CN106921675A - The method and apparatus that a kind of Intelligent hardware accesses limited network - Google Patents
The method and apparatus that a kind of Intelligent hardware accesses limited network Download PDFInfo
- Publication number
- CN106921675A CN106921675A CN201710204108.6A CN201710204108A CN106921675A CN 106921675 A CN106921675 A CN 106921675A CN 201710204108 A CN201710204108 A CN 201710204108A CN 106921675 A CN106921675 A CN 106921675A
- Authority
- CN
- China
- Prior art keywords
- network
- login authentication
- point
- intelligent hardware
- limited
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/256—NAT traversal
- H04L61/2571—NAT traversal for identification, e.g. for authentication or billing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Abstract
The invention provides the method and apparatus that a kind of Intelligent hardware accesses limited network.Methods described includes:When it is the limited network for needing login authentication to detect access network, point to point network is created;Receive the login authentication information that the controlling equipment with input unit sends;It is second network address of the Intelligent hardware in limited network by first network address conversion of the network address of the login authentication information by the controlling equipment in point to point network;The login authentication information based on second network address is sent to the login authentication server of the limited network, and accesses the limited network.The Intelligent hardware without input unit is accessed by the controlling equipment proxy authentication with input unit in the present invention needs the limited network of login authentication, it is not necessary to change router setting, the Intelligent hardware framework of limited network, while ensure that the security of public network.
Description
Technical field
The present invention relates to network technique field, more particularly to a kind of Intelligent hardware accesses the method and dress of limited network
Put.
Background technology
With the development of internet and Intelligent hardware, there are the need of access network in many Intelligent hardwares without input unit
Ask.These Intelligent hardwares access need the network of web authentication when, due to no input unit, it is impossible to complete on web authentication
Net.
The authentication function of the normally closed router of way for solving the above problems at present, but this way can influence net
The security of network.Also, it is also infeasible for public network to change the operation of configuration of routers.
The content of the invention
In view of the above problems, it is proposed that the embodiment of the present invention overcomes above mentioned problem or at least in part to provide one kind
The method and apparatus that a kind of Intelligent hardware for solving the above problems accesses limited network.
According to the first aspect of the embodiment of the present invention, there is provided a kind of method that Intelligent hardware accesses limited network, application
In the Intelligent hardware without input unit, methods described includes:
When it is the limited network for needing login authentication to detect access network, point to point network is created;
Receive the login authentication information that the controlling equipment with input unit sends;
First network ground by the network address of the login authentication information by the controlling equipment in point to point network
Location is converted to second network address of the Intelligent hardware in limited network;
The login authentication information based on second network address is sent to the login authentication of the limited network
Server, and access the limited network.
Alternatively, before the login authentication information of the controlling equipment transmission received with input unit, the side
Method also includes:
Receive the login authentication page that the login authentication server sends;
Second network address by the network address of the login authentication page by the Intelligent hardware in limited network
Be converted to first network address of the controlling equipment in point to point network;
The login authentication page based on the first network address is sent to the controlling equipment.
Alternatively, before the establishment point to point network, methods described also includes:
Connect the access network;
The corresponding web page server of network address set to user sends probe requests thereby;
Receive the feedback response that the web page server sends;
Judge whether the feedback response is specific response;
If the feedback response is not specific response, access network is judged as the limited network of login authentication is needed.
Alternatively, after the establishment point to point network, methods described also includes:
The group owner that the Intelligent hardware is the point to point network is set.
Second aspect according to embodiments of the present invention, there is provided a kind of method that Intelligent hardware accesses limited network, application
In the controlling equipment with input unit, methods described includes:
Configuration information according to point to point network connects the Intelligent hardware in the point to point network, wherein described point-to-point
The configuration information of network includes network identity and connection password;
Receive the login authentication information of user input;
The login authentication information is sent to the Intelligent hardware, so that the Intelligent hardware accesses the limited net
Network.
Alternatively, before the login authentication information of the reception user input, methods described also includes:
The login authentication page that the Intelligent hardware sends is received, and shows the login authentication page.
The third aspect according to embodiments of the present invention, there is provided a kind of Intelligent hardware accesses the device of limited network, application
In the Intelligent hardware without input unit, described device includes:
Point to point network creation module, for when it is the limited network for needing login authentication to detect access network, creating
Point to point network;
First login authentication information receiver module, for receiving the login authentication that the controlling equipment with input unit sends
Information;
First network address conversion module, for the network address of the login authentication information to be existed by the controlling equipment
First network address conversion in point to point network is second network address of the Intelligent hardware in limited network;
First login authentication information sending module, for the login authentication information by second network address is based on
Send to the login authentication server, and access the limited network.
Alternatively, described device also includes:
First login authentication page receiver module, for receiving the login authentication page that the login authentication server sends
Face;
Second network address conversion module, for the network address of the login authentication page to be existed by the Intelligent hardware
The second network address translation in limited network is first network address of the controlling equipment in point to point network;
Login authentication page sending module, for the login authentication page based on the first network address to be sent
To the controlling equipment.
Alternatively, described device also includes:
Access network link block, for connecting the access network;
Probe requests thereby sending module, the corresponding web page server of network address for being set to user sends probe requests thereby;
Feedback response receiver module, for receiving the feedback response that the web page server sends;
Specific response judge module, for judging whether the feedback response is specific response;
Limited network determination module, if not being specific response for the feedback response, judges that access network is needs
The limited network of login authentication.
Alternatively, described device also includes:
Group owner's setup module, for setting the group owner that the Intelligent hardware is the point to point network.
Fourth aspect according to embodiments of the present invention, there is provided a kind of Intelligent hardware accesses the device of limited network, application
In the controlling equipment with input unit, described device includes:
Intelligent hardware link block, for connecting the intelligence in the point to point network according to the configuration information of point to point network
Energy hardware, wherein the configuration information of the point to point network includes network identity and connection password;
Second login authentication information receiver module, the login authentication information for receiving user input;
Second login authentication information sending module, for the login authentication information to be sent to the Intelligent hardware, with
The Intelligent hardware is set to access the limited network.
Alternatively, described device also includes:
Second login page receiver module, for receiving the login authentication page that the Intelligent hardware sends, and shows institute
State the login authentication page.
It is to need receiving for login authentication when the Intelligent hardware without input unit detects access network according to the embodiment of the present invention
During limit network, point to point network is created;Receive the login authentication information that the controlling equipment with input unit sends;Login is tested
First network address conversion of the network address of card information by controlling equipment in point to point network is Intelligent hardware in limited net
Second network address in network;The login authentication that login authentication information based on second network address is sent to limited network is taken
Business device, and access limited network.By the embodiment of the present invention, the Intelligent hardware without input unit is by the behaviour with input unit
The certification of control proxy for equipment accesses the limited network for needing login authentication, it is not necessary to which router setting, the intelligence for changing limited network are hard
Part framework, while ensure that the security of public network.
Described above is only the general introduction of technical solution of the present invention, in order to better understand technological means of the invention,
And can be practiced according to the content of specification, and in order to allow the above and other objects of the present invention, feature and advantage can
Become apparent, below especially exemplified by specific embodiment of the invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit is common for this area
Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention
Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
The step of Fig. 1 is a kind of method of according to embodiments of the present invention one Intelligent hardware access limited network flow chart;
The step of Fig. 2 is a kind of method of according to embodiments of the present invention two Intelligent hardware access limited network flow chart;
The step of Fig. 3 is a kind of method of according to embodiments of the present invention three Intelligent hardware access limited network flow chart;
Fig. 4 is a kind of structured flowchart of the device of according to embodiments of the present invention four Intelligent hardware access limited network;
Fig. 5 is a kind of structured flowchart of the device of according to embodiments of the present invention five Intelligent hardware access limited network.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
Limited.Conversely, there is provided these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure
Complete conveys to those skilled in the art.
Embodiment one
The method that a kind of Intelligent hardware provided in an embodiment of the present invention accesses limited network is discussed in detail.
Reference picture 1, shows that the step of a kind of Intelligent hardware in the embodiment of the present invention accesses the method for limited network is flowed
Cheng Tu, is applied to the Intelligent hardware without input unit, and methods described includes:
Step 101, when it is the limited network for needing login authentication to detect access network, creates point to point network.
In the present embodiment, Intelligent hardware is by way of software and hardware combining, legacy equipment to be transformed, and allows it to possess
Intelligentized function.After intellectuality, hardware possesses the ability of connection, realizes the loading of Internet service.Intelligent hardware is specific
Can include at least one of intelligent watch, intelligent television, intelligent toy, intelligent automobile, these Intelligent hardwares do not have keyboard or
The input units such as touch-screen, when access needs the limited network of login authentication, it is impossible to validation information, thus cannot access
Limited network.For example, user uses intelligent watch A down-load musics, intelligent watch A is without input unit, it is impossible to validation information,
Therefore limited network can not be accessed.Limited network can be internet, or LAN, and the embodiment of the present invention is not made to this
Limit in detail, can be configured according to actual conditions.It is to need being limited for login authentication when Intelligent hardware detects access network
During network, point to point network is created.Point-to-point (Peer-to-Peer, P2P) network is a kind of peer-to-peer network, is not had in a network
The brother of node of the concept of client and server, only equality.
Step 102, receives the login authentication information that the controlling equipment with input unit sends.
In the present embodiment, can be received from input unit with input unit controlling equipment and ordered, so as to be grasped according to order
Control other equipment, input unit can be keyboard or touch-screen, or other devices.The embodiment of the present invention is not made in detail to this
It is thin to limit, can be configured according to actual conditions.Can specifically include mobile phone, panel computer with input unit controlling equipment
At least one of.Intelligent hardware without input unit waits controlling equipment connection point to point network after point to point network is set up.
For example, after intelligent watch A creates point to point network, waiting mobile phone B to be connected into the point to point network of intelligent watch A establishments.
After the controlling equipment with input unit connects Intelligent hardware, user is in controlling equipment input login authentication letter
Login authentication information is sent to Intelligent hardware by breath, controlling equipment, and Intelligent hardware receives the login authentication letter that controlling equipment sends
Breath.For example, user is input into login authentication information in mobile phone B, login authentication information is sent to intelligent watch A, intelligent hand by mobile phone B
Table A receives the login authentication information that mobile phone B sends.
