for access parameter.

In step 404, which is accessed based on access parameter.

Although for simplify explain the above method is illustrated to and is described as a series of actions, it should be understood that and understand, The order that these methods are not acted is limited, because according to one or more embodiments, some movements can occur in different order And/or with from it is depicted and described herein or herein it is not shown and describe but it will be appreciated by those skilled in the art that other Movement concomitantly occurs.

Fig. 5 is to show the configuration schematic diagram of the network access parameters of non-interactive type equipment according to the solution of the present invention. As shown, the configuration of network access parameters of the invention mainly includes following several stages:

S501: access parameter is sent;

S502: receiving and decodes access parameter;

S503: receiving, and notifies transmitting terminal;

S504: connection WiFi.

It can be seen that interactive device only needs to send SSID and encrypted message in current network environment, pass through nonreciprocal The algorithm of formula equipment, which decodes information entrained by the encrypted data of WPA, can be completed information transmission.User is begun during this Keep network connection without frequently cutting off eventually.Therefore the available huge compression of time window of transmission, when transmitting data Also its safety can be ensured.

The present invention provides a kind of low costs, quickly, the method to network safely.Low cost is embodied in using existing wireless Frequency band does not need additionally to increase other wireless signal transceivers.Quickly being embodied in the process entirely configured only needs 5 to 10 Second, and customer-side is easy to operate, it is only necessary to and it inputs WIFI password and then sends, and traditional approach needs user to switch twice Hot spot and embedded device switch hot spot twice, and the get off people of skilled operation of whole flow process also will spend 3 to 5 minutes.Safety It is embodied in that transmission flow interval is short to be difficult to eavesdrop.

As used in this application, term " module ", " component ", " system " and similar terms are intended to include computer phase Entity is closed, such as but is not limited to combination, software or the software in execution of hardware, firmware, hardware and software.For example, module Can be but not limited to the process run on a processor, processor, object, executable item, the thread of execution, program, and/or Computer.As explanation, both the application run on the computing device and the calculating equipment all can be component.It is one or more Component can reside in the thread of process and/or execution, and component can localize on one computer and/or be distributed in two Between platform or multiple stage computers.In addition, these components can be from various computer-readable Jie that store various data structures thereon Matter executes.These components can be communicated by locally and/or remotely process, such as according to one or more data groupings Signal communicate, such data grouping is all in this way another group in by the signal and local system, distributed system The data for the component that part interaction, and/or across such as internet etc network is interacted with other systems.

In addition, term "or" is intended to indicate that inclusive "or" and nonexcludability "or".That is, unless otherwise specified or from upper and lower Text can be clearly seen, otherwise phrase " X uses A or B " be intended to indicate that it is any naturally can and arrangement.That is, phrase " X using A or B " obtains the satisfaction of following any example: X uses A;X uses B;Or X uses both A and B.

Those skilled in the art will further appreciate that, the various illustratives described in conjunction with the embodiments described herein Logic plate, module, circuit and algorithm steps can be realized as electronic hardware, computer software or combination of the two.It is clear Explain to Chu this interchangeability of hardware and software, various illustrative components, frame, module, circuit and step be above with Its functional form makees generalization description.Such functionality be implemented as hardware or software depend on concrete application and It is applied to the design constraint of total system.Technical staff can realize every kind of specific application described with different modes Functionality, but such realization decision should not be interpreted to cause departing from the scope of the present invention.

In conjunction with presently disclosed embodiment describe various illustrative logic modules and circuit can with general processor, Digital signal processor (DSP), specific integrated circuit (ASIC), field programmable gate array (FPGA) or other programmable logic Device, discrete door or transistor logic, discrete hardware component or its be designed to carry out any group of function described herein It closes to realize or execute.General processor can be microprocessor, but in alternative, which can be any routine Processor, controller, microcontroller or state machine.Processor is also implemented as calculating the combination of equipment, such as DSP With the combination of microprocessor, multi-microprocessor, one or more microprocessors to cooperate with DSP core or any other this Class configuration.

The step of method or algorithm for describing in conjunction with embodiment disclosed herein, can be embodied directly in hardware, in by processor It is embodied in the software module of execution or in combination of the two.Software module can reside in RAM memory, flash memory, ROM and deposit Reservoir, eprom memory, eeprom memory, register, hard disk, removable disk, CD-ROM or known in the art appoint In the storage medium of what other forms.Exemplary storage medium is coupled to processor so that the processor can be from/to the storage Medium reads and writees information.In alternative, storage medium can be integrated into processor.Pocessor and storage media can It resides in ASIC.ASIC can reside in user terminal.In alternative, pocessor and storage media can be used as discrete sets Part is resident in the user terminal.

In one or more exemplary embodiments, described function can be in hardware, software, firmware, or any combination thereof Middle realization.If being embodied as computer program product in software, each function can be used as one or more item instructions or generation Code may be stored on the computer-readable medium or be transmitted by it.Computer-readable medium includes computer storage medium and communication Both media comprising any medium for facilitating computer program to shift from one place to another.Storage medium can be can quilt Any usable medium of computer access.It is non-limiting as example, such computer-readable medium may include RAM, ROM, EEPROM, CD-ROM or other optical disc storages, disk storage or other magnetic storage apparatus can be used to carrying or store instruction Or data structure form desirable program code and any other medium that can be accessed by a computer.Any connection is also by by rights Referred to as computer-readable medium.For example, if software is using coaxial cable, fiber optic cables, twisted pair, digital subscriber line (DSL) or the wireless technology of such as infrared, radio and microwave etc is passed from web site, server or other remote sources It send, then the coaxial cable, fiber optic cables, twisted pair, DSL or such as infrared, radio and microwave etc is wireless Technology is just included among the definition of medium.Disk (disk) and dish (disc) as used herein include compression dish (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and blu-ray disc, which disk (disk) are often reproduced in a manner of magnetic Data, and dish (disc) with laser reproduce data optically.Combinations of the above should also be included in computer-readable medium In the range of.

Offer is to make any person skilled in the art all and can make or use this public affairs to the previous description of the disclosure It opens.The various modifications of the disclosure all will be apparent for a person skilled in the art, and as defined herein general Suitable principle can be applied to other variants without departing from the spirit or scope of the disclosure.The disclosure is not intended to be limited as a result, Due to example described herein and design, but should be awarded and principle disclosed herein and novel features phase one The widest scope of cause.

Claims (14)

1. a kind of method of the access network for non-interactive type equipment, the non-interactive type equipment can not when not accessing network Wireless signal on the working frequency range of decryption network, comprising:
The wireless signal in the working frequency range of the network is monitored in the listen mode;
The Target Wireless signal that feature data frame is had in the wireless signal is searched for, the feature data frame is respective length The continuous predetermined number data frame changed by known rules;
Length based on each carrier data frame in the Target Wireless signal executes decoding to obtain the access for accessing the network Parameter;And
The network is accessed based on the access parameter;
The source address of the Target Wireless signal is determined from the head of the feature data frame;
The frequency of the Target Wireless signal is locked to execute reception;And
Filtering is not from the wireless signal of the source address to obtain the carrier data frame of the Target Wireless signal;
The execution decodes
Encryption length increment is determined based on the feature data frame;
The physical length of the payload of each carrier data frame is determined based on the encryption length increment;And
The access parameter is determined based on the physical length of the payload of each carrier data frame;
The network is WLAN, and the working frequency range of the network is 2412MHZ-2484MHZ or 5170MHz- 6100MHz。
2. the method for access network as described in claim 1, which is characterized in that described determined based on the feature data frame is added Close length increment includes:
Length after the encryption of the payload of the feature data frame is subtracted to the encryption of the payload of the feature data frame Preceding physical length is to obtain the encryption length increment, wherein the reality before encrypting of the payload of the feature data frame Length is known.
3. the method for access network as described in claim 1, which is characterized in that effective load based on each carrier data frame The physical length of lotus determines that the access parameter includes:
Physical length based on the payload of first carrier data frame after the feature data frame decodes to obtain carrier data Frame number information, the carrier data frame number information indicate the number of the carrier data frame;
The physical length of payload based on each carrier data frame in remaining carrier data frame decodes to be solved accordingly Code information segment, wherein each decoded information segment includes control bit and carrier information, the control bit instruction is associated with it Carrier information attribute;And
Attribute indicated by control bit based on each decoded information segment selectively combines the load of each decoded information segment Body information is to obtain the access parameter.
4. the method for access network as claimed in claim 3, which is characterized in that the attribute of the control bit instruction includes WiFi Account attribute and WiFi cryptographic properties are to respectively indicate corresponding carrier information as WiFi account and WiFi password, the selectivity The carrier information that ground combines each decoded information segment includes: to obtain the access parameter
All carrier informations of the WiFi account attribute are sequentially connected in series to form as a part of the access parameter WiFi account;And
All carrier informations of the WiFi cryptographic properties are sequentially connected in series to form another part as the access parameter WiFi password.
5. the method for access network as claimed in claim 4, which is characterized in that the attribute of the control bit instruction further includes school Test yard attribute using indicate corresponding carrier information as check code, the method also includes:
Carrier information based on the check code attribute executes verification to the WiFi account and WiFi password;
In response to verifying successfully, the network is accessed based on the WiFi account and the WiFi password;
Fail in response to verification, abandons the WiFi account and WiFi password.
6. the method for access network as claimed in claim 5, which is characterized in that the attribute of control bit instruction further include with Machine number attribute with indicate corresponding carrier information be random code associated with this network configuration, the method also includes:
In response to verifying successfully, the random code is sent to the source address of the Target Wireless signal to confirm the access ginseng Several is properly received.
7. a kind of non-interactive type equipment, the non-interactive type equipment can not be on the working frequency range of decryption network when not accessing network Wireless signal, comprising:
Transceiver module, the wireless signal in working frequency range for monitoring the network in the listen mode;
Search module, for searching in the wireless signal Target Wireless signal for having feature data frame, the characteristic It is the continuous predetermined number data frame that respective length presses known rules variation according to frame;And
Decoder module, the length based on each carrier data frame in the Target Wireless signal execute decoding to obtain the access net The access parameter of network, the transceiver module are based on the access parameter and access the network;
Described search module is further used for determining the source address of the Target Wireless signal from the head of the feature data frame, The transceiver module locks the frequency of the Target Wireless signal to execute reception;
Wherein, described search modular filtration is not from the wireless signal of the source address to obtain the Target Wireless signal The carrier data frame;
The decoder module includes:
Length computation module is encrypted length increment for being determined based on the feature data frame, and is based on the encryption length Increment determines the physical length of the payload of each carrier data frame;And
Wherein, the decoder module is further used for connecing described in the physical length determination based on the payload of each carrier data frame Enter parameter;
The network is WLAN, and the working frequency range of the network is 2412MHZ-2484MHZ or 5170MHz- 6100MHz。
8. non-interactive type equipment as claimed in claim 7, which is characterized in that the length computation module is further used for institute State the reality before encrypting that length after the encryption of the payload of feature data frame subtracts the payload of the feature data frame Length is to obtain the encryption length increment, wherein the physical length before encrypting of the payload of the feature data frame is Know.
9. non-interactive type equipment as claimed in claim 7, which is characterized in that the decoder module further comprises:
Length decoder module, for the physical length based on the payload of first carrier data frame after the feature data frame Decoding obtains carrier data frame number information, and the carrier data frame number information indicates the number of the carrier data frame, with And the physical length of the payload based on each carrier data frame in remaining carrier data frame is decoded and is decoded accordingly Information segment, wherein each decoded information segment includes control bit and carrier information, the control bit instruction is associated there The attribute of carrier information;And
Composite module selectively combines each decoding for attribute indicated by the control bit based on each decoded information segment The carrier information of information segment is to obtain the access parameter.
10. non-interactive type equipment as claimed in claim 9, which is characterized in that the attribute of the control bit instruction includes WiFi Account attribute and WiFi cryptographic properties are to respectively indicate corresponding carrier information as WiFi account and WiFi password, the combination die Block is further used for:
All carrier informations of the WiFi account attribute are sequentially connected in series to form as a part of the access parameter WiFi account;And
All carrier informations of the WiFi cryptographic properties are sequentially connected in series to form another part as the access parameter WiFi password.
11. non-interactive type equipment as claimed in claim 10, which is characterized in that the attribute of the control bit instruction further includes school Test yard attribute using indicate corresponding carrier information as check code, the non-interactive type equipment further include:
Correction verification module executes school to the WiFi account and WiFi password for the carrier information based on the check code attribute It tests,
The transceiver module is further used for accessing institute based on the WiFi account and the WiFi password in response to verifying successfully Network is stated, is failed in response to verification, the WiFi account and WiFi password are abandoned.
12. non-interactive type equipment as claimed in claim 11, which is characterized in that the attribute of control bit instruction further include with Machine number attribute with indicate corresponding carrier information be random code associated with this network configuration,
The transceiver module is further used for that the random code is sent to the Target Wireless signal in response to verifying successfully Source address is to confirm being properly received for the access parameter.
13. non-interactive type equipment as claimed in claim 12, which is characterized in that the non-interactive type equipment is robot voice Module.
14. a kind of system of networking, comprising:
Non-interactive type equipment as described in any one of claim 7 to 13;And
Interactive device, the interactive device is for emitting the Target Wireless signal.
CN201610378146.9A 2016-05-31 2016-05-31 Non-interactive type equipment and its method for network access, system CN105813174B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610378146.9A CN105813174B (en) 2016-05-31 2016-05-31 Non-interactive type equipment and its method for network access, system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610378146.9A CN105813174B (en) 2016-05-31 2016-05-31 Non-interactive type equipment and its method for network access, system

