CN107969004B - Networking system and networking method - Google Patents

Networking system and networking method Download PDF

Info

Publication number
CN107969004B
CN107969004B CN201711048298.3A CN201711048298A CN107969004B CN 107969004 B CN107969004 B CN 107969004B CN 201711048298 A CN201711048298 A CN 201711048298A CN 107969004 B CN107969004 B CN 107969004B
Authority
CN
China
Prior art keywords
network
equipment
password
networking
name
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711048298.3A
Other languages
Chinese (zh)
Other versions
CN107969004A (en
Inventor
黄俊岚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yinglian Intelligent Technology Co.,Ltd.
Original Assignee
Shanghai Yinglian Telecom Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yinglian Telecom Technology Co ltd filed Critical Shanghai Yinglian Telecom Technology Co ltd
Priority to CN201711048298.3A priority Critical patent/CN107969004B/en
Priority to CN202010728825.0A priority patent/CN111866879A/en
Publication of CN107969004A publication Critical patent/CN107969004A/en
Application granted granted Critical
Publication of CN107969004B publication Critical patent/CN107969004B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Computer And Data Communications (AREA)

Abstract

The embodiment of the invention relates to the field of communication, and discloses a networking system and a networking method. In the invention, the self information of the equipment is broadcasted when the equipment is activated; the network AP sends a verification request to the network host when scanning the equipment information; the network host judges whether the equipment is allowed to be networked or not when receiving the verification request, and sends a network password algorithm to the network AP when judging that the equipment is allowed to be networked; the network AP calculates the random word string according to the received network password algorithm to obtain a network password, and sends the network name and the network password to the equipment; the equipment automatically networks according to the network name and the network password. Compared with the prior art, the invention can realize automatic networking of any equipment as long as certain conditions are met within the coverage range of the network AP, has universal applicability, and simultaneously, the networking enables the network connected with the equipment to be more reliable, thereby avoiding the leakage of user information and reducing the possibility of stealing the network information.

Description

Networking system and networking method
Technical Field
The embodiment of the invention relates to the field of communication, in particular to a networking system and a networking method.
Background
Along with the development of science and technology, more and more intelligent equipment has got into people's life, and intelligent equipment has the networking function usually, consequently, people can insert wireless network with intelligent equipment to enjoy more functions that intelligent equipment provided.
In the prior art, when an intelligent device is accessed to a wireless network, the intelligent device needs to be accessed to the wireless network through the following steps: firstly, if a network AP (network AP refers to a network access node) is an AP accessible by the smart device, an access permission instruction is issued to the AP so that the AP sends a hidden SSID (SSID is an abbreviation of Service Set Identifier, and the chinese paraphrase is a server Identifier) to the smart device. Secondly, when the intelligent device requests to connect the AP through hiding the SSID, the MAC address (the MAC address refers to a media access control address, a physical address or a hardware address, and is used for defining the position of the network device) of the intelligent device and the MAC address of the AP, which are sent by the AP, are received. And thirdly, sending the MAC address of the intelligent device and the MAC address of the AP to an authentication server for authentication. And fourthly, when receiving an authentication passing instruction returned by the authentication server, issuing an access permission instruction to the AP so as to enable the intelligent equipment to access the AP and achieve the purpose of accessing the intelligent equipment to the wireless network.
However, the prior art has at least the following technical problems: the network AP is in a hidden state, so that normal use is influenced; and the prior art relates to the modification of network protocols and has no universality.
Disclosure of Invention
The invention aims to provide a networking system and a networking method, so that any equipment can be automatically networked as long as a certain condition is met within the coverage range of a network AP (access point), the networking system and the networking method have general applicability, and meanwhile, the networking is realized in the mode, so that the network connected with the equipment is reliable, the user information leakage can be avoided, the possibility of stealing the network information is reduced, and the normal use of the network AP is not influenced no matter whether the network AP is in a hidden state or not.
In order to solve the above technical problem, an embodiment of the present invention provides a network system, including: the device to be networked, a network access node (AP) and a network host; a device for broadcasting device information of the device itself when activated; the equipment information carries a network name and an equipment identifier, and the network name comprises a fixed string and a random string; the network AP is used for sending a verification request carrying a network name and an equipment identifier to the network host when the equipment information needing networking is scanned; the network host is used for judging whether the equipment is allowed to be networked or not according to the fixed string in the network name and the identification of the equipment when the verification request is received, and sending a network password algorithm to the network AP when the equipment is judged to be allowed to be networked; the network AP is also used for calculating the random word string according to the received network password algorithm to obtain an encrypted network password and sending the network name and the encrypted network password to the equipment; and the equipment is used for automatically networking according to the network name and the network password.
The embodiment of the invention also provides a networking method, which is based on the networking system and is applied to the network access node (AP), and the networking method comprises the following steps: scanning equipment information needing networking, wherein the equipment information carries a network name and an equipment identifier, and the network name comprises a fixed string and a random string; sending a verification request carrying a network name and an equipment identifier to a network host; receiving a network cryptographic algorithm sent by a network host; calculating the random string according to the received network password algorithm to obtain an encrypted network password; sending the network name and the encrypted network password to the equipment; wherein, the device automatically networks according to the network name and the network password.
The embodiment of the invention also provides a networking method, which is based on the networking system and applied to the network host, and the networking method comprises the following steps: receiving a verification request which is sent by a network AP and carries a network name and an equipment identifier; wherein, the network name comprises a fixed string and a random string; and judging whether the equipment is allowed to be networked or not according to the fixed string in the network name and the identification of the equipment, and sending a network password algorithm to the network AP when the equipment is judged to be allowed to be networked.
Compared with the prior art, the method and the device have the advantages that the networking request is sent by the device when the device is activated; when receiving a networking request, the network AP sends a verification request carrying a network name and an equipment identifier to a network host; when receiving a verification request, the network host judges whether the equipment is allowed to be networked according to the fixed string in the network name and the identification of the equipment, and sends a network password algorithm to the network AP when judging that the equipment is allowed to be networked; the network AP calculates the random word string according to the received network password algorithm to obtain a network password, and sends the network name and the network password to the equipment; the equipment is automatically networked according to the network name and the network password, so that automatic networking can be realized by any equipment as long as certain conditions are met in the coverage range of the network AP, the universal applicability is realized, meanwhile, the networking is realized in the mode, the network connected with the equipment is reliable, the leakage of user information can be avoided, the possibility that the network information is stolen is reduced, and the normal use cannot be influenced whether the network AP is in a hidden state or not.
In addition, the network AP is specifically configured to send the network name and the network password to the device when it is determined that the device can be linked according to the network password. By the method, illegal networking of the fake equipment can be avoided, namely, the aim of realizing network access by monitoring and forging the authentication information by other equipment can be avoided.
In addition, the network AP is also used for recording the equipment to a blacklist according to the identification of the equipment and reporting the blacklist to the network host when the equipment cannot be linked according to the network password. Or, the network AP is further configured to upload the identifier of the device to the network host when it is determined that the device cannot be linked according to the network password, and the network host is further configured to record the identifier of the device in a blacklist. Through the design, the network host can prevent the devices recorded in the blacklist from being networked, and further avoid illegal networking of the fake devices.