Step 103, by the network address of the login authentication information by the controlling equipment in point to point network
One network address translation is second network address of the Intelligent hardware in limited network.
In the present embodiment, Intelligent hardware opening network address conversion (Network Address after point to point network is set up
Translation, NAT) function.After Intelligent hardware receives the login authentication information that controlling equipment sends, at Intelligent hardware end pair
Login authentication information carries out network address translation.Specifically, it is the network address of login authentication information is right in point by controlling equipment
First network address conversion in spot net is second network address of the Intelligent hardware in limited network, network address translation
Afterwards, login authentication information has second network address.For example, login authentication information is sent to intelligent watch A by mobile phone B, now
The network address of login authentication information is network address XXX.001 of the mobile phone B in point to point network, and intelligent watch A is received
It is the network address of the intelligent watch A in limited network by the network address translation of login authentication information after login authentication information
XXX.002, after network address translation, the network address of login authentication information is changed into XXX.002.
Step 104, the login authentication information for being converted into second network address sends to the login of the limited network and tests
Card server, and access the limited network.
In the present embodiment, the login authentication information based on second network address is sent to stepping on for limited network by Intelligent hardware
Record authentication server, after login authentication server authentication log-on message is correct, it is allowed to which Intelligent hardware accesses limited network.For example,
Intelligent watch A sends to login authentication server C, login authentication server C the login authentication information of network address XXX.002
After checking log-on message is correct, it is allowed to intelligent watch A access networks.
In sum, in the embodiment of the present invention, when the Intelligent hardware without input unit detects access network to need to log in
During the limited network of checking, point to point network is created;Receive the login authentication information that the controlling equipment with input unit sends;
It is Intelligent hardware by first network address conversion of the network address of login authentication information by controlling equipment in point to point network
Second network address in limited network;Login authentication information based on second network address is sent to the clothes of limited network
Business device, and access limited network.By the embodiment of the present invention, the Intelligent hardware without input unit is by the behaviour with input unit
The certification of control proxy for equipment accesses the limited network for needing login authentication, it is not necessary to which router setting, the intelligence for changing limited network are hard
Part framework, while ensure that the security of public network.
Embodiment two
Reference picture 2, shows that the step of a kind of Intelligent hardware in the embodiment of the present invention accesses the method for limited network is flowed
Journey, is applied to the Intelligent hardware without input unit, and methods described includes:.
Step 201, connects the access network.
In this implementation, Intelligent hardware judges whether network to be accessed is to need receiving for login authentication in access network
Limit network, if not needing login authentication, Intelligent hardware can be directly accessed network;If necessary to login authentication, then need
Point to point network is set up, by controlling equipment access network.
First, Intelligent hardware connects the access network.Intelligent hardware is set up with access network and is connected, and interconnection technique is existing
There is technology, the present invention is repeated no more.
Step 202, the corresponding web page server of network address set to the user sends probe requests thereby.
In the present embodiment, Intelligent hardware receives the network address of user's setting, is sent out to the corresponding web page server of the network address of setting
Send probe requests thereby.For example, the network address that user sets is www.xxx.com, Intelligent hardware is then to the corresponding webpages of www.xxx.com
Server D sends probe requests thereby.The embodiment of the present invention does not make restriction in detail to the particular content and form of probe requests thereby, can be with root
It is configured according to actual conditions.
Step 203, receives the feedback response that the web page server sends.
In the present embodiment, web page server receive Intelligent hardware transmission probe requests thereby after, according to actual conditions to
Intelligent hardware sends feedback response, and Intelligent hardware receives the feedback response that web page server sends.For example, the network address of user's setting
Corresponding web page server D sends feedback response after the probe requests thereby for receiving intelligent watch A transmissions to Intelligent hardware A.
Step 204, judges whether the feedback response is specific response.
In the present embodiment, whether Intelligent hardware judges feedback response after the feedback response that web page server sends is received
It is specific response.For example, intelligent watch A is after the specific response that web page server D sends is received, judge to respond whether be
www.xxx.com.Specific response has fixed form, and the embodiment of the present invention does not make restriction in detail to specific form, can be with
It is configured according to actual conditions.
Step 205, if the feedback response is not specific response, judges access network as the limited of login authentication is needed
Network.
In the present embodiment, when feedback response is the set form of Intelligent hardware requirement, then access network is judged not need
Carry out the untethered network of login authentication;When feedback response is not the set form of Intelligent hardware requirement, then access network is judged
To need the limited network of login authentication.For example, the response that web page server D feeds back to is www.xxx.com, then judge to access
Network is the untethered network for not needing login authentication;If the response that web page server D feeds back to is not www.xxx.com,
Then judge that access network is the limited network for needing login authentication.
Step 206, when it is the limited network for needing login authentication to detect access network, creates point to point network.
Step 207, sets the group owner that the Intelligent hardware is the point to point network.
In the present embodiment, after Intelligent hardware sets up point to point network, Intelligent hardware is set for the group of point to point network possesses
Person (Group Owner, GO), accesses the other equipment of point to point network as client.For example, intelligent watch A establishment points are right
After spot net, intelligent watch A is set to a group owner, and accesses the mobile phone B of point to point network as client.
Step 208, receives the login authentication page that the login authentication server sends.
In the present embodiment, after Intelligent hardware creates point to point network, controlling equipment connection Intelligent hardware is waited, work as manipulation
After equipment connection Intelligent hardware, logging request is sent to login authentication server by Intelligent hardware, then login authentication server
The login authentication page is sent to Intelligent hardware.Intelligent hardware receives the login authentication page that login authentication server sends.For example,
After mobile phone B connection intelligent watch A, send login authentication to login authentication server C and ask, then login authentication server C is to intelligence
Expert's Table A sends the login authentication page, and intelligent watch A receives the login authentication page that login authentication server C sends.
Step 209, by the network address of the login authentication page by the Intelligent hardware in limited network second
Network address translation is first network address of the controlling equipment in point to point network.
In the present embodiment, Intelligent hardware carries out network address translation to the login authentication page for receiving.Specifically, will be described
Second network address translation of the network address of the login authentication page by the Intelligent hardware in limited network is the manipulation
First network address of the equipment in point to point network.For example, the login authentication page is sent to intelligence by login authentication server C
Wrist-watch A, now the network address of the login authentication page is network address XXX.002s of the intelligent watch A in limited network, intelligence
After wrist-watch A receives the login authentication page, by the network address translation of the login authentication page be mobile phone B in point to point network
Network address XXX.001, after network address translation, the network address of the login authentication page is changed into XXX.002.
Step 210, the login authentication page based on the first network address is sent to the controlling equipment.
In the present embodiment, after Intelligent hardware is by the login authentication conversion of page network address, it is sent in point to point network
Controlling equipment.
Step 211, receives the login authentication information that the controlling equipment with input unit sends.
Step 212, by the network address of the login authentication information by the controlling equipment in point to point network
One network address translation is second network address of the Intelligent hardware in limited network.
Step 213, the login authentication information based on second network address is sent to the limited network
Server, and access the limited network.
In sum, in the embodiment of the present invention, when the Intelligent hardware without input unit detects access network to need to log in
During the limited network of checking, point to point network is created;The login authentication page that login authentication server sends is received, login is tested
Card conversion of page is sent to controlling equipment behind the network address;The login authentication information that controlling equipment sends is received, by login authentication
Sent behind message switching network address to login authentication server, and access limited network.By the embodiment of the present invention, without input
The Intelligent hardware of device is accessed by the controlling equipment proxy authentication with input unit needs the limited network of login authentication, is not required to
Change router setting, the Intelligent hardware framework of limited network, while ensure that the security of public network.
Embodiment three
Reference picture 3, shows that the step of a kind of Intelligent hardware in the embodiment of the present invention accesses the method for limited network is flowed
Journey, is applied to the controlling equipment with input unit, and methods described includes:
Step 301, the configuration information according to point to point network connects the Intelligent hardware in the point to point network, wherein institute
Stating the configuration information of point to point network includes network identity and connection password.
In the present embodiment, the Intelligent hardware without input unit set up after point to point network show point to point network with confidence
Breath, wherein the configuration information of the point to point network includes network identity and connection password, the controlling equipment with input unit
Intelligent hardware in point to point network is connected according to configuration information.Specifically, Intelligent hardware shows net after setting up point to point network
Network is identified and connection password, and user is input into the connection password of point to point network, Intelligent hardware according to network identity to controlling equipment
After checking connection password passes through, controlling equipment connection Intelligent hardware.For example, intelligent watch A creates point to point network, displaying point is right
The network identity of spot net is M, and connection password is N, and it is right that user finds the point that network identity is M in the display panel of mobile phone B
Spot net, input connects password N, then mobile phone B connection intelligent watch A.
After Intelligent hardware is connected, logging request, login authentication clothes are sent to login authentication server by Intelligent hardware
Business device sends the login authentication page to Intelligent hardware, and Intelligent hardware will be sent to manipulation behind the login authentication conversion of page network address
Equipment.Controlling equipment receives the login authentication page that the Intelligent hardware sends, and shows the login authentication page.For example,
The login authentication page that login authentication server C sends is sent to mobile phone B by intelligent watch A, and mobile phone B receives intelligent watch A hairs
The login authentication page for sending, and show the login authentication page on a display screen.
Step 302, receives the login authentication information of user input.
In the present embodiment, the controlling equipment displaying login authentication page receives the login authentication information of user input.Manipulation sets
The standby login authentication information that user input can be received by touch-screen, it is also possible to which the login for receiving user input by keyboard is tested
Card information.The embodiment of the present invention does not make restriction in detail to this, can be configured according to actual conditions.
Step 303, the login authentication information is sent to the Intelligent hardware, so that Intelligent hardware access is described
Limited network.
In the present embodiment, after controlling equipment receives the login authentication information of user input, login authentication information is sent
To Intelligent hardware, login authentication information is sent to login authentication server by Intelligent hardware after receiving login authentication information, is logged in
Authentication server confirms that login authentication information correctly allows Intelligent hardware to access limited network afterwards.For example, mobile phone B reception user is defeated
The login authentication information for entering, intelligent watch A is sent to by login authentication information, and be sent to for login authentication information by intelligent watch A
After login authentication server C, login authentication server C checking log-on message are correct, it is allowed to which intelligent watch A accesses limited network.
