CN106686595A - Telephone configuration method and system - Google Patents

Telephone configuration method and system Download PDF

Info

Publication number
CN106686595A
CN106686595A CN201710113688.8A CN201710113688A CN106686595A CN 106686595 A CN106686595 A CN 106686595A CN 201710113688 A CN201710113688 A CN 201710113688A CN 106686595 A CN106686595 A CN 106686595A
Authority
CN
China
Prior art keywords
phone
wireless
wireless telephone
configuration file
telephone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710113688.8A
Other languages
Chinese (zh)
Inventor
孙永光
伊宝峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING FLYINGVOICE TECHNOLOGY Co Ltd
Original Assignee
BEIJING FLYINGVOICE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING FLYINGVOICE TECHNOLOGY Co Ltd filed Critical BEIJING FLYINGVOICE TECHNOLOGY Co Ltd
Priority to CN201710113688.8A priority Critical patent/CN106686595A/en
Publication of CN106686595A publication Critical patent/CN106686595A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6045Identity confirmation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the technical field of communication and discloses a telephone configuration method and system. The telephone configuration method comprises the steps that identity information of a legal telephone permitted to be accessed is obtained, and a legal telephone list is generated; a telephone configuration file of a wireless telephone to be accessed is generated; when a requirement for accessing the wireless telephone in the telephone configuration system is received, whether the wireless telephone corresponding to the request is accessed to a wireless telephone switch or not is decided according to the legal telephone list and an access authentication technology, and communication connection with the wireless telephone is established when the wireless telephone is permitted to be accessed to the wireless telephone switch; after communication connection is established, response is made for a downloading request of the telephone configuration file of the wireless telephone and a registration request of the wireless telephone. By adopting the telephone configuration method and the system, the configuration work of the telephones can be further simplified, meanwhile more telephones can be accessed, and reduction of overall communication costs of a user is facilitated.

Description

Telephone configuration method and system
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and a system for configuring a phone.
Background
With the development of communication technology, especially digital communication network, the traditional telephone communication system and digital communication network gradually merge, and the VOIP (Voice Over Internet Protocol) gateway cooperates with the traditional telephone mode to not only take the traditional usage habit of users into account, but also effectively utilize the low cost of digital network communication, thus achieving rapid development.
The inventor of the invention finds out that: the conventional network telephone communication system connects a telephone set and a PBX (Private Branch Exchange) by wire, and therefore has the following disadvantages:
(1): when the telephone is used, the telephone and the PBX are connected by the network cable, the problems of network cable length and wiring are considered, once too many devices are arranged, the operation cost of an enterprise is increased, and the tidiness of the office environment is influenced.
(2): under the influence of the actual size and production problems of the PBX equipment, currently, only 4 LAN (Local Area Network) ports are generally configured for one PBX equipment, which greatly limits the scalability of the number of the downstream equipment, and if the number of enterprises in actual work is considered, it may cause inconvenience to work if the communication can be performed only through a wire.
(3): on the other hand, if a wireless phone is used instead of a wired phone, the user is also required to manually configure relevant parameters (such as an account number and a password of the phone and an IP address of the SIP) on the wireless phone when registering the wireless phone.
Therefore, the existing phone communication scheme has the defects of high cost, complicated call preparation operation and the like, and cannot meet the requirements of users.
Disclosure of Invention
The embodiment of the invention aims to provide a phone configuration method and a phone configuration system, which further simplify the configuration work of phones, simultaneously can access a large number of phones and is beneficial to reducing the overall communication cost of users.
In order to solve the above technical problem, an embodiment of the present invention provides a phone configuration method, which is applied to a wireless telephone switch in a phone configuration system, and includes: acquiring identity information of a legal phone which is allowed to be accessed, and generating a legal phone list; generating a phone configuration file of a wireless phone to be accessed; when an access request of a wireless phone in a phone configuration system is received, whether the wireless phone corresponding to the access request is allowed to access the wireless phone switch or not is determined according to the legal phone list and an access authentication technology, and when the wireless phone is allowed to access the wireless phone switch, a communication connection is established with the wireless phone; and after the communication connection is established, responding to a downloading request of the phone configuration file of the wireless phone and a registration request of the wireless phone.
The embodiment of the invention also provides a phone configuration method, which is applied to a wireless phone in a phone configuration system and comprises the following steps: detecting surrounding wireless telephony switches using wireless auto-discovery techniques; when the wireless telephone exchange is detected, screening out the wireless telephone exchange manufactured by a preset manufacturer from the detected wireless telephone exchange; sending an access request of the wireless phone to the screened wireless phone switch; upon receiving a notification to permit the access request, establishing a communication connection with a wireless telephony switch corresponding to the access request; and downloading the phone configuration file of the wireless phone through the established communication connection, and registering the wireless phone according to the downloaded phone configuration file.
An embodiment of the present invention further provides a phone configuration system, including: a radiotelephone and a radiotelephone switch, the radiotelephone switch comprising: the system comprises an acquisition module, an access control module, a configuration file generation module and a phone registration service module; the wireless telephone includes: the system comprises a wireless automatic discovery and selection module, a configuration file downloading module and a phone registration module; the acquisition module is used for acquiring the identity information of the legal phone allowed to be accessed and generating a legal phone list; the configuration file generating module is used for generating a phone configuration file of a wireless phone to be accessed; the wireless automatic discovery and selection module is used for detecting surrounding wireless telephone exchanges by using a wireless automatic discovery technology, screening the wireless telephone exchanges manufactured by a preset manufacturer from the detected wireless telephone exchanges and sending an access request to the screened wireless telephone exchanges; the access control module is used for determining whether the wireless telephone corresponding to the access request is allowed to access the wireless telephone switch or not according to the legal telephone list and the access authentication technology when the access request of the wireless telephone is received, and establishing communication connection with the wireless telephone when the wireless telephone is allowed to access the wireless telephone switch; the configuration file downloading module is used for downloading the phone configuration file of the wireless phone after the wireless phone establishes communication connection with the wireless phone switch; the phone registration module is used for sending a registration request to the wireless phone switch according to the downloaded phone configuration file of the wireless phone; the phone registration service module is used for responding to the registration request to register the wireless phone.