In addition, in order to further ensure the security of device networking, a plurality of different sets of network cryptographic algorithms can be stored on the network host. If so, the network cryptographic algorithm comprises a plurality of groups of network cryptographic algorithms in one-to-one correspondence with the identifiers of the devices and is stored on the network host; the network host is specifically configured to send a group of network cryptographic algorithms to the network AP according to the identifier of the device when it is determined that networking of the device is allowed. Or, the network cryptographic algorithm is a plurality of groups of network cryptographic algorithms stored on the network host; the network host is specifically configured to select one group of network cryptographic algorithms from the multiple groups of network cryptographic algorithms at random or according to a preset sequence and send the selected group of network cryptographic algorithms to the network AP when it is determined that the device is allowed to be networked.
In addition, the network host is also used for recording the identification of the device when the device is not allowed to be networked. Through the design, when the device needs to be networked, if the identifier of the device is recorded in the network host, the network host can send an instruction for rejecting the networking of the device to the network AP, which is helpful for further ensuring the security of the network information propagation.
In addition, information corresponding to the device may be registered in advance to the network host, where the information corresponding to the device includes an identification of the device and a network cryptographic algorithm. Through the design, when the network host judges whether the equipment is allowed to be networked, the network host can specifically judge whether the equipment is allowed to be networked according to whether the received equipment identification can be found from the registered equipment identifications.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
FIG. 1 is a schematic diagram of the operation of a networked system in accordance with a first embodiment of the present invention;
FIG. 2 is a schematic diagram of the operation of a networked system in accordance with a second embodiment of the present invention;
FIG. 3 is a flow chart of a networking method in a third embodiment according to the present invention;
fig. 4 is a flow chart of a networking method in a fourth embodiment according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that numerous technical details are set forth in order to provide a better understanding of the present application in various embodiments of the present invention. However, the technical solution claimed in the present application can be implemented without these technical details and various changes and modifications based on the following embodiments.
A first embodiment of the present invention relates to a networking system including: as shown in fig. 1, the network system includes:
step S101, a device broadcasts its own device information when activated. The device information carries a network name and an identifier of the device, and the network name comprises a fixed string and a random string.
It is worth mentioning that the device may be activated by: when the device needs to be networked, the user manually opens the relevant application to search for a nearby network AP. The device may be determined to be activated when the user opens the relevant application to cause the device to search for a nearby network AP. In practical application, the device can broadcast self information at low frequency, and realize free switching in a plurality of networks with the technology; or automatic networking of the background is realized, and the user experience is further promoted.
In addition, it should be noted that the information carried by the device information may be a complete network name, or may be directly a fixed string. For example, a complete network name usually includes a fixed string and a random string, and in a case where the random string is blank, it may be considered that only the fixed string is sent by the device.
Step S102, the network AP scans the information of the devices needing to be networked.
It should be noted that when the network AP scans the device information that needs to be networked, the device information may be parsed, so as to extract the network name and the identifier of the device in the device information.
Step S103, the network AP sends a verification request carrying the network name and the device identifier to the network host.
Step S104, the network host receives the verification request sent by the network AP, and judges whether the device is allowed to be networked according to the fixed string in the network name and the identifier of the device.
It should be noted that, when receiving the authentication request sent by the network AP, the network host may parse the authentication request, so as to extract the network name and the device identifier carried in the authentication request.
Preferably, in an actual application, the embodiment may register information corresponding to the device in advance in the network host, where the information corresponding to the device includes an identifier of the device and a network cryptographic algorithm. Through the design, when the network host judges whether the equipment is allowed to be networked, the network host can specifically judge whether the equipment is allowed to be networked according to whether the received equipment identification can be found from the registered equipment identifications. For example, a plurality of pieces of information respectively corresponding to a plurality of devices are registered in advance to the network host. And when the network host receives the verification request sent by the network AP, extracting the network name and the equipment identifier carried in the verification request. And the network host searches from the registered device identifications according to the extracted device identification to see whether a device identification matched with the extracted device identification exists. If the device identification matched with the extracted device identification exists in the registered device identifications, judging that the device is allowed to be networked; otherwise, it is determined that the device is not allowed to network.
Step S105, the network host sends a network password algorithm to the network AP when judging that the device is allowed to be networked.
Step S106, the network AP receives the network password algorithm sent by the network host, and the received network password algorithm calculates the random word string to obtain the encrypted network password.
It should be noted that the network encryption algorithm may be a mathematical calculation formula, and when calculating the random word string, the random word string is brought into the mathematical calculation formula, and the calculation result is the network encryption. In the actual design process, the network cryptographic algorithm is not limited to be a mathematical calculation formula, and may be other symmetric or asymmetric cryptographic algorithms, which are not listed here. The present embodiment does not limit the form of the mathematical calculation formula and the number of the random word strings, and the mathematical calculation formula may be designed in any form according to the actual design requirement, and the number of the random word strings may be designed in any suitable value, which is not illustrated in the present embodiment.
Step S107, the network AP sends the received network name and the encrypted network password obtained by calculation to the equipment.
And step S108, the equipment receives the network name and the network password sent by the network AP and automatically networks according to the received network name and the network password.
Through the content, it is not difficult to discover that the implementation mode enables any equipment to realize automatic networking as long as certain conditions are met in the coverage range of the network AP, the universal applicability is achieved, meanwhile, the networking enables the network connected with the equipment to be reliable, user information leakage can be avoided, the possibility that the network information is stolen is reduced, and the normal use of the network AP is not influenced whether the network AP is in a hidden state or not.