Publications (2)

Publication Number Publication Date
CN105813174A CN105813174A (en) 2016-07-27
CN105813174B true CN105813174B (en) 2019-07-26

Family

ID=56428120

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610378146.9A CN105813174B (en) 2016-05-31 2016-05-31 Non-interactive type equipment and its method for network access, system

Country Status (1)

Country Link
CN (1) CN105813174B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106550358A (en) * 2016-10-28 2017-03-29 上海智臻智能网络科技股份有限公司 Non-interactive type equipment and its method for network access, system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013033883A1 (en) * 2011-09-05 2013-03-14 华为技术有限公司 Switchover processing method, mobility management network element, and wireless access network element and system
CN104080194A (en) * 2014-06-25 2014-10-01 扬州芯云智能系统有限公司 Method for wirelessly configuring WIFI access parameters of zero-input terminal equipment through mobile phone
CN104837178A (en) * 2015-01-29 2015-08-12 小米科技有限责任公司 Network accessing method and device
CN105207790A (en) * 2015-08-29 2015-12-30 宇龙计算机通信科技(深圳)有限公司 Information processing method, device and system
CN105554754A (en) * 2015-12-16 2016-05-04 Tcl集团股份有限公司 Method and system for accessing WIFI module of the internet of things to network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013033883A1 (en) * 2011-09-05 2013-03-14 华为技术有限公司 Switchover processing method, mobility management network element, and wireless access network element and system
CN104080194A (en) * 2014-06-25 2014-10-01 扬州芯云智能系统有限公司 Method for wirelessly configuring WIFI access parameters of zero-input terminal equipment through mobile phone
CN104837178A (en) * 2015-01-29 2015-08-12 小米科技有限责任公司 Network accessing method and device
CN105207790A (en) * 2015-08-29 2015-12-30 宇龙计算机通信科技(深圳)有限公司 Information processing method, device and system
CN105554754A (en) * 2015-12-16 2016-05-04 Tcl集团股份有限公司 Method and system for accessing WIFI module of the internet of things to network

Also Published As

Publication number Publication date
CN105813174A (en) 2016-07-27

Similar Documents

Publication Publication Date Title
Zillner et al. ZigBee exploited: The good, the bad and the ugly
US10362037B2 (en) Private cloud control
Margelis et al. Low throughput networks for the IoT: Lessons learned from industrial implementations
US20160219500A1 (en) Wireless device registration, such as automatic registration of a wi-fi enabled device
CN103428808B (en) Based on occurring that host apparatus controls the method and apparatus that passenger plane plant network accesses
US9628479B2 (en) Generating and using ephemeral identifiers and message integrity codes
US10587414B2 (en) Multi-broadcast beacon signals
KR101538424B1 (en) Terminal for payment and local network monitoring
JP6700688B2 (en) Device safety for process control systems
JP5844004B2 (en) Use a mobile device to allow another device to connect to a wireless network
US8549658B2 (en) Provisioning credentials for embedded wireless devices
Chen et al. Lightweight and provably secure user authentication with anonymity for the global mobility network
US8917651B2 (en) Associating wi-fi stations with an access point in a multi-access point infrastructure network
JP5879388B2 (en) Electronic lock, electronic locking system, electronic lock operating method, and computer program
TWI435584B (en) System of multiple domains and domain ownership
EP2487629B1 (en) Secure smart poster
ES2293391T3 (en) Configuration of network parameters of light customer devices that use portable data supports.
CN104540186B (en) Method, device and system for wireless network access
US8787575B2 (en) Method and apparatus for propagating encryption keys between wireless communication devices
US7616594B2 (en) Wireless device discovery and configuration
CN101534505B (en) Communication device and communication method
KR101229703B1 (en) Anonymous authentication method based on pre-shared cipher key, reader-writer, electronic tag and system thereof
CN101138204B (en) Method, device, system and internet network gateway for establishing VPN
US7912224B2 (en) Wireless network system and communication method for external device to temporarily access wireless network
CN103929748B (en) A kind of Internet of Things wireless terminal and its collocation method and wireless network access point

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
GR01 Patent grant
GR01 Patent grant