CN106302415A - A kind of method verifying equipment validity and distribution automatic to legitimate device - Google Patents
A kind of method verifying equipment validity and distribution automatic to legitimate device Download PDFInfo
- Publication number
- CN106302415A CN106302415A CN201610633801.0A CN201610633801A CN106302415A CN 106302415 A CN106302415 A CN 106302415A CN 201610633801 A CN201610633801 A CN 201610633801A CN 106302415 A CN106302415 A CN 106302415A
- Authority
- CN
- China
- Prior art keywords
- equipment
- distribution
- validity
- legitimate
- automatic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
Abstract
A kind of method verifying equipment validity and distribution automatic to legitimate device, it includes that the device A specifically comprising the following steps that (1) non-access network of failed cluster equipment and networked devices, its checking failed cluster equipment validity and automatic distribution broadcasts self-defined management frame;(2) the equipment B having accessed Internet of Things network receives the management frame of device A broadcast, initiates the point-to-point communication with device A and carries out authentication;(3) device A provides identity information to equipment B when receiving authentication request;(4) equipment B is by certificate authority and the legitimacy of Cloud Server checking device A and deployment scenario, if device A is that legitimate device then enters step (5), if device A is the connection of illegality equipment then off device B and device A;(5) equipment B and device A consult key, and the encryption of the distribution information such as SSID and password is sent to A;(6) device A deciphering obtains SSID and key, carries out network configuration.
Description
Technical field
The present invention relates to a kind of method verifying equipment validity and distribution automatic to legitimate device.
Background technology
Internet of Things is the important component part of generation information technology, is also the important development stage in " information-based " epoch.
Its English name is: " Internet of things(IoT) ".As its name suggests, Internet of Things is exactly the Internet that thing thing is connected.This
Having two-layer to look like: one, core and the basis of Internet of Things remain the Internet, are the extension on Internet basic and extension
Network;Its two, its user side extend and extend between any article and article, carry out information exchange and communicate, namely
Thing thing ceases mutually.Internet of Things passes through Intellisense, the technology that identifies communicates cognition technology with general fit calculation etc., is widely used in network
In fusion, the most therefore it is referred to as the third wave of world information industry development after computer, the Internet.
But the problem of Internet of Things safety the most increasingly comes into one's own.Connect afterwards owing to internet of things equipment is probably first to dispose
So how network, and Internet of things node left unguarded, carry out long-range CAMEL-Subscription-Information to internet of things equipment and business information joined
Put and just become a difficult problem.Pat it addition, huge and diversified platform of internet of things is necessarily required to a powerful and unified bursting tube
Platform, the most independent platform can be flooded by Internet of Things miscellaneous application, but consequently, it is possible to how to Internet of Things machine
The safety information such as daily record are managed becoming new problem, and may isolate the trusting relationship between network and business platform,
Cause the generation of new round safety problem.
And on the other hand, along with smart machine and the universal and development of Smart Home, increasing equipment can join
In the ranks of smart machine or internet of things equipment, it is anticipated that, there is a large amount of equipment of human-computer interaction that lacks when network insertion
May require that the most loaded down with trivial details operation.Simultaneously because the disappearance of specification, the access way of various brand products is also not quite similar, therefore
Bad Consumer's Experience is brought to user.Additionally, along with increasing equipment accesses subscriber household/office Intranet, assailant
Also have increasing means and approach steal user profile or control the equipment in user environment, cause potential safety hazard, for
Loss is brought at family.Wherein, guiding client that one illegal equipment is accessed Intranet is a most direct and effective method, non-
Method equipment can receive assailant and instruct steal information or camouflage, control it while realizing the basic function of legitimate device
His equipment.
Scheme needs user one by one equipment to be carried out network configuration, as it is shown in figure 1, main flow is described as follows at present:
Equipment is illustratively entered into configuration mode by l, opens bluetooth or ADHOC function generally by button;
The smart machines such as mobile phone are configured to bluetooth or the ADHOC pattern mated with equipment by l;
L connects equipment by bluetooth or ADHOC;
L configures network by the mobile phone application that equipment is corresponding for equipment;
Equipment is illustratively entered into wifi pattern by l;
The bluetooth of l closing hand phone or ADHOC function.
Additionally, when needing to configure the use environment of another equipment, more exchange device, or when change SSID or password,
Need every equipment again according to above flow operations.
The structure of such scheme as in figure 2 it is shown, comprise 1, memory module, including store code, configuration information and other
Data;2, mixed-media network modules mixed-media, including achieving 802.11 protocol families, ICP/IP protocol bunch and upper-layer protocol;3, functions of the equipments are realized
Master controller and other functional modules.Its application is as it is shown on figure 3, specific as follows:
1, illegality equipment D configures access Intranet by user;
2, monitoring owing in net, data are very easy, therefore equipment D can obtain leading between device A and the Internet the most easily
News data;
3, equipment D forwards the data to the assailant of far-end;
4, data are cracked by assailant, obtain sensitive information;
5, assailant can disguise oneself as cloud A control device A, cause potential safety hazard.
Have the disadvantage in that
1, inconvenient operation, is individually arranged each equipment, and operates comparatively laborious;
2, safety, due to user cannot the safety of effective discrimination apparatus, illegal/equipment of forging also can access user
Institute in a network, thus causes damage or becomes the point of attack of hacker;
3, inconvenient equipment transportation, needs when changing conditions for equipment use to reconfigure.
Summary of the invention
The invention provides a kind of automatic checking and automatic distribution, facilitate the checking equipment validity of equipment transportation and involutory
The method of the automatic distribution of method equipment.
The technical solution used in the present invention is:
A kind of method verifying equipment validity and distribution automatic to legitimate device, it includes that failed cluster equipment and having networked sets
Standby, its checking failed cluster equipment validity and the specifically comprising the following steps that of automatic distribution
(1) device A of non-access network broadcasts self-defined management frame;
(2) the equipment B having accessed Internet of Things network receives the management frame of device A broadcast, initiates the point-to-point communication with device A
Carry out authentication;
(3) device A provides identity information to equipment B when receiving authentication request;
(4) equipment B is by certificate authority and the legitimacy of Cloud Server checking device A and deployment scenario, if device A is to close
Method equipment then enters step (5), if device A is the connection of illegality equipment then off device B and device A;
(5) equipment B and device A consult key, and the encryption of the distribution information such as SSID and password is sent to A;
(6) device A deciphering obtains SSID and key, carries out network configuration.The failed cluster equipment of the present invention is by self-defined management
Frame is found networked devices and carries out the data interaction of the degree of depth with it and carry out identification of equipment validity and automatically configure network, real
Now distribution automatically, reduces user operation, and can prevent illegality equipment from accessing the harm caused, improve safety in utilization.
Further, if equipment is legitimate device, the memory module internal memory of this equipment contains to be promulgated by certificate authority
The certificate meeting X.509 standard, by the legitimacy of this certification authentication equipment.The certificate format issued due to CA center is all
Specification, even therefore the product of different brands also can verify mutually legitimacy, improve versatility.
Further, described self-defined management frame is self-defined management frames based on 802.11 agreements, and it is arranged on equipment
In mixed-media network modules mixed-media.Utilize undefined management frame in self-defined 802.11, it is achieved the communication before equipment access, it is achieved distribution automatically
Function.
Beneficial effects of the present invention:
1, ease for use, it is achieved the automatic distribution of equipment, reduces the operation of user.
2, versatility, the PKI system that certificate of utility/CA realizes has good versatility, it is to avoid the barrier between brand.
3, equipment validity checking, realizes the automatic checking to equipment validity based on PKI system, it is not necessary to user tests
Card.
4, safety promotes, and cuts off between illegality equipment and assailant by the way of refusal illegality equipment accesses Intranet
Contact, thus stop assailant by illegality equipment to the monitoring of intranet data and camouflage.
5, do not increase cost, due to the equipment of the present invention on hardware without changing, it is only necessary to revise the software of each module
Can realize, it is not necessary to increase the hardware cost of equipment, the most do not increase product cost.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet that existing equipment carries out network configuration.
Fig. 2 is the existing structural representation needing distribution net equipment.
Fig. 3 is the application schematic diagram between existing distribution net equipment.
Fig. 4 is the schematic flow sheet that present device carries out network configuration.
Fig. 5 is the structural representation that the present invention needs distribution net equipment.
Fig. 6 is the application schematic diagram between distribution net equipment of the present invention.
Detailed description of the invention
Below in conjunction with specific embodiment, the present invention is further described, but does not limit the invention to these tools
Body embodiment.One skilled in the art would recognize that present invention encompasses and potentially included in Claims scope
All alternatives, improvement project and equivalents.
With reference to Fig. 4, Fig. 5, a kind of method verifying equipment validity and distribution automatic to legitimate device, it includes failed cluster
Specifically comprising the following steps that of equipment and networked devices, its checking failed cluster equipment validity and automatic distribution
(1) device A of non-access network broadcasts self-defined management frame;
(2) the equipment B having accessed Internet of Things network receives the management frame of device A broadcast, initiates the point-to-point communication with device A
Carry out authentication;
(3) device A provides identity information to equipment B when receiving authentication request;
(4) equipment B verifies legitimacy and the deployment scenario of device A by certificate authority (CA center) and Cloud Server, as
Device A is that legitimate device then enters step (5), if device A is the connection of illegality equipment then off device B and device A;
(5) equipment B and device A consult key, and the encryption of the distribution information such as SSID and password is sent to A;
(6) device A deciphering obtains SSID and key, carries out network configuration.The failed cluster equipment of the present invention is by self-defined management
Frame is found networked devices and carries out the data interaction of the degree of depth with it and carry out identification of equipment validity and automatically configure network, real
Now distribution automatically, reduces user operation, and can prevent illegality equipment from accessing the harm caused, improve safety in utilization.This
Bright equipment B only verifies when device A is legitimate device, just can enter and the stage of device A negotiation key, otherwise be not responding to set
The subsequent request of standby A.Wherein equipment B can be one based on the present invention design router, it is also possible to be one based on this
Bright and the common smart machine in access network.As long as having a stylobate in the equipment of the present invention, follow-up equipment in present invention net
Just can be automatically added to, distribution automation;Before adding and add entrance and equipment in net can be carried out legitimacy based on certificate/CA and recognizes
Card, prevents illegality equipment from accessing and works the mischief, improve safety;When changing conditions for equipment use, if having one in target environment
Stylobate is in the equipment of the present invention, then without reconfiguring.
If the present embodiment equipment is legitimate device, the memory module internal memory of this equipment contains to be promulgated by certificate authority
The certificate meeting X.509 standard, by the legitimacy of this certification authentication equipment.The certificate format issued due to CA center is all
Specification, even therefore the product of different brands also can verify mutually legitimacy, improve versatility.
Self-defined management frame described in the present embodiment is self-defined management frames based on 802.11 agreements, and it is arranged on equipment
In mixed-media network modules mixed-media.
The present invention utilizes undefined management frame in 802.11, it is achieved equipment communication before accessing to a network, by drawing
Enter PKI system, it is achieved the legitimate verification of equipment.Wherein PKI is the initial contracting of Public Key Infrastructure
Writing, translation comes to be exactly PKIX;PKI be a kind of follow standard utilize public key cryptography opening for ecommerce
Exhibition provides technology and the specification of a set of foundation for security platform.X.509 in standard, in order to be different from Rights Management infrastructure
(Privilege Management Infrastructure is called for short PMI), it is defined as PKI supporting public-key cryptography management energy
Support certification, encryption, integrity and the infrastructure of accountability service.
The present invention increases on the basis of original and stores the certificate meeting X.509 standard that CA center is issued, for real
The certification of existing equipment validity;Add the agreements based on 802.11 self-defined management frames realizing automated validation and distribution.On
State amendment all not want equipment and have the change on hardware, it is only necessary to revise the software realization of each module, do not increase products-hardware cost.
Additionally, when equipment need not strict deployment management, management cloud can not be used maybe management function to be integrated in
CA realizes.
During present invention application networking, as shown in Figure 6.It possesses following characteristics:
1, net in equipment can utilize management Yun He CA center, to attempt to join network or net in other equipment enter
Row legitimate verification;
2, the certificate format issued due to CA center is all specification, even therefore the product of different brands also can be verified mutually
Legitimacy;
3, equipment whether is allowed to access owing to high in the clouds management has only to provide, therefore by adding a unified interface command i.e.
Can realize;
4, use certificate and the PKI system of CA realization due to legitimacy certification, extensively demonstrated its peace by industries such as finance
Full property and operability;
5, cut off the contact between illegality equipment and assailant by the method for refusal distribution, cut off assailant by illegal
The approach that equipment works the mischief.
Claims (3)
1. verifying equipment validity and a method for distribution automatic to legitimate device, it includes that failed cluster equipment and having networked sets
Standby, its checking failed cluster equipment validity and the specifically comprising the following steps that of automatic distribution
(1) device A of non-access network broadcasts self-defined management frame;
(2) the equipment B having accessed Internet of Things network receives the management frame of device A broadcast, initiates the point-to-point communication with device A
Carry out authentication;
(3) device A provides identity information to equipment B when receiving authentication request;
(4) equipment B is by certificate authority and the legitimacy of Cloud Server checking device A and deployment scenario, if device A is to close
Method equipment then enters step (5), if device A is the connection of illegality equipment then off device B and device A;
(5) equipment B and device A consult key, and the encryption of the distribution information such as SSID and password is sent to A;
(6) device A deciphering obtains SSID and key, carries out network configuration.
2. according to a kind of method verifying equipment validity and distribution automatic to legitimate device described in power 1, it is characterised in that: as
Really equipment is legitimate device, and the memory module internal memory of this equipment contains and met X.509 standard by what certificate authority was promulgated
Certificate.
3., according to a kind of method verifying equipment validity and distribution automatic to legitimate device described in power 1 or 2, its feature exists
In: described self-defined management frame is self-defined management frames based on 802.11 agreements, and it is arranged in the mixed-media network modules mixed-media of equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610633801.0A CN106302415A (en) | 2016-08-03 | 2016-08-03 | A kind of method verifying equipment validity and distribution automatic to legitimate device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610633801.0A CN106302415A (en) | 2016-08-03 | 2016-08-03 | A kind of method verifying equipment validity and distribution automatic to legitimate device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106302415A true CN106302415A (en) | 2017-01-04 |
Family
ID=57664916
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610633801.0A Pending CN106302415A (en) | 2016-08-03 | 2016-08-03 | A kind of method verifying equipment validity and distribution automatic to legitimate device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106302415A (en) |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108337239A (en) * | 2017-01-10 | 2018-07-27 | 信特尼有限公司 | The event of electronic equipment proves |
CN108834137A (en) * | 2018-05-17 | 2018-11-16 | 四川斐讯信息技术有限公司 | A kind of distribution method and system of wireless router |
CN108924135A (en) * | 2018-06-29 | 2018-11-30 | 百度在线网络技术(北京)有限公司 | Method for network access and device |
CN109005028A (en) * | 2018-11-02 | 2018-12-14 | 美的集团股份有限公司 | Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system |
CN109041268A (en) * | 2018-10-31 | 2018-12-18 | 北京小米移动软件有限公司 | The management method and device of WIFI connection |
CN109219042A (en) * | 2018-10-31 | 2019-01-15 | 全讯汇聚网络科技(北京)有限公司 | Wireless network automatically accesses method and system |
CN109245886A (en) * | 2018-11-02 | 2019-01-18 | 美的集团股份有限公司 | Cryptographic key negotiation method, equipment, storage medium and system |
CN109981360A (en) * | 2019-03-15 | 2019-07-05 | 深圳力维智联技术有限公司 | Internet of things equipment website activating method, device, system and storage medium |
CN110192197A (en) * | 2017-01-12 | 2019-08-30 | 霍尼韦尔国际公司 | Identity is established by using certificate and trusts the technology to realize the guarantee of certified products equipment |
CN110324290A (en) * | 2018-03-30 | 2019-10-11 | 贵州白山云科技股份有限公司 | Method, network element device, medium and the computer equipment of network equipment certification |
CN110365511A (en) * | 2018-04-11 | 2019-10-22 | 乐鑫信息科技(上海)股份有限公司 | Network collocating method, device, equipment, system and storage medium |
CN110601870A (en) * | 2019-07-31 | 2019-12-20 | 华为技术有限公司 | Method, device and system for registering device distribution network |
CN111327656A (en) * | 2018-12-14 | 2020-06-23 | 美的集团股份有限公司 | Equipment networking method, medium, network card and device |
CN111711979A (en) * | 2020-06-15 | 2020-09-25 | 北京自如信息科技有限公司 | WIFI module network distribution method, device and system and storage medium |
CN111918283A (en) * | 2020-07-27 | 2020-11-10 | 宁波奥克斯电气股份有限公司 | Network distribution method, device and system of Internet of things equipment and storage medium |
CN112383902A (en) * | 2020-11-04 | 2021-02-19 | 深圳优地科技有限公司 | Robot communication method, device, equipment and storage medium |
CN113114668A (en) * | 2021-04-09 | 2021-07-13 | 北京石头世纪科技股份有限公司 | Information transmission method, mobile terminal, storage medium and electronic equipment |
CN113507709A (en) * | 2021-09-10 | 2021-10-15 | 中国人民解放军总医院 | Automatic network connection method and device for medical equipment in scene of medical internet of things |
CN113596030A (en) * | 2021-07-29 | 2021-11-02 | 深圳Tcl新技术有限公司 | Equipment network distribution method and device, storage medium and electronic equipment |
CN114501452A (en) * | 2022-03-31 | 2022-05-13 | 深圳博纳移动信息技术有限公司 | Access management method and system for multi-type hardware equipment |
WO2022166755A1 (en) * | 2021-02-05 | 2022-08-11 | Oppo广东移动通信有限公司 | Information processing methods, devices, and storage medium |
CN115334496A (en) * | 2020-02-21 | 2022-11-11 | 华为技术有限公司 | Method for discovering and distributing network, electronic equipment and system |
CN116250287A (en) * | 2020-07-31 | 2023-06-09 | Oppo广东移动通信有限公司 | Method for authenticating equipment access, terminal equipment and cloud platform |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102137395A (en) * | 2010-09-09 | 2011-07-27 | 华为技术有限公司 | Method, device and system for configuring access device |
CN104618988A (en) * | 2015-01-21 | 2015-05-13 | 青岛海尔智能家电科技有限公司 | Smart device network access method and device |
CN104683343A (en) * | 2015-03-03 | 2015-06-03 | 中山大学 | Method for rapidly logging WiFi hotspot by terminal |
CN104798432A (en) * | 2012-12-11 | 2015-07-22 | 英特尔公司 | Device to-device (D2D) discovery without authenticating through cloud |
CN104796894A (en) * | 2014-01-22 | 2015-07-22 | 海尔集团公司 | Configuration information transmission method and equipment |
CN105188058A (en) * | 2015-09-25 | 2015-12-23 | 上海矽昌通信技术有限公司 | Authentication method for performing identity recognition at WIFI (Wireless Fidelity) scanning stage |
CN105517103A (en) * | 2015-12-03 | 2016-04-20 | 小米科技有限责任公司 | Network access method and device based on intelligent terminal device |
CN105636040A (en) * | 2015-12-17 | 2016-06-01 | 美的集团股份有限公司 | Device networking method and system |
-
2016
- 2016-08-03 CN CN201610633801.0A patent/CN106302415A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102137395A (en) * | 2010-09-09 | 2011-07-27 | 华为技术有限公司 | Method, device and system for configuring access device |
CN104798432A (en) * | 2012-12-11 | 2015-07-22 | 英特尔公司 | Device to-device (D2D) discovery without authenticating through cloud |
CN104796894A (en) * | 2014-01-22 | 2015-07-22 | 海尔集团公司 | Configuration information transmission method and equipment |
CN104618988A (en) * | 2015-01-21 | 2015-05-13 | 青岛海尔智能家电科技有限公司 | Smart device network access method and device |
CN104683343A (en) * | 2015-03-03 | 2015-06-03 | 中山大学 | Method for rapidly logging WiFi hotspot by terminal |
CN105188058A (en) * | 2015-09-25 | 2015-12-23 | 上海矽昌通信技术有限公司 | Authentication method for performing identity recognition at WIFI (Wireless Fidelity) scanning stage |
CN105517103A (en) * | 2015-12-03 | 2016-04-20 | 小米科技有限责任公司 | Network access method and device based on intelligent terminal device |
CN105636040A (en) * | 2015-12-17 | 2016-06-01 | 美的集团股份有限公司 | Device networking method and system |
Cited By (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108337239B (en) * | 2017-01-10 | 2022-09-02 | 信特尼有限公司 | Event attestation of electronic devices |
CN108337239A (en) * | 2017-01-10 | 2018-07-27 | 信特尼有限公司 | The event of electronic equipment proves |
CN110192197A (en) * | 2017-01-12 | 2019-08-30 | 霍尼韦尔国际公司 | Identity is established by using certificate and trusts the technology to realize the guarantee of certified products equipment |
CN110192197B (en) * | 2017-01-12 | 2023-10-27 | 霍尼韦尔国际公司 | Technique for implementing genuine equipment assurance by establishing identity and trust using certificates |
CN110324290B (en) * | 2018-03-30 | 2022-02-01 | 贵州白山云科技股份有限公司 | Network equipment authentication method, network element equipment, medium and computer equipment |
CN110324290A (en) * | 2018-03-30 | 2019-10-11 | 贵州白山云科技股份有限公司 | Method, network element device, medium and the computer equipment of network equipment certification |
CN110365511B (en) * | 2018-04-11 | 2022-07-19 | 乐鑫信息科技(上海)股份有限公司 | Network configuration method, device, equipment, system and storage medium |
CN110365511A (en) * | 2018-04-11 | 2019-10-22 | 乐鑫信息科技(上海)股份有限公司 | Network collocating method, device, equipment, system and storage medium |
CN108834137A (en) * | 2018-05-17 | 2018-11-16 | 四川斐讯信息技术有限公司 | A kind of distribution method and system of wireless router |
CN108924135A (en) * | 2018-06-29 | 2018-11-30 | 百度在线网络技术(北京)有限公司 | Method for network access and device |
CN109219042A (en) * | 2018-10-31 | 2019-01-15 | 全讯汇聚网络科技(北京)有限公司 | Wireless network automatically accesses method and system |
CN109041268A (en) * | 2018-10-31 | 2018-12-18 | 北京小米移动软件有限公司 | The management method and device of WIFI connection |
CN109245886A (en) * | 2018-11-02 | 2019-01-18 | 美的集团股份有限公司 | Cryptographic key negotiation method, equipment, storage medium and system |
CN109005028A (en) * | 2018-11-02 | 2018-12-14 | 美的集团股份有限公司 | Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system |
CN111327656A (en) * | 2018-12-14 | 2020-06-23 | 美的集团股份有限公司 | Equipment networking method, medium, network card and device |
CN109981360A (en) * | 2019-03-15 | 2019-07-05 | 深圳力维智联技术有限公司 | Internet of things equipment website activating method, device, system and storage medium |
CN110601870A (en) * | 2019-07-31 | 2019-12-20 | 华为技术有限公司 | Method, device and system for registering device distribution network |
US11895494B2 (en) | 2019-07-31 | 2024-02-06 | Huawei Technologies Co., Ltd. | Device network configuration and registration method, device, and system |
WO2021018153A1 (en) * | 2019-07-31 | 2021-02-04 | 华为技术有限公司 | Device distribution network registration method, device, and system |
CN114095355A (en) * | 2019-07-31 | 2022-02-25 | 华为技术有限公司 | Method, device and system for registering device distribution network |
CN115334496A (en) * | 2020-02-21 | 2022-11-11 | 华为技术有限公司 | Method for discovering and distributing network, electronic equipment and system |
CN111711979B (en) * | 2020-06-15 | 2021-03-30 | 北京自如信息科技有限公司 | WIFI module network distribution method, device and system and storage medium |
CN111711979A (en) * | 2020-06-15 | 2020-09-25 | 北京自如信息科技有限公司 | WIFI module network distribution method, device and system and storage medium |
CN111918283A (en) * | 2020-07-27 | 2020-11-10 | 宁波奥克斯电气股份有限公司 | Network distribution method, device and system of Internet of things equipment and storage medium |
CN116250287A (en) * | 2020-07-31 | 2023-06-09 | Oppo广东移动通信有限公司 | Method for authenticating equipment access, terminal equipment and cloud platform |
CN112383902A (en) * | 2020-11-04 | 2021-02-19 | 深圳优地科技有限公司 | Robot communication method, device, equipment and storage medium |
WO2022166755A1 (en) * | 2021-02-05 | 2022-08-11 | Oppo广东移动通信有限公司 | Information processing methods, devices, and storage medium |
CN113114668B (en) * | 2021-04-09 | 2023-11-03 | 北京石头世纪科技股份有限公司 | Information transmission method, mobile terminal, storage medium and electronic equipment |
CN113114668A (en) * | 2021-04-09 | 2021-07-13 | 北京石头世纪科技股份有限公司 | Information transmission method, mobile terminal, storage medium and electronic equipment |
CN113596030A (en) * | 2021-07-29 | 2021-11-02 | 深圳Tcl新技术有限公司 | Equipment network distribution method and device, storage medium and electronic equipment |
CN113596030B (en) * | 2021-07-29 | 2023-10-17 | 深圳Tcl新技术有限公司 | Equipment network distribution method and device, storage medium and electronic equipment |
CN113507709A (en) * | 2021-09-10 | 2021-10-15 | 中国人民解放军总医院 | Automatic network connection method and device for medical equipment in scene of medical internet of things |
CN114501452A (en) * | 2022-03-31 | 2022-05-13 | 深圳博纳移动信息技术有限公司 | Access management method and system for multi-type hardware equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106302415A (en) | A kind of method verifying equipment validity and distribution automatic to legitimate device | |
CN101730987B (en) | Managing network components using USB keys | |
US9763094B2 (en) | Methods, devices and systems for dynamic network access administration | |
CN102724175B (en) | The telecommunication safety management framework of ubiquitous green community net control and method | |
CN102271133B (en) | Authentication method, device and system | |
EP2658207B1 (en) | Authorization method and terminal device | |
TW201933848A (en) | Device connection method, device and system | |
CN105682093A (en) | Wireless network access method and access device, and client | |
CN101309272A (en) | Authentication server and mobile communication terminal access controlling method of virtual private network | |
JP2015053674A (en) | Method for safely accessing network from personal device, personal device, network server, and access point | |
CN106790251B (en) | User access method and user access system | |
CN106209847A (en) | Electric data transmission method and device | |
CN106254329A (en) | For the method protecting computer network security | |
CN105392137A (en) | Household WIFI embezzlement preventing method, wireless router and terminal equipment | |
CN109583154A (en) | A kind of system and method based on Web middleware access intelligent code key | |
WO2018107544A1 (en) | Intelligent device and household appliance | |
WO2018090831A1 (en) | Method and apparatus allowing smart terminal device to access internet | |
CN102185840A (en) | Authentication method, authentication equipment and authentication system | |
CN111614476A (en) | Equipment configuration method, system and device | |
CN101119383A (en) | Method and apparatus of establishing iSCSI conversation for objective terminal and initiating terminal | |
CN102143165B (en) | Method, network switch and network system for authenticating terminals | |
CN106537962B (en) | Wireless network configuration, access and access method, device and equipment | |
CN112637138A (en) | Method and related device for realizing multi-server secret-free login | |
CN106302409A (en) | The electric data transmission method of cross-safety zone | |
EP3085007B1 (en) | Push-based trust model for public cloud applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170104 |
|
RJ01 | Rejection of invention patent application after publication |