A second embodiment of the present invention relates to a networked system. The second embodiment is an improvement on the first embodiment, and the main improvement lies in that: in the second embodiment, the external network name and the network algorithm password may be encrypted for transmission, where the algorithm may use the same encryption algorithm as the device connection password or other self-agreed encryption algorithm.
As shown in fig. 2, the workflow of the networked system includes:
step S201, the device broadcasts its own device information when activated. The device information carries a network name and an identifier of the device, and the network name comprises a fixed string and a random string.
It is worth mentioning that the device may be activated by: when the device needs to be networked, the user manually opens the relevant application to search for a nearby network AP. The device may be determined to be activated when the user opens the relevant application to cause the device to search for a nearby network AP. When the device is activated, the device may send a networking request in a broadcast transmission manner, so that the network AP within range coverage can receive the networking request sent by the device, and the network AP performs subsequent operations according to the received networking request. In practical application, the device can broadcast self information at low frequency, and realize free switching in a plurality of networks with the technology; or automatic networking of the background is realized, and the user experience is further promoted.
In addition, it should be noted that the information carried by the device information may be a complete network name, or may be directly a fixed string. For example, a complete network name usually includes a fixed string and a random string, and in a case where the random string is blank, it may be considered that only the fixed string is sent by the device.
Step S202, the network AP scans the information of the devices that need to be networked.
It should be noted that when the network AP scans the device information that needs to be networked, the device information may be parsed, so as to extract the network name and the identifier of the device in the device information.
Step S203, the network AP sends an authentication request carrying the network name and the device identifier to the network host.
In step S204, the network host receives the verification request sent by the network AP, and determines whether to allow the device to be networked according to the fixed string in the network name and the identifier of the device.
It should be noted that, when receiving the authentication request sent by the network AP, the network host may parse the authentication request, so as to extract the network name and the device identifier carried in the authentication request.
Preferably, in an actual application, the embodiment may register information corresponding to the device in advance in the network host, where the information corresponding to the device includes an identifier of the device and a network cryptographic algorithm. Through the design, when the network host judges whether the equipment is allowed to be networked, the network host can specifically judge whether the equipment is allowed to be networked according to whether the received equipment identification can be found from the registered equipment identifications. For example, a plurality of pieces of information respectively corresponding to a plurality of devices are registered in advance to the network host. And when the network host receives the verification request sent by the network AP, extracting the network name and the equipment identifier carried in the verification request. And the network host searches from the registered device identifications according to the extracted device identification to see whether a device identification matched with the extracted device identification exists. If the device identification matched with the extracted device identification exists in the registered device identifications, judging that the device is allowed to be networked; otherwise, it is determined that the device is not allowed to network.
In step S205, the network host sends the network password algorithm to the network AP when determining that the device is allowed to be networked.
It is worth mentioning that in practical applications, if the network host determines that the device is not allowed to be networked, the identity of the device is recorded. Through the design, when the device needs to be networked, if the identifier of the device is recorded in the network host, the network host can send an instruction for rejecting the networking of the device to the network AP, which is helpful for further ensuring the security of the network information propagation.
Preferably, to further ensure the security of device networking, a plurality of different sets of network cryptographic algorithms may be stored on the network host. If so, the network cryptographic algorithm comprises a plurality of groups of network cryptographic algorithms in one-to-one correspondence with the identifiers of the devices and is stored on the network host; the network host is specifically configured to send a group of network cryptographic algorithms to the network AP according to the identifier of the device when it is determined that networking of the device is allowed. Or, the network cryptographic algorithm is a plurality of groups of network cryptographic algorithms stored on the network host; the network host is specifically configured to select one group of network cryptographic algorithms from the multiple groups of network cryptographic algorithms at random or according to a preset sequence and send the selected group of network cryptographic algorithms to the network AP when it is determined that the device is allowed to be networked.
In step S206, the network AP receives the network password algorithm sent by the network host, and calculates the random string according to the received network password algorithm to obtain the encrypted network password.
It should be noted that the network encryption algorithm may be a mathematical calculation formula, and when calculating the random word string, the random word string is brought into the mathematical calculation formula, and the calculation result is the network encryption. In the actual design process, the network cryptographic algorithm is not limited to be a mathematical calculation formula, and may be other symmetric or asymmetric cryptographic algorithms, which are not listed here. The present embodiment does not limit the form of the mathematical calculation formula and the number of the random word strings, and the mathematical calculation formula may be designed in any form according to the actual design requirement, and the number of the random word strings may be designed in any suitable value, which is not illustrated in the present embodiment.
In step S207, the network AP determines whether it is possible to link the device according to the encrypted network password.
In step S208, after determining that the device can be linked according to the encrypted network password, the network AP sends the received network name and the encrypted network password obtained by calculation to the device. By the method, illegal networking of the fake equipment can be avoided, namely, the aim of realizing network access by monitoring and forging the authentication information by other equipment can be avoided.
It should be noted that, when the network AP determines that the device cannot be linked according to the network password, the device is recorded in the blacklist according to the identifier of the device, and the blacklist is reported to the network host. Or when the network AP judges that the equipment cannot be linked according to the network password, the identification of the equipment is uploaded to the network host, and the identification of the equipment is recorded to a blacklist of the network host through the network host. Through the design, the network host can prevent the devices recorded in the blacklist from being networked, and further avoid illegal networking of the fake devices. For example, when a device needs to be networked, if the identifier of the device is recorded in the black list of the network host, the network host may send an instruction to the network AP to reject networking of the device, which is helpful to further ensure security of network information propagation.