In sum, in the embodiment of the present invention, the controlling equipment with input unit is according to point to point network with confidence
Intelligent hardware in breath connection point to point network, the wherein configuration information of point to point network include network identity and connection password;
Receive the login authentication information of user input;Login authentication information is sent to Intelligent hardware, so that Intelligent hardware access is described
Limited network.By the embodiment of the present invention, the Intelligent hardware without input unit is acted on behalf of by the controlling equipment with input unit
Certification accesses the limited network for needing login authentication, it is not necessary to change router setting, the Intelligent hardware framework of limited network, while
Ensure that the security of public network.
It should be noted that for foregoing embodiment of the method, in order to be briefly described, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should know, and the present invention is not limited by described sequence of movement, because according to
According to the present invention, some steps can sequentially or simultaneously be carried out using other.Secondly, those skilled in the art should also know,
Embodiment described in this description belongs to preferred embodiment, and involved action is not necessarily essential to the invention.
Example IV
The device that a kind of Intelligent hardware provided in an embodiment of the present invention accesses limited network is discussed in detail.
Reference picture 4, shows that a kind of Intelligent hardware in the embodiment of the present invention accesses the structural frames of the device of limited network
Figure, is applied to the Intelligent hardware without input unit, and described device includes:
Point to point network creation module 401, for when it is the limited network for needing login authentication to detect access network, creating
Build point to point network;
First login authentication information receiver module 402, for receiving the login that the controlling equipment with input unit sends
Checking information;
First network address conversion module 403, for the network address of the login authentication information to be set by the manipulation
The standby first network address conversion in point to point network is second network address of the Intelligent hardware in limited network;
First login authentication information sending module 404, for the login authentication by second network address is based on
Information is sent to the login authentication server of the limited network, and accesses the limited network.
In the embodiment of the present invention, it is preferable that before the login authentication information receiver module, described device also includes:
First login authentication page receiver module, for receiving the login authentication page that the login authentication server sends
Face;
Second network address conversion module, for the network address of the login authentication page to be existed by the Intelligent hardware
The second network address translation in limited network is first network address of the controlling equipment in point to point network;
Login authentication page sending module, for the login authentication page based on the first network address to be sent
To the controlling equipment.
In the embodiment of the present invention, it is preferable that described device also includes:
Access network link block, for connecting the access network;
Probe requests thereby sending module, the corresponding web page server of network address for being set to the user sends detection please
Ask;
Feedback response receiver module, for receiving the feedback response that the web page server sends;
Specific response judge module, for judging whether the feedback response is specific response;
Limited network determination module, if not being specific response for the feedback response, judges that access network is needs
The limited network of login authentication.
In the embodiment of the present invention, it is preferable that described device also includes:
Group owner's setup module, for setting the group owner that the Intelligent hardware is the point to point network.
In sum, in the embodiment of the present invention, when the Intelligent hardware without input unit detects access network to need to log in
During the limited network of checking, point to point network is created;Receive the login authentication information that the controlling equipment with input unit sends;
It is Intelligent hardware by first network address conversion of the network address of login authentication information by controlling equipment in point to point network
Second network address in limited network;Login authentication information based on second network address is sent into stepping on to limited network
Record authentication server, and access limited network.By the embodiment of the present invention, the Intelligent hardware without input unit is by having input
The controlling equipment proxy authentication of device accesses the limited network for needing login authentication, it is not necessary to which the router for changing limited network sets
Put, Intelligent hardware framework, while ensure that the security of public network.
Embodiment five
The device that a kind of Intelligent hardware provided in an embodiment of the present invention accesses limited network is discussed in detail.
Reference picture 5, shows that a kind of Intelligent hardware in the embodiment of the present invention accesses the structural frames of the device of limited network
Figure, is applied to the controlling equipment with input unit, and described device includes:
Intelligent hardware link block 501, for according in the configuration information of the point to point network connection point to point network
Intelligent hardware, wherein the configuration information of the point to point network include network identity and connection password;
Second login authentication information receiver module 502, the login authentication information for receiving user input;
Second login authentication information sending module 503, for the login authentication information to be sent to the Intelligent hardware,
So that the Intelligent hardware accesses the limited network.
In the embodiment of the present invention, it is preferable that before the second login authentication information receiver module, described device is also wrapped
Include:
Second login authentication page receiver module, for receiving the login authentication page that the Intelligent hardware sends.
In sum, in the embodiment of the present invention, the controlling equipment with input unit is according to point to point network with confidence
Intelligent hardware in breath connection point to point network, the wherein configuration information of point to point network include network identity and connection password;
Receive the login authentication information of user input;Login authentication information is sent to Intelligent hardware, so that Intelligent hardware access is described
Limited network.By the embodiment of the present invention, the Intelligent hardware without input unit is acted on behalf of by the controlling equipment with input unit
Certification accesses the limited network for needing login authentication, it is not necessary to change router setting, the Intelligent hardware framework of limited network, while
Ensure that the security of public network.
For the device embodiment that above-mentioned Intelligent hardware accesses limited network, due to the basic phase of itself and embodiment of the method
Seemingly, so what is described is fairly simple, the relevent part can refer to the partial explaination of embodiments of method.