Compared with the prior art, the embodiment of the invention respectively improves a wireless telephone exchange and a wireless telephone, wherein, the identity information of the legal telephone which is allowed to be accessed is obtained in advance on the wireless telephone exchange, a legal telephone list is generated, so that when an access request of the wireless telephone is received, whether the wireless telephone corresponding to the access request is allowed to be accessed to the wireless telephone exchange is determined according to the legal telephone list and an access authentication technology, and when the wireless telephone is allowed to be accessed to the wireless telephone exchange, the communication connection is established with the wireless telephone, so that a telephone communication system is safer, and a telephone configuration file of the wireless telephone to be accessed is generated in the wireless telephone exchange in advance, so that after the communication connection is established, the downloading request of the telephone configuration file of the wireless telephone and the registration request of the wireless telephone can be responded, the automatic downloading of the phone configuration file to the wireless phone is realized, so that the operation of manually configuring each wireless phone is avoided. The wireless telephone detects surrounding wireless telephone exchanges by using a wireless automatic discovery technology, and can screen out wireless telephone exchanges manufactured by preset manufacturers from the detected wireless telephone exchanges, so that an access request of the wireless telephone is sent to the screened wireless telephone exchanges, and the extension of the configuration time of the wireless telephone caused by the misconnection of the wireless telephone is avoided. Therefore, the embodiment has the advantages of simple operation, high safety, easy expansion of the downstream equipment, low cost and the like.
In addition, before the determining whether to allow the wireless phone corresponding to the access request to access the wireless phone switch according to the legal phone list and the access authentication technology, the method further includes: generating a service set identifier and a service password of the wireless telephone exchange, wherein the service set identifier and the service password are respectively used for a verification name and a verification password of the access authentication technology; the determining whether to allow the wireless phone corresponding to the access request to access the wireless telephone switch according to the legal phone list and the access authentication technology specifically includes: if the identity information of the wireless telephone requested to be accessed is consistent with one identity information in the legal telephone list and the service set identification and the service password of the wireless telephone switch carried by the access request are consistent with the verification name and the verification password of the wireless telephone switch, allowing the wireless telephone to be accessed into the wireless telephone switch; and if the identity information of the wireless telephone requested to be accessed is inconsistent with any identity information in the legal telephone list or the service set identification and the service password of the wireless telephone switch carried by the access request are inconsistent with the verification name and the verification password of the wireless telephone switch, rejecting the wireless telephone to be accessed into the wireless telephone switch. Therefore, the embodiment can prevent the illegal telephone from accessing the network and prevent the user network from being embezzled.
In addition, the generating of the service set identifier and the service password of the wireless telephone exchange specifically includes: and encrypting the prefix and the suffix by taking preset information as the prefix and the identity information of the wireless telephone switch as the suffix so as to generate the service set identifier and the service password of the wireless telephone switch. The security of the user network can be further improved by encryption technology.
In addition, the generating a phone configuration file of the wireless phone to be accessed specifically includes: generating a phone configuration file according to the legal phone list; naming the generated phone configuration file by using the identity information of the wireless phone and storing the phone configuration file to a preset path; the responding to the request for downloading the phone configuration file of the wireless phone specifically includes: when a phone configuration file downloading request from a wireless phone is monitored, the corresponding phone configuration file is searched according to the identity information of the wireless phone and is sent to the wireless phone. The identity information of the wireless telephone is used for naming the telephone configuration file, so that the telephone configuration file can be effectively prevented from being named repeatedly, and the telephone configuration file can be prevented from being reused.
In addition, the preset path is a TFTP/HTTP server; searching for a corresponding phone configuration file according to the identity information of the wireless phone specifically comprises: and positioning the storage path of the phone configuration file by utilizing the server parameter in the dynamic host configuration protocol, and positioning the phone configuration file by utilizing the file name parameter in the dynamic host configuration protocol.
In addition, the detecting the surrounding wireless telephone exchanges by using the wireless automatic discovery technology specifically comprises: detecting surrounding wireless telephone exchanges by utilizing a wireless detection probo broadcast request and receiving Beacon messages from the surrounding wireless telephone exchanges; when detecting the wireless telephone switch, sift out the wireless telephone switch made by the preset manufacturer from the detected wireless telephone switch, which specifically comprises: the wireless telephone exchange manufactured by a predetermined manufacturer is screened out according to a predetermined physical address MAC address of the wireless telephone exchange. Therefore, the problem that the configuration time of the telephone is prolonged because the legal telephone is automatically connected with the networks of other users can be avoided.
In addition, registering the wireless phone according to the downloaded phone configuration file specifically includes: and checking the downloaded phone configuration file, judging whether the downloaded phone configuration file is updated or not, and registering the wireless phone according to the updated phone configuration file. Therefore, the repeated configuration of the telephone can be avoided, and the waste of network resources is avoided.
In addition, after registering the wireless phone according to the downloaded phone profile, the method further includes: and deleting the downloaded phone configuration file. Therefore, the phone configuration file information can be prevented from being stolen, and the network security is further improved.
Drawings
Fig. 1 is a schematic structural diagram of a telephone set configuration system according to the present invention;
fig. 2 is a flow chart of a phone configuration method according to a first embodiment of the present invention;
fig. 3 is a flow chart of a phone configuration method according to a second embodiment of the present invention;
fig. 4 is a schematic structural diagram of a telephone set configuration system according to a third embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that numerous technical details are set forth in order to provide a better understanding of the present application in various embodiments of the present invention. However, the technical solution claimed in the present application can be implemented without these technical details and various changes and modifications based on the following embodiments.
As shown in fig. 1, the phone configuration system of the present invention includes: a radiotelephone switch 10 and a radiotelephone 11, wherein the radiotelephone 11 and the radiotelephone switch 10 can communicate using a wireless communication technology based on the IEEE802.11 standard. The wireless telephone exchange can be IPPBX, which is the integration of computer network and telephone exchange.
The invention avoids the need of users to manually configure the parameters such as account number, password, IP address of SIP (Session Initiation Protocol) server and the like for each wireless telephone when the wireless telephone and the wireless telephone switch are used for communication, and improves the wireless telephone and the wireless telephone switch respectively, thereby avoiding the trouble of manually configuring the parameters for each wireless telephone by the users, and leading the users to automatically complete the configuration of the wireless telephone only by inputting the identity information of the wireless telephone which needs to be accessed into the wireless telephone switch, thereby simplifying the configuration operation of the wireless telephone.
Based on this, as shown in fig. 2, a first embodiment of the present invention relates to a phone configuration method applied to a wireless telephone exchange in the phone configuration system shown in fig. 1.
The phone configuration method of the present embodiment includes:
step 201: and acquiring the identity information of the legal phone allowed to be accessed, and generating a legal phone list.
The valid phone refers to a wireless phone of the user, and the identity information of the valid phone may be a physical address of the wireless phone, i.e., a Media Access Control (MAC) address. The generated legal phone list is, for example, a list including a plurality of MAC addresses. The following method for acquiring identity information of a legal phone is illustrated as follows: after the IPPBX equipment in a factory state is powered on, a phone set setting page is entered, the MAC address of the phone is input in the page (for example, 0021F20C1201), and the identity information of the legal phone can be automatically acquired and a legal phone list can be generated by storing and restarting the IPPBX after the input is finished.
Step 202: and generating a phone configuration file of the wireless phone to be accessed.
The phone configuration file records an account number (i.e., an extension number of the wireless phone), a password, an IP address of the SIP server, and the like of a valid phone. A person skilled in the art may generate a phone profile of a wireless phone to be accessed by using a known method, which is not described herein again.
In one example, step 202 specifically includes: and generating a phone configuration file according to the legal phone list, naming the generated phone configuration file by using the identity information of the wireless phone, and storing the named phone configuration file to a preset path. For example, for a wireless phone with the identity information of "0021F 20C 1201" in the legitimate phone list, a phone profile named "0021F 20C 1201" is generated.
Step 203: a service set identification and a service password of the wireless telephone exchange are generated for a verification name and a verification password of the access authentication technology, respectively.
Wherein, step 203 specifically comprises: the prefix and the suffix are encrypted to generate a service set identifier and a service password of the wireless telephone exchange with the preset information as the prefix and the identity information of the wireless telephone exchange as the suffix. For example, the generation rule of the Service Set Identifier (SSID) is as follows: adding prefix FPX to 6 bits after MAC address of access device, then carrying out AES (Advanced Encryption Standard) Encryption, the generation rule of service cipher is: prefix PASS adds 6 bits after MAC address of access equipment, then AES encryption is carried out. The AES encryption key may be pre-configured in the radiotelephone switch and radiotelephone firmware at the time of manufacture. And the network security is further improved through an encryption technology.
In the present embodiment, the order between step 202 and step 203 is not limited.
Step 204: when receiving an access request of a wireless phone in a phone configuration system, determining whether the wireless phone corresponding to the access request is allowed to access a wireless phone switch according to a legal phone list and an access authentication technology, and establishing communication connection with the wireless phone when the wireless phone is allowed to access the wireless phone switch.
Step 204 specifically includes: when an access request of a wireless telephone is received, if the identity information of the wireless telephone requested to be accessed is consistent with one identity information in a legal telephone list and the service set identification and the service password of the wireless telephone switch carried by the access request are consistent with the verification name and the verification password of the wireless telephone switch, the wireless telephone is allowed to be accessed to the wireless telephone switch; and if the identity information of the wireless telephone requested to be accessed is inconsistent with any identity information in the legal telephone list or the service set identification and the service password of the wireless telephone switch carried by the access request are inconsistent with the verification name and the verification password of the wireless telephone switch, the wireless telephone is refused to be accessed to the wireless telephone switch. Therefore, when the wireless phone outside the legal phone list tries to connect the wireless telephone switch of the embodiment and the wireless phone requesting access fails to pass the authentication, the access is refused, so that the function of preventing the network from being stolen can be achieved, and the network security is improved.
Step 205: after the communication connection is established, a downloading request of a phone configuration file of the wireless phone and a registration request of the wireless phone are responded.
The method for responding to the downloading request of the phone configuration file of the wireless phone specifically comprises the following steps: when monitoring a downloading request of a phone configuration file of the wireless phone, the wireless phone switch searches the corresponding phone configuration file according to the identity information of the wireless phone and sends the phone configuration file to the wireless phone. The physical address is used as the identity information of the wireless phone, so that the identity of the wireless phone in the whole communication system has uniqueness, and the error of repeated setting of the phone configuration file can be avoided.
In one example, the phone profile may be stored in a TFTP/HTTP server, so that the server parameter (i.e., Option66 in DHCP) in a Dynamic Host Configuration Protocol (DHCP) may be used to locate the storage path of the phone profile, and the filename parameter (i.e., Option67 in DHCP) in the Dynamic Host Configuration Protocol may be used to locate the phone profile, so that the phone profile may be conveniently located.
Compared with the prior art, the method and the system have the advantages that the identity information of the wireless phone to be configured in the phone configuration system is input into the wireless telephone switch in advance, the phone configuration file of the wireless phone to be accessed is generated in the wireless telephone switch in a unified mode and is downloaded by the wireless phone, the wireless phone requested to be accessed is controlled according to the legal phone list and the access authentication technology, and the safety of a user network is improved.
Based on the above inventive concept, a second embodiment of the present invention relates to a phone configuration method, which is applied to a wireless phone in a phone configuration system. As shown in fig. 3, it includes:
step 301: surrounding wireless telephony switches are detected using wireless auto-discovery techniques.
In particular, surrounding wireless telephony switches may be detected using a wireless probe probo broadcast request and receiving Beacon messages from the surrounding wireless telephony switches.
Step 302: when a wireless telephone exchange is detected, a wireless telephone exchange manufactured by a predetermined manufacturer is screened out from the detected wireless telephone exchanges.
Specifically, a wireless telephone exchange manufactured by a predetermined manufacturer can be screened out according to a predetermined physical address MAC address of the wireless telephone exchange. A person skilled in the art can preset a physical address of a wireless telephone exchange to be accessed in a wireless telephone by a known method (wherein the preset physical address corresponds to a wireless telephone exchange product manufactured by a preset manufacturer), and screen out the wireless telephone exchange to be accessed according to the preset physical address, and meanwhile, the wireless telephone can also sort the detected signal strength of the wireless telephone exchange from high to low, so as to select the wireless telephone exchange with the strongest access signal strength.
Step 303: and sending the access request of the wireless phone to the screened wireless telephone exchange.
Step 304: upon receiving the notification of permission of the access request, the wireless telephone exchange corresponding to the access request establishes a communication connection.
Step 305: and downloading the phone configuration file of the wireless phone through the established communication connection, and registering the wireless phone according to the downloaded phone configuration file.
In step 305, the wireless phone will automatically complete the call related actions such as SIP registration, and the phone call environment is thus established, and then the phone can make normal call and talk.
The registration of the wireless phone according to the downloaded phone configuration file specifically comprises the following steps: and checking the downloaded phone configuration file, judging whether the downloaded phone configuration file is updated or not, and registering the wireless phone according to the updated phone configuration file. Specifically, a related file verification algorithm known to those skilled in the art may be used to verify the phone configuration file, and a verification result of the phone configuration file is stored, and if the verification result of the current phone configuration file is found to be different from the verification result stored last time, it is determined that the phone configuration file is updated, so that the phone registration may be performed again using the current phone configuration file, and if the verification results are the same, it is determined that the current phone configuration file is not updated, and it is not necessary to perform the phone registration using the current phone configuration file. It should be noted that, after the wireless phone registration is completed, the wireless phone is automatically restarted to enable the phone configuration to be effective.
Step 306: and deleting the downloaded phone configuration file. Namely, after the phone registration process is finished, the configuration in the phone configuration file is successfully applied to the phone configuration system, so that the phone configuration file can be deleted, and information in the phone configuration file is prevented from being stolen.
Compared with the prior art, the wireless phone can be matched with the wireless telephone switch in the phone configuration system, so that the wireless telephone switch needing to be accessed is automatically detected and screened out, the communication connection is established with the wireless telephone switch, the phone configuration file of the wireless telephone switch is downloaded from the wireless telephone switch, and the phone registration is automatically completed, and the phone configuration process is simplified.
The steps of the above methods are divided for clarity, and the implementation may be combined into one step or split some steps, and the steps are divided into multiple steps, so long as the steps contain the same logical relationship, which is within the protection scope of the present patent; it is within the scope of the patent to add insignificant modifications to the algorithms or processes or to introduce insignificant design changes to the core design without changing the algorithms or processes.
Based on the above inventive concept, a third embodiment of the present invention relates to a phone configuration system. As shown in fig. 4, it includes: a wireless telephone 11 and a wireless telephone exchange 10. Among other things, the radiotelephone switch 10 includes: an acquisition module 101, an access control module 102, a configuration file generation module 103, and a response module 104. The wireless telephone set 11 includes: a wireless auto-discovery and selection module 110, a profile download module 111, and a phone registration module 112. Wherein,
the obtaining module 101 is configured to obtain identity information of a valid phone allowed to be accessed, and generate a valid phone list.
The profile generation module 103 is configured to generate a phone profile of a wireless phone to be accessed.
The wireless auto-discovery and selection module 110 is used to detect surrounding wireless telephony switches using wireless auto-discovery technology and screen out wireless telephony switches manufactured by a predetermined manufacturer from the detected wireless telephony switches and transmit an access request to the screened wireless telephony switches.
The access control module 102 is configured to determine whether to allow the wireless phone corresponding to the access request to access the wireless phone switch according to the valid phone list and the access authentication technology when receiving the access request of the wireless phone, and establish a communication connection with the wireless phone when allowing the wireless phone to access the wireless phone switch.
The configuration file downloading module 111 is used for downloading the phone configuration file of the wireless phone after the wireless phone establishes a communication connection with the wireless phone switch.
The phone registration module 112 is configured to send a registration request to the wireless telephone exchange according to the downloaded phone profile of the wireless phone.
The response module 104 is configured to respond to the phone profile downloading request of the profile downloading module and the registration request of the phone registration module so as to complete phone registration.
Compared with the prior art, the embodiment respectively improves the wireless telephone exchange and the wireless telephone, wherein, the identity information of the legal telephone which is allowed to be accessed is obtained in advance on the wireless telephone exchange, and the legal telephone list is generated, so that when the access request of the wireless telephone is received, whether the wireless telephone corresponding to the access request is allowed to be accessed to the wireless telephone exchange is determined according to the legal telephone list and the access authentication technology, and when the wireless telephone is allowed to be accessed to the wireless telephone exchange, the communication connection is established with the wireless telephone, so that the telephone communication system is safer, and the telephone configuration file of the wireless telephone to be accessed is generated in advance in the wireless telephone exchange, so that after the communication connection is established, the downloading request of the telephone configuration file of the wireless telephone and the registration request of the wireless telephone can be responded, the automatic downloading of the phone configuration file to the wireless phone is realized, so that the operation of manually configuring each wireless phone is avoided. The wireless telephone detects surrounding wireless telephone exchanges by using a wireless automatic discovery technology, and can screen out wireless telephone exchanges manufactured by preset manufacturers from the detected wireless telephone exchanges, so that an access request of the wireless telephone is sent to the screened wireless telephone exchanges, and the extension of the configuration time of the wireless telephone caused by the misconnection of the wireless telephone is avoided. Therefore, the embodiment has the advantages of simple operation, high safety, easy expansion of the downstream equipment, low cost and the like.
It should be noted that each module referred to in this embodiment is a logical module, and in practical applications, one logical unit may be one physical unit, may be a part of one physical unit, and may be implemented by a combination of multiple physical units. In addition, in order to highlight the innovative part of the present invention, elements that are not so closely related to solving the technical problems proposed by the present invention are not introduced in the present embodiment, but this does not indicate that other elements are not present in the present embodiment.
Those skilled in the art can understand that all or part of the steps in the method of the foregoing embodiments may be implemented by a program to instruct related hardware, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, etc.) or a processor (processor) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.

Claims (10)

1. A phone configuration method is applied to a wireless telephone exchange in a phone configuration system, and is characterized by comprising the following steps:
acquiring identity information of a legal phone which is allowed to be accessed, and generating a legal phone list;
generating a phone configuration file of a wireless phone to be accessed;
when an access request of a wireless phone in a phone configuration system is received, whether the wireless phone corresponding to the access request is allowed to access the wireless phone switch or not is determined according to the legal phone list and an access authentication technology, and when the wireless phone is allowed to access the wireless phone switch, a communication connection is established with the wireless phone;
and after the communication connection is established, responding to a downloading request of the phone configuration file of the wireless phone and a registration request of the wireless phone.
2. The phone configuration method according to claim 1,
before the determining whether to allow the wireless phone corresponding to the access request to access the wireless phone switch according to the legal phone list and the access authentication technology, the method further includes:
generating a service set identifier and a service password of the wireless telephone exchange, wherein the service set identifier and the service password are respectively used for a verification name and a verification password of the access authentication technology;
the determining whether to allow the wireless phone corresponding to the access request to access the wireless telephone switch according to the legal phone list and the access authentication technology specifically includes:
if the identity information of the wireless telephone requested to be accessed is consistent with one identity information in the legal telephone list and the service set identification and the service password of the wireless telephone switch carried by the access request are consistent with the verification name and the verification password of the wireless telephone switch, allowing the wireless telephone to be accessed into the wireless telephone switch; and if the identity information of the wireless telephone requested to be accessed is inconsistent with any identity information in the legal telephone list or the service set identification and the service password of the wireless telephone switch carried by the access request are inconsistent with the verification name and the verification password of the wireless telephone switch, rejecting the wireless telephone to be accessed into the wireless telephone switch.
3. The phone configuration method according to claim 2,
the generating of the service set identifier and the service password of the wireless telephone exchange specifically includes:
and encrypting the prefix and the suffix by taking preset information as the prefix and the identity information of the wireless telephone switch as the suffix so as to generate the service set identifier and the service password of the wireless telephone switch.
4. The phone configuration method according to claim 1,
the generating of the phone configuration file of the wireless phone to be accessed specifically includes:
generating a phone configuration file according to the legal phone list;
naming the generated phone configuration file by using the identity information of the wireless phone and storing the phone configuration file to a preset path;
the responding to the request for downloading the phone configuration file of the wireless phone specifically includes:
when a phone configuration file downloading request from a wireless phone is monitored, the corresponding phone configuration file is searched according to the identity information of the wireless phone and is sent to the wireless phone.
5. The phone configuration method according to claim 4,
the preset path is a TFTP/HTTP server;
searching for a corresponding phone configuration file according to the identity information of the wireless phone specifically comprises:
and positioning the storage path of the phone configuration file by utilizing the server parameter in the dynamic host configuration protocol, and positioning the phone configuration file by utilizing the file name parameter in the dynamic host configuration protocol.
6. A phone configuration method is applied to a wireless phone in a phone configuration system, and is characterized by comprising the following steps:
detecting surrounding wireless telephony switches using wireless auto-discovery techniques;
when the wireless telephone exchange is detected, screening out the wireless telephone exchange manufactured by a preset manufacturer from the detected wireless telephone exchange;
sending an access request of the wireless phone to the screened wireless phone switch;
upon receiving a notification to permit the access request, establishing a communication connection with a wireless telephony switch corresponding to the access request;
and downloading the phone configuration file of the wireless phone through the established communication connection, and registering the wireless phone according to the downloaded phone configuration file.
7. The phone configuration method according to claim 6,
the method for detecting the surrounding wireless telephone exchanges by utilizing the wireless automatic discovery technology specifically comprises the following steps:
detecting surrounding wireless telephone exchanges by utilizing a wireless detection probo broadcast request and receiving Beacon messages from the surrounding wireless telephone exchanges;
when detecting the wireless telephone switch, sift out the wireless telephone switch made by the preset manufacturer from the detected wireless telephone switch, which specifically comprises:
the wireless telephone exchange manufactured by a predetermined manufacturer is screened out according to a predetermined physical address MAC address of the wireless telephone exchange.
8. The phone configuration method according to claim 6,
the registering the wireless phone according to the downloaded phone configuration file specifically includes:
and checking the downloaded phone configuration file, judging whether the downloaded phone configuration file is updated or not, and registering the wireless phone according to the updated phone configuration file.
9. The phone configuration method according to claim 6,
after registering the wireless phone according to the downloaded phone profile, the method further includes:
and deleting the downloaded phone configuration file.
10. A phone configuration system comprising: a radiotelephone and a radiotelephone switch, wherein,
the wireless telephony switch comprising: the device comprises an acquisition module, an access control module, a configuration file generation module and a response module;
the wireless telephone includes: the system comprises a wireless automatic discovery and selection module, a configuration file downloading module and a phone registration module;
the acquisition module is used for acquiring the identity information of the legal phone allowed to be accessed and generating a legal phone list;
the configuration file generating module is used for generating a phone configuration file of a wireless phone to be accessed;
the wireless automatic discovery and selection module is used for detecting surrounding wireless telephone exchanges by using a wireless automatic discovery technology, screening the wireless telephone exchanges manufactured by a preset manufacturer from the detected wireless telephone exchanges and sending an access request to the screened wireless telephone exchanges;
the access control module is used for determining whether the wireless telephone corresponding to the access request is allowed to access the wireless telephone switch or not according to the legal telephone list and the access authentication technology when the access request of the wireless telephone is received, and establishing communication connection with the wireless telephone when the wireless telephone is allowed to access the wireless telephone switch;
the configuration file downloading module is used for downloading the phone configuration file of the wireless phone after the wireless phone establishes communication connection with the wireless phone switch;
the phone registration module is used for sending a registration request to the wireless phone switch according to the downloaded phone configuration file of the wireless phone;
the response module is used for responding to the phone configuration file downloading request of the configuration file downloading module and the registration request of the phone registration module.
CN201710113688.8A 2017-02-28 2017-02-28 Telephone configuration method and system Pending CN106686595A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710113688.8A CN106686595A (en) 2017-02-28 2017-02-28 Telephone configuration method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710113688.8A CN106686595A (en) 2017-02-28 2017-02-28 Telephone configuration method and system

Publications (1)

Publication Number Publication Date
CN106686595A true CN106686595A (en) 2017-05-17

Family

ID=58862760

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710113688.8A Pending CN106686595A (en) 2017-02-28 2017-02-28 Telephone configuration method and system

Country Status (1)

Country Link
CN (1) CN106686595A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111355613A (en) * 2020-03-01 2020-06-30 南京汉隆科技有限公司 Operator configuration switching method and system applied to embedded network phone
CN115086489A (en) * 2022-06-30 2022-09-20 深圳电器公司 Terminal identity identification method and related device

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007106446A2 (en) * 2006-03-14 2007-09-20 Aastra Technologies Limited A method for configuring remote ip phones
JP2008294880A (en) * 2007-05-28 2008-12-04 Hitachi Ltd Ip telephone system automatic setting method
CN101702836A (en) * 2009-11-17 2010-05-05 中兴通讯股份有限公司 Method and device for establishing dial-up service
CN102014130A (en) * 2010-11-26 2011-04-13 成都智科通信技术有限公司 Automatic registration system of IP telephone of IP-PBX
CN102158487A (en) * 2011-04-01 2011-08-17 福建星网锐捷网络有限公司 Network access control method, system and device
CN104202745A (en) * 2014-09-16 2014-12-10 腾讯科技(深圳)有限公司 Wireless network configuration information sharing method, terminal and communication system
CN104284208A (en) * 2014-10-23 2015-01-14 航天数字传媒有限公司 Method and system for conducting parallel encryption through AES-CBC algorithm
CN105227794A (en) * 2015-09-29 2016-01-06 朱金怀 There is the VOIP telephone system of internal switch function and management function
CN106453049A (en) * 2016-10-11 2017-02-22 福建师范大学 Neighbor detection method capable of protecting position privacy

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007106446A2 (en) * 2006-03-14 2007-09-20 Aastra Technologies Limited A method for configuring remote ip phones
JP2008294880A (en) * 2007-05-28 2008-12-04 Hitachi Ltd Ip telephone system automatic setting method
CN101702836A (en) * 2009-11-17 2010-05-05 中兴通讯股份有限公司 Method and device for establishing dial-up service
CN102014130A (en) * 2010-11-26 2011-04-13 成都智科通信技术有限公司 Automatic registration system of IP telephone of IP-PBX
CN102158487A (en) * 2011-04-01 2011-08-17 福建星网锐捷网络有限公司 Network access control method, system and device
CN104202745A (en) * 2014-09-16 2014-12-10 腾讯科技(深圳)有限公司 Wireless network configuration information sharing method, terminal and communication system
CN104284208A (en) * 2014-10-23 2015-01-14 航天数字传媒有限公司 Method and system for conducting parallel encryption through AES-CBC algorithm
CN105227794A (en) * 2015-09-29 2016-01-06 朱金怀 There is the VOIP telephone system of internal switch function and management function
CN106453049A (en) * 2016-10-11 2017-02-22 福建师范大学 Neighbor detection method capable of protecting position privacy

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111355613A (en) * 2020-03-01 2020-06-30 南京汉隆科技有限公司 Operator configuration switching method and system applied to embedded network phone
CN115086489A (en) * 2022-06-30 2022-09-20 深圳电器公司 Terminal identity identification method and related device

Similar Documents

Publication Publication Date Title
US10505908B2 (en) System and method for automatic wireless connection between a portable terminal and a digital device
US20200153830A1 (en) Network authentication method, related device, and system
US8130635B2 (en) Network access nodes
EP2304902B1 (en) Network discovery and selection
CN105682093A (en) Wireless network access method and access device, and client
JP2011521510A (en) Access via non-3GPP access network
US10645125B2 (en) Computer system, a telecommunication device and a telecommunication network
US20230130053A1 (en) Systems and methods for virtual personal wi-fi network
GB2486798A (en) Automatic configuration of wireless access between a wireless device and an access point
US20080235185A1 (en) Communication system and method of accessing therefor
EP3504907A2 (en) Cellular network assisted wlan discovery and selection
CN109788528B (en) Access point and method and system for opening internet access service thereof
CN106686595A (en) Telephone configuration method and system
US11979401B2 (en) Automatic security device network
CN111492358A (en) Device authentication
CN106341374B (en) Method and device for limiting access of unlicensed user equipment to home gateway
EP3506588A1 (en) Method of authenticating access to a wireless communication network and corresponding apparatus
CN113347629A (en) Method, access point and terminal for providing network access service
CN111385371B (en) MAC address acquisition method, device and equipment
CA3046823C (en) Service set steering based upon device identifier
JP4796924B2 (en) Button phone system
JP7276960B2 (en) Relay device, relay method and relay program
CN113347627B (en) Wireless network access method, device and mobile terminal
CN116264682A (en) Equipment network access method and device, electronic equipment and storage medium
CN118828485A (en) Wireless access method, electronic device and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170517

RJ01 Rejection of invention patent application after publication