Step S209, the device receives the network name and the network password sent by the network AP, and automatically performs networking according to the received network name and the received network password.
Through the content, it is not difficult to discover that the implementation mode enables any equipment to realize automatic networking as long as certain conditions are met in the coverage range of the network AP, the universal applicability is achieved, meanwhile, the networking enables the network connected with the equipment to be reliable, user information leakage can be avoided, the possibility that the network information is stolen is reduced, and the normal use of the network AP is not influenced whether the network AP is in a hidden state or not.
The third embodiment of the invention relates to a networking method, which is based on the networking system of the first or second embodiment and is applied to a network access node (AP). As shown in fig. 3, the networking method includes:
step 301, scanning the information of the devices needing networking. The device information carries a network name and an identifier of the device, and the network name comprises a fixed string and a random string.
In addition, it should be noted that the information carried by the device information may be a complete network name, or may be directly a fixed string. For example, a complete network name usually includes a fixed string and a random string, and in a case where the random string is blank, it may be considered that only the fixed string is sent by the device.
Step 302, sending an authentication request carrying the network name and the device identifier to the network host.
Step 303, receiving a network cryptographic algorithm sent by the network host.
And step 304, calculating the random word string according to the received network password algorithm to obtain the encrypted network password.
Step 305, determining whether the device can be linked according to the encrypted network password. If yes, go to step 306; otherwise, go to step 307.
Step 306, the network name and the encrypted network password are sent to the device. Wherein, the device can automatically network according to the network name and the network password.
Step 307, recording the device to a blacklist according to the identifier of the device and reporting the blacklist to the network host.
It is worth mentioning that, in practical application, when it is determined that the device cannot be linked according to the network password, the identifier of the device may be uploaded to the network host, and the identifier of the device is recorded in the blacklist by the network host. For example, when a device needs to be networked, if the identifier of the device is recorded in the black list of the network host, the network host may send an instruction to the network AP to reject networking of the device, which is helpful to further ensure security of network information propagation.
Since the first or second embodiment corresponds to the present embodiment, the present embodiment can be implemented in cooperation with the first or second embodiment. The related technical details mentioned in the first or second embodiment are still valid in this embodiment, and the technical effects that can be achieved in the first or second embodiment can also be achieved in this embodiment, and are not described here again in order to reduce repetition. Accordingly, the related-art details mentioned in the present embodiment can also be applied to the first or second embodiment.
Through the content, it is not difficult to discover that the implementation mode enables any equipment to realize automatic networking as long as certain conditions are met in the coverage range of the network AP, the universal applicability is achieved, meanwhile, the networking enables the network connected with the equipment to be reliable, user information leakage can be avoided, the possibility that the network information is stolen is reduced, and the normal use of the network AP is not influenced whether the network AP is in a hidden state or not.
The fourth embodiment of the invention relates to a networking method, and the networking system based on the first or second embodiment is applied to a network host. As shown in fig. 4, the networking method includes:
step 401, receiving a verification request carrying a network name and an identifier of a device sent by a network AP. The network name comprises a fixed string and a random string.
In addition, the complete network name usually includes a fixed string and a random string, and when the random string is blank, it may be determined that the device transmits only the fixed string.
Step 402, determining whether to allow the device to be networked according to the fixed string in the network name and the identifier of the device. If so, go to step 403; otherwise, step 404 is entered.
It should be noted that, when receiving the authentication request sent by the network AP, the network host may parse the authentication request, so as to extract the network name and the device identifier carried in the authentication request.
Preferably, in an actual application, the embodiment may register information corresponding to the device in advance in the network host, where the information corresponding to the device includes an identifier of the device and a network cryptographic algorithm. Through the design, when the network host judges whether the equipment is allowed to be networked, the network host can specifically judge whether the equipment is allowed to be networked according to whether the received equipment identification can be found from the registered equipment identifications. For example, a plurality of pieces of information respectively corresponding to a plurality of devices are registered in advance to the network host. And when the network host receives the verification request sent by the network AP, extracting the network name and the equipment identifier carried in the verification request. And the network host searches from the registered device identifications according to the extracted device identification to see whether a device identification matched with the extracted device identification exists. If the device identification matched with the extracted device identification exists in the registered device identifications, judging that the device is allowed to be networked; otherwise, it is determined that the device is not allowed to network.
Step 403, sending the network cryptographic algorithm to the network AP.
At step 404, the identity of the device is recorded.
Since the first or second embodiment corresponds to the present embodiment, the present embodiment can be implemented in cooperation with the first or second embodiment. The related technical details mentioned in the first or second embodiment are still valid in this embodiment, and the technical effects that can be achieved in the first or second embodiment can also be achieved in this embodiment, and are not described here again in order to reduce repetition. Accordingly, the related-art details mentioned in the present embodiment can also be applied to the first or second embodiment.
Through the content, it is not difficult to discover that the implementation mode enables any equipment to realize automatic networking as long as certain conditions are met in the coverage range of the network AP, the universal applicability is achieved, meanwhile, the networking enables the network connected with the equipment to be reliable, user information leakage can be avoided, the possibility that the network information is stolen is reduced, and the normal use of the network AP is not influenced whether the network AP is in a hidden state or not.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.

Claims (10)

1. A networked system, comprising: the device to be networked, a network access node (AP) and a network host;
the device, is used for broadcasting the self apparatus information of the said apparatus while being activated; the device information carries a device name and an identifier of the device, and the device name comprises a fixed string and a random string;
the network AP is used for sending a verification request carrying the equipment name and the equipment identifier to the network host when the equipment information needing networking is scanned;
the network host is used for judging whether the equipment is allowed to be networked or not according to the fixed string in the equipment name and the identification of the equipment when the verification request is received, and sending a network password algorithm to the network AP when the equipment is judged to be allowed to be networked;
the network AP is further used for calculating the random string according to the received network password algorithm to obtain an encrypted network password, and sending the equipment name and the encrypted network password to the equipment;
and the equipment is used for automatically networking according to the equipment name and the network password.
2. The networking system of claim 1, wherein the network AP is further configured to send the device name and the network password to the device when determining that the device can be linked according to the network password.
3. The networking system of claim 2, wherein the network AP is further configured to, when it is determined that the device cannot be linked according to the network password, record the device in a blacklist according to an identifier of the device and report the blacklist to the network host;
or the network AP is further configured to upload the identifier of the device to the network host when it is determined that the device cannot be linked according to the network password, and the network host is further configured to record the identifier of the device in a blacklist.
4. The networking system of claim 1, wherein the network cryptographic algorithms comprise a plurality of sets of network cryptographic algorithms in one-to-one correspondence with the device's identification and are stored on the network host; the network host is specifically configured to send a group of network cryptographic algorithms to the network AP according to the identifier of the device when it is determined that networking of the device is allowed;
or, the network cryptographic algorithm is a plurality of groups of network cryptographic algorithms stored on the network host; the network host is specifically configured to select one group of network cryptographic algorithms from the multiple groups of network cryptographic algorithms at random or according to a preset sequence and send the selected group of network cryptographic algorithms to the network AP when it is determined that the device is allowed to be networked.
5. The networking system of claim 1, wherein the network host is further configured to record the identity of the device upon determining that the device is not allowed to be networked.
6. The networked system of claim 1, wherein information corresponding to the device is pre-registered with the network host, wherein the information corresponding to the device includes an identification of the device and the network cryptographic algorithm.
7. A networking method applied to a network access node (AP) based on the networking system of any one of claims 1 to 6, the networking method comprising:
scanning equipment information needing networking, wherein the equipment information carries an equipment name and an identification of the equipment, and the equipment name comprises a fixed string and a random string;
sending a verification request carrying the equipment name and the equipment identifier to a network host;
receiving a network cryptographic algorithm sent by the network host;
calculating the random word string according to the received network password algorithm to obtain an encrypted network password;
sending the device name and the encrypted network password to the device; and the equipment automatically networks according to the equipment name and the network password.
8. The networking method according to claim 7, wherein after the calculating the random string according to the received network password algorithm to obtain a network password, before the sending the device name and the network password to the device, the networking method further comprises:
judging whether the equipment can be linked according to the network password;
and when the equipment can be linked according to the network password, the equipment name and the encrypted network password are sent to the equipment.
9. A networking method, based on the networking system of any one of claims 1 to 6, applied to a network host, the networking method comprising:
receiving a verification request which is sent by a network AP and carries an equipment name and an equipment identifier; wherein the device name comprises a fixed string and a random string;
and judging whether the equipment is allowed to be networked or not according to the fixed string in the equipment name and the identification of the equipment, and sending a network password algorithm to the network AP when the equipment is judged to be allowed to be networked.
10. The networking method of claim 9, wherein upon determining that the device is not allowed to be networked, recording the identity of the device.
CN201711048298.3A 2017-10-31 2017-10-31 Networking system and networking method Active CN107969004B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201711048298.3A CN107969004B (en) 2017-10-31 2017-10-31 Networking system and networking method
CN202010728825.0A CN111866879A (en) 2017-10-31 2017-10-31 Networking system and networking method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711048298.3A CN107969004B (en) 2017-10-31 2017-10-31 Networking system and networking method

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202010728825.0A Division CN111866879A (en) 2017-10-31 2017-10-31 Networking system and networking method

Publications (2)

Publication Number Publication Date
CN107969004A CN107969004A (en) 2018-04-27
CN107969004B true CN107969004B (en) 2020-10-23

Family

ID=61999891

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201711048298.3A Active CN107969004B (en) 2017-10-31 2017-10-31 Networking system and networking method
CN202010728825.0A Withdrawn CN111866879A (en) 2017-10-31 2017-10-31 Networking system and networking method

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202010728825.0A Withdrawn CN111866879A (en) 2017-10-31 2017-10-31 Networking system and networking method

Country Status (1)

Country Link
CN (2) CN107969004B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108990062B (en) * 2018-07-13 2022-03-08 全讯汇聚网络科技(北京)有限公司 Intelligent security Wi-Fi management method and system
CN110493786B (en) * 2019-10-15 2020-01-07 北京翼辉信息技术有限公司 Method and device for intelligently connecting electronic equipment with network and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431453A (en) * 2007-11-09 2009-05-13 北京华旗资讯数码科技有限公司 Method for implementing secret communication between communication terminal and wireless access point
CN101500011A (en) * 2009-03-13 2009-08-05 北京华大智宝电子系统有限公司 Method and system for implementing dynamic password security protection
CN103024743A (en) * 2012-12-17 2013-04-03 北京航空航天大学 Wireless local area network trusted security access method
CN107040922A (en) * 2016-05-05 2017-08-11 腾讯科技(深圳)有限公司 Wireless network connecting method, apparatus and system
CN107222859A (en) * 2017-07-26 2017-09-29 上海与德科技有限公司 A kind of method and device of equipment networking

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103596173B (en) * 2013-09-30 2018-04-06 北京智谷睿拓技术服务有限公司 Wireless network authentication method, client and service end wireless network authentication device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431453A (en) * 2007-11-09 2009-05-13 北京华旗资讯数码科技有限公司 Method for implementing secret communication between communication terminal and wireless access point
CN101500011A (en) * 2009-03-13 2009-08-05 北京华大智宝电子系统有限公司 Method and system for implementing dynamic password security protection
CN103024743A (en) * 2012-12-17 2013-04-03 北京航空航天大学 Wireless local area network trusted security access method
CN107040922A (en) * 2016-05-05 2017-08-11 腾讯科技(深圳)有限公司 Wireless network connecting method, apparatus and system
CN107222859A (en) * 2017-07-26 2017-09-29 上海与德科技有限公司 A kind of method and device of equipment networking

Also Published As

Publication number Publication date
CN107969004A (en) 2018-04-27
CN111866879A (en) 2020-10-30

Similar Documents

Publication Publication Date Title
CN107770182B (en) Data storage method of home gateway and home gateway
CN110602691B (en) Mobile communication method and device based on block chain network
US10531364B2 (en) Wireless network access method and access apparatus, client and storage medium
CN102843682B (en) Access point authorizing method, device and system
CN101141259A (en) Method and device of access point equipment for preventing error access
Vanhoef et al. Operating channel validation: Preventing multi-channel man-in-the-middle attacks against protected Wi-Fi networks
JP2011523832A (en) Method for identifying a transmission device
EP2291017A1 (en) Method for network connection
CN105451230A (en) Internet-of-things device configuration method and Internet-of-things device configuration system
WO2017128546A1 (en) Method and apparatus for securely accessing wifi network
CN105792194A (en) Base station legality authentication method, device and system and network device
WO2016131289A1 (en) Method, device and user equipment for testing security of wireless hotspot
CN103686651A (en) Emergency call based authentication method, device and system
CN107969004B (en) Networking system and networking method
US20220408253A1 (en) Method and System for Authenticating a Base Station
WO2017032346A1 (en) Wireless security-based client computer self-connection protection method and system
CN111263361A (en) Connection authentication method and device based on block chain network and micro base station
CN110730450A (en) Mobile communication method and system
CN110730488B (en) Communication method, device, terminal and system based on block chain network
CN105873034A (en) Safe hot spot information processing method
KR101487349B1 (en) Terminal Authentication Method in Wireless Access Point and Wireless LAN System using the same
CN109379744B (en) Pseudo base station identification method and device and communication terminal
CN106937286B (en) A kind of user access authentication method and device
US11916923B2 (en) Method for restricting memory write access in IoT devices
CN106714175B (en) Verification method and system for anti-counterfeiting wifi access point

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200515

Address after: 750021 No.2 Shuangyong street, Xixia District, Yinchuan City, Ningxia Hui Autonomous Region

Applicant after: Zhao Chengzhi

Address before: 201506, Shanghai, Jinshan District Ting Wei Road No. 4, building 1309, room 6558

Applicant before: SHANGHAI WIND SCIENCE AND TECHNOLOGIES Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200927

Address after: Yangpu District State Road 200433 Shanghai City No. 233 building 304 room 3

Applicant after: SHANGHAI YINGLIAN TELECOM TECHNOLOGY Co.,Ltd.

Address before: 750021 No.2 Shuangyong street, Xixia District, Yinchuan City, Ningxia Hui Autonomous Region

Applicant before: Zhao Chengzhi

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 200433 room 304, 3rd floor, 233 Guoding East Road, Yangpu District, Shanghai

Patentee after: Shanghai Yinglian Intelligent Technology Co.,Ltd.

Address before: 200433 room 304, 3rd floor, 233 Guoding East Road, Yangpu District, Shanghai

Patentee before: SHANGHAI YINGLIAN TELECOM TECHNOLOGY CO.,LTD.

CP01 Change in the name or title of a patent holder