Each embodiment in this specification is described by the way of progressive, what each embodiment was stressed be with
The difference of other embodiment, between each embodiment identical similar part mutually referring to.
It would have readily occurred to a person skilled in the art that be:Any combination application of above-mentioned each embodiment is all feasible, therefore
Any combination between above-mentioned each embodiment is all embodiment of the present invention, but this specification exists as space is limited,
This is not just detailed one by one.
Provided herein Intelligent hardware access limited network scheme not with any certain computer, virtual system or its
Its equipment is inherently related.Various general-purpose systems can also be used together with based on teaching in this.As described above, construct
Structure required by system with the present invention program is obvious.Additionally, the present invention is not also directed to any certain programmed
Language.It is understood that, it is possible to use various programming languages realize the content of invention described herein, and above to specific language
The done description of speech is to disclose preferred forms of the invention.
In specification mentioned herein, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention
Example can be put into practice in the case of without these details.In some instances, known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify one or more that the disclosure and helping understands in each inventive aspect, exist
Above to the description of exemplary embodiment of the invention in, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor
The application claims of shield features more more than the feature being expressly recited in each claim.More precisely, such as right
As claim reflects, inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows tool
Thus claims of body implementation method are expressly incorporated in the specific embodiment, wherein each claim conduct in itself
Separate embodiments of the invention.
Those skilled in the art are appreciated that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment
Unit or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or
Sub-component.In addition at least some in such feature and/or process or unit exclude each other, can use any
Combine to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so disclosed appoint
Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power
Profit is required, summary and accompanying drawing) disclosed in each feature can the alternative features of or similar purpose identical, equivalent by offer carry out generation
Replace.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments
In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention
Within the scope of and form different embodiments.For example, in detail in the claims, embodiment required for protection it is one of any
Mode can use in any combination.
All parts embodiment of the invention can be realized with hardware, or be run with one or more processor
Software module realize, or with combinations thereof realize.It will be understood by those of skill in the art that can use in practice
Microprocessor or digital signal processor (DSP) access limited network realizing Intelligent hardware according to embodiments of the present invention
The some or all functions of some or all parts in scheme.The present invention is also implemented as being retouched here for execution
Some or all equipment or program of device (for example, computer program and computer program product) of the method stated.
It is such to realize that program of the invention be stored on a computer-readable medium, or can have one or more signal
Form.Such signal can be downloaded from internet website and obtained, or on carrier signal provide, or with it is any its
He provides form.
It should be noted that above-described embodiment the present invention will be described rather than limiting the invention, and ability
Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol being located between bracket should not be configured to limitations on claims.Word "comprising" is not excluded the presence of not
Element listed in the claims or step.Word "a" or "an" before element is not excluded the presence of as multiple
Element.The present invention can come real by means of the hardware for including some different elements and by means of properly programmed computer
It is existing.If in the unit claim for listing equipment for drying, several in these devices can be by same hardware branch
To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame
Claim.
Claims (12)
1. a kind of method that Intelligent hardware accesses limited network, is applied to the Intelligent hardware without input unit, it is characterised in that institute
The method of stating includes:
When it is the limited network for needing login authentication to detect access network, point to point network is created;
Receive the login authentication information that the controlling equipment with input unit sends;
First network address by the network address of the login authentication information by the controlling equipment in point to point network turns
It is changed to second network address of the Intelligent hardware in limited network;
The login authentication information based on second network address is sent to the login authentication service of the limited network
Device, and access the limited network.
2. method according to claim 1, it is characterised in that receive the controlling equipment with input unit and send described
Login authentication information before, methods described also includes:
Receive the login authentication page that the login authentication server sends;
The second network address translation by the network address of the login authentication page by the Intelligent hardware in limited network
The first network address for being the controlling equipment in point to point network;
The login authentication page based on the first network address is sent to the controlling equipment.
3. method according to claim 1, it is characterised in that before the establishment point to point network, methods described is also
Including:
Connect the access network;
The corresponding web page server of network address set to user sends probe requests thereby;
Receive the feedback response that the web page server sends;
Judge whether the feedback response is specific response;
If the feedback response is not specific response, access network is judged as the limited network of login authentication is needed.
4. method according to claim 1, it is characterised in that after the establishment point to point network, methods described is also
Including:
The group owner that the Intelligent hardware is the point to point network is set.
5. a kind of method that Intelligent hardware accesses limited network, is applied to the controlling equipment with input unit, it is characterised in that
Methods described includes:
Configuration information according to point to point network connects the Intelligent hardware in the point to point network, wherein the point to point network
Configuration information include network identity and connection password;
Receive the login authentication information of user input;
The login authentication information is sent to the Intelligent hardware, so that the Intelligent hardware accesses the limited network.
6. method according to claim 5, it is characterised in that the reception user input login authentication information it
Before, methods described also includes:
The login authentication page that the Intelligent hardware sends is received, and shows the login authentication page.
7. a kind of Intelligent hardware accesses the device of limited network, is applied to the Intelligent hardware without input unit, it is characterised in that institute
Stating device includes:
Point to point network creation module is right for when it is the limited network for needing login authentication to detect access network, creating point
Spot net;
First login authentication information receiver module, for receiving the login authentication letter that the controlling equipment with input unit sends
Breath;
First network address conversion module, for the network address of the login authentication information is right in point by the controlling equipment
First network address conversion in spot net is second network address of the Intelligent hardware in limited network;
First login authentication information sending module, for the login authentication information based on second network address to be sent
To the login authentication server, and access the limited network.
8. device according to claim 7, it is characterised in that described device also includes:
First login authentication page receiver module, for receiving the login authentication page that the login authentication server sends;
Second network address conversion module, for the network address of the login authentication page to be limited by the Intelligent hardware
The second network address translation in network is first network address of the controlling equipment in point to point network;
Login authentication page sending module, for the login authentication page based on the first network address to be sent to institute
State controlling equipment.
9. device according to claim 7, it is characterised in that described device also includes:
Access network link block, for connecting the access network;
Probe requests thereby sending module, the corresponding web page server of network address for being set to user sends probe requests thereby;
Feedback response receiver module, for receiving the feedback response that the web page server sends;
Specific response judge module, for judging whether the feedback response is specific response;
Limited network determination module, if not being specific response for the feedback response, judges access network to need to log in
The limited network of checking.
10. device according to claim 7, it is characterised in that described device also includes:
Group owner's setup module, for setting the group owner that the Intelligent hardware is the point to point network.
A kind of 11. Intelligent hardwares access the device of limited network, are applied to the controlling equipment with input unit, and its feature exists
In described device includes:
Intelligent hardware link block, it is hard for connecting the intelligence in the point to point network according to the configuration information of point to point network
Part, wherein the configuration information of the point to point network includes network identity and connection password;
Second login authentication information receiver module, the login authentication information for receiving user input;
Second login authentication information sending module, for the login authentication information to be sent to the Intelligent hardware, so that institute
State Intelligent hardware and access the limited network.
12. devices according to claim 11, it is characterised in that described device also includes:
Second login page receiver module, for receiving the login authentication page that the Intelligent hardware sends, and steps on described in displaying
The record checking page.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710204108.6A CN106921675B (en) | 2017-03-30 | 2017-03-30 | Method and device for accessing intelligent hardware to limited network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710204108.6A CN106921675B (en) | 2017-03-30 | 2017-03-30 | Method and device for accessing intelligent hardware to limited network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106921675A true CN106921675A (en) | 2017-07-04 |
CN106921675B CN106921675B (en) | 2020-06-26 |
Family
ID=59460820
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710204108.6A Active CN106921675B (en) | 2017-03-30 | 2017-03-30 | Method and device for accessing intelligent hardware to limited network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106921675B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107517219A (en) * | 2017-09-26 | 2017-12-26 | 歌尔科技有限公司 | A kind of device authorization method, treat authorisation device, intermediate equipment and system |
CN109640374A (en) * | 2017-10-09 | 2019-04-16 | 腾讯科技(深圳)有限公司 | Wireless network access, processing method, device, storage medium and computer equipment |
CN110072235A (en) * | 2018-01-24 | 2019-07-30 | 腾讯科技(深圳)有限公司 | Networking method, device, electronic device and the storage medium of smart machine |
CN110290497A (en) * | 2019-06-26 | 2019-09-27 | 广州小鹏汽车科技有限公司 | The method, apparatus and vehicle of car-mounted terminal access network |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103533392A (en) * | 2013-10-25 | 2014-01-22 | 乐视网信息技术(北京)股份有限公司 | Method, electronic device and system for logging in account |
CN103596021A (en) * | 2013-11-22 | 2014-02-19 | 乐视致新电子科技(天津)有限公司 | Account login method, device and system of intelligent television |
CN103686674A (en) * | 2013-09-30 | 2014-03-26 | 深圳市通力科技开发有限公司 | Network access method, intelligent terminal and WiFi access equipment |
CN103716911A (en) * | 2014-01-02 | 2014-04-09 | 福建星网锐捷通讯股份有限公司 | Method, device and system for configuring wireless terminal |
CN103763327A (en) * | 2014-01-28 | 2014-04-30 | 宇龙计算机通信科技(深圳)有限公司 | Account number logging-in method and system |
CN103986752A (en) * | 2014-05-08 | 2014-08-13 | 海信集团有限公司 | Method, device and system for inputting information on input interface of smart television set |
CN104320703A (en) * | 2014-10-30 | 2015-01-28 | 深圳市同洲电子股份有限公司 | Method, device and system for logging in intelligent television terminal |
CN104601685A (en) * | 2014-12-31 | 2015-05-06 | 广东欧珀移动通信有限公司 | Music playing method and device of smart sound box |
CN105792208A (en) * | 2016-02-29 | 2016-07-20 | 华为技术有限公司 | Method for controlling device access, related device and system |
US20160241401A1 (en) * | 2015-02-13 | 2016-08-18 | Xiaomi Inc. | Method and apparatus for binding device |
CN106535288A (en) * | 2015-09-10 | 2017-03-22 | 阿里巴巴集团控股有限公司 | Method for sending and obtaining wifi networking information and corresponding apparatus |
CN106535162A (en) * | 2015-09-15 | 2017-03-22 | 阿里巴巴集团控股有限公司 | Account information sending method and device as well as account information receiving method and device |
-
2017
- 2017-03-30 CN CN201710204108.6A patent/CN106921675B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103686674A (en) * | 2013-09-30 | 2014-03-26 | 深圳市通力科技开发有限公司 | Network access method, intelligent terminal and WiFi access equipment |
CN103533392A (en) * | 2013-10-25 | 2014-01-22 | 乐视网信息技术(北京)股份有限公司 | Method, electronic device and system for logging in account |
CN103596021A (en) * | 2013-11-22 | 2014-02-19 | 乐视致新电子科技(天津)有限公司 | Account login method, device and system of intelligent television |
CN103716911A (en) * | 2014-01-02 | 2014-04-09 | 福建星网锐捷通讯股份有限公司 | Method, device and system for configuring wireless terminal |
CN103763327A (en) * | 2014-01-28 | 2014-04-30 | 宇龙计算机通信科技(深圳)有限公司 | Account number logging-in method and system |
CN103986752A (en) * | 2014-05-08 | 2014-08-13 | 海信集团有限公司 | Method, device and system for inputting information on input interface of smart television set |
CN104320703A (en) * | 2014-10-30 | 2015-01-28 | 深圳市同洲电子股份有限公司 | Method, device and system for logging in intelligent television terminal |
CN104601685A (en) * | 2014-12-31 | 2015-05-06 | 广东欧珀移动通信有限公司 | Music playing method and device of smart sound box |
US20160241401A1 (en) * | 2015-02-13 | 2016-08-18 | Xiaomi Inc. | Method and apparatus for binding device |
CN106535288A (en) * | 2015-09-10 | 2017-03-22 | 阿里巴巴集团控股有限公司 | Method for sending and obtaining wifi networking information and corresponding apparatus |
CN106535162A (en) * | 2015-09-15 | 2017-03-22 | 阿里巴巴集团控股有限公司 | Account information sending method and device as well as account information receiving method and device |
CN105792208A (en) * | 2016-02-29 | 2016-07-20 | 华为技术有限公司 | Method for controlling device access, related device and system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107517219A (en) * | 2017-09-26 | 2017-12-26 | 歌尔科技有限公司 | A kind of device authorization method, treat authorisation device, intermediate equipment and system |
CN109640374A (en) * | 2017-10-09 | 2019-04-16 | 腾讯科技(深圳)有限公司 | Wireless network access, processing method, device, storage medium and computer equipment |
CN109640374B (en) * | 2017-10-09 | 2021-07-06 | 腾讯科技(深圳)有限公司 | Wireless network access method, wireless network processing device, storage medium and computer equipment |
CN110072235A (en) * | 2018-01-24 | 2019-07-30 | 腾讯科技(深圳)有限公司 | Networking method, device, electronic device and the storage medium of smart machine |
CN110072235B (en) * | 2018-01-24 | 2021-11-19 | 腾讯科技(深圳)有限公司 | Networking method and device for intelligent equipment, electronic device and storage medium |
CN110290497A (en) * | 2019-06-26 | 2019-09-27 | 广州小鹏汽车科技有限公司 | The method, apparatus and vehicle of car-mounted terminal access network |
Also Published As
Publication number | Publication date |
---|---|
CN106921675B (en) | 2020-06-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10079874B2 (en) | System, non-transitory computer readable medium storing a computer readable program for executing a method for an interaction logic through the system, and IoT interaction system | |
US9525598B1 (en) | Network testing device for automated topology validation | |
CN104348777B (en) | The access control method and system of a kind of mobile terminal to third-party server | |
CN106921675A (en) | The method and apparatus that a kind of Intelligent hardware accesses limited network | |
CN102197400A (en) | Network location determination for direct access networks | |
CN105939313B (en) | Status code reorientation method and device | |
CN110442524A (en) | It is a kind of for have Certificate Authority web service interface test method and device | |
CN104301311B (en) | The method and apparatus of DNS screen data contents | |
CN106685949A (en) | Container access method, container access device and container access system | |
CN104519050A (en) | Login method and login system | |
CN107590036A (en) | Remote debugging method, server and the system of Android device | |
US9244882B2 (en) | Provisioning network resources based on environment | |
CN110401641A (en) | User authen method, device, electronic equipment | |
CN108848162A (en) | Show connection method, display equipment and the system of equipment | |
CN103647652B (en) | A kind of method for realizing data transfer, device and server | |
CN105516061A (en) | Remote server access method and web server | |
US10263869B1 (en) | Analysis and testing of network devices | |
KR20210138095A (en) | Systems and methods for a virtual agent in a cloud computing environment | |
US11165783B1 (en) | Quantifying permissiveness of access control policies using model counting techniques and automated policy downscaling | |
CN105959278B (en) | A kind of method, apparatus and system for calling VPN | |
US11206699B2 (en) | Registering network devices using known host devices | |
CN113383515A (en) | Device enhancements for real-time communication | |
WO2019194170A1 (en) | Server implementing authentication using two-stage url, program recording medium, and method | |
CN110177096A (en) | Client certificate method, apparatus, medium and calculating equipment | |
CN105959197A (en) | SSL VPN user interface customization method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |