Disclosure of Invention
The invention aims to provide a networking system and a networking method, so that any equipment can be automatically networked as long as a certain condition is met within the coverage range of a network AP (access point), the networking system and the networking method have general applicability, and meanwhile, the networking is realized in the mode, so that the network connected with the equipment is reliable, the user information leakage can be avoided, the possibility of stealing the network information is reduced, and the normal use of the network AP is not influenced no matter whether the network AP is in a hidden state or not.
In order to solve the above technical problem, an embodiment of the present invention provides a network system, including: the device to be networked, a network access node (AP) and a network host; a device for broadcasting device information of the device itself when activated; the equipment information carries a network name and an equipment identifier, and the network name comprises a fixed string and a random string; the network AP is used for sending a verification request carrying a network name and an equipment identifier to the network host when the equipment information needing networking is scanned; the network host is used for judging whether the equipment is allowed to be networked or not according to the fixed string in the network name and the identification of the equipment when the verification request is received, and sending a network password algorithm to the network AP when the equipment is judged to be allowed to be networked; the network AP is also used for calculating the random word string according to the received network password algorithm to obtain an encrypted network password and sending the network name and the encrypted network password to the equipment; and the equipment is used for automatically networking according to the network name and the network password.
The embodiment of the invention also provides a networking method, which is based on the networking system and is applied to the network access node (AP), and the networking method comprises the following steps: scanning equipment information needing networking, wherein the equipment information carries a network name and an equipment identifier, and the network name comprises a fixed string and a random string; sending a verification request carrying a network name and an equipment identifier to a network host; receiving a network cryptographic algorithm sent by a network host; calculating the random string according to the received network password algorithm to obtain an encrypted network password; sending the network name and the encrypted network password to the equipment; wherein, the device automatically networks according to the network name and the network password.
The embodiment of the invention also provides a networking method, which is based on the networking system and applied to the network host, and the networking method comprises the following steps: receiving a verification request which is sent by a network AP and carries a network name and an equipment identifier; wherein, the network name comprises a fixed string and a random string; and judging whether the equipment is allowed to be networked or not according to the fixed string in the network name and the identification of the equipment, and sending a network password algorithm to the network AP when the equipment is judged to be allowed to be networked.
Compared with the prior art, the method and the device have the advantages that the networking request is sent by the device when the device is activated; when receiving a networking request, the network AP sends a verification request carrying a network name and an equipment identifier to a network host; when receiving a verification request, the network host judges whether the equipment is allowed to be networked according to the fixed string in the network name and the identification of the equipment, and sends a network password algorithm to the network AP when judging that the equipment is allowed to be networked; the network AP calculates the random word string according to the received network password algorithm to obtain a network password, and sends the network name and the network password to the equipment; the equipment is automatically networked according to the network name and the network password, so that automatic networking can be realized by any equipment as long as certain conditions are met in the coverage range of the network AP, the universal applicability is realized, meanwhile, the networking is realized in the mode, the network connected with the equipment is reliable, the leakage of user information can be avoided, the possibility that the network information is stolen is reduced, and the normal use cannot be influenced whether the network AP is in a hidden state or not.
In addition, the network AP is specifically configured to send the network name and the network password to the device when it is determined that the device can be linked according to the network password. By the method, illegal networking of the fake equipment can be avoided, namely, the aim of realizing network access by monitoring and forging the authentication information by other equipment can be avoided.
In addition, the network AP is also used for recording the equipment to a blacklist according to the identification of the equipment and reporting the blacklist to the network host when the equipment cannot be linked according to the network password. Or, the network AP is further configured to upload the identifier of the device to the network host when it is determined that the device cannot be linked according to the network password, and the network host is further configured to record the identifier of the device in a blacklist. Through the design, the network host can prevent the devices recorded in the blacklist from being networked, and further avoid illegal networking of the fake devices.
In addition, in order to further ensure the security of device networking, a plurality of different sets of network cryptographic algorithms can be stored on the network host. If so, the network cryptographic algorithm comprises a plurality of groups of network cryptographic algorithms in one-to-one correspondence with the identifiers of the devices and is stored on the network host; the network host is specifically configured to send a group of network cryptographic algorithms to the network AP according to the identifier of the device when it is determined that networking of the device is allowed. Or, the network cryptographic algorithm is a plurality of groups of network cryptographic algorithms stored on the network host; the network host is specifically configured to select one group of network cryptographic algorithms from the multiple groups of network cryptographic algorithms at random or according to a preset sequence and send the selected group of network cryptographic algorithms to the network AP when it is determined that the device is allowed to be networked.
In addition, the network host is also used for recording the identification of the device when the device is not allowed to be networked. Through the design, when the device needs to be networked, if the identifier of the device is recorded in the network host, the network host can send an instruction for rejecting the networking of the device to the network AP, which is helpful for further ensuring the security of the network information propagation.
In addition, information corresponding to the device may be registered in advance to the network host, where the information corresponding to the device includes an identification of the device and a network cryptographic algorithm. Through the design, when the network host judges whether the equipment is allowed to be networked, the network host can specifically judge whether the equipment is allowed to be networked according to whether the received equipment identification can be found from the registered equipment identifications.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that numerous technical details are set forth in order to provide a better understanding of the present application in various embodiments of the present invention. However, the technical solution claimed in the present application can be implemented without these technical details and various changes and modifications based on the following embodiments.
A first embodiment of the present invention relates to a networking system including: as shown in fig. 1, the network system includes:
step S101, a device broadcasts its own device information when activated. The device information carries a network name and an identifier of the device, and the network name comprises a fixed string and a random string.
It is worth mentioning that the device may be activated by: when the device needs to be networked, the user manually opens the relevant application to search for a nearby network AP. The device may be determined to be activated when the user opens the relevant application to cause the device to search for a nearby network AP. In practical application, the device can broadcast self information at low frequency, and realize free switching in a plurality of networks with the technology; or automatic networking of the background is realized, and the user experience is further promoted.
In addition, it should be noted that the information carried by the device information may be a complete network name, or may be directly a fixed string. For example, a complete network name usually includes a fixed string and a random string, and in a case where the random string is blank, it may be considered that only the fixed string is sent by the device.
Step S102, the network AP scans the information of the devices needing to be networked.
It should be noted that when the network AP scans the device information that needs to be networked, the device information may be parsed, so as to extract the network name and the identifier of the device in the device information.
Step S103, the network AP sends a verification request carrying the network name and the device identifier to the network host.
Step S104, the network host receives the verification request sent by the network AP, and judges whether the device is allowed to be networked according to the fixed string in the network name and the identifier of the device.
It should be noted that, when receiving the authentication request sent by the network AP, the network host may parse the authentication request, so as to extract the network name and the device identifier carried in the authentication request.
Preferably, in an actual application, the embodiment may register information corresponding to the device in advance in the network host, where the information corresponding to the device includes an identifier of the device and a network cryptographic algorithm. Through the design, when the network host judges whether the equipment is allowed to be networked, the network host can specifically judge whether the equipment is allowed to be networked according to whether the received equipment identification can be found from the registered equipment identifications. For example, a plurality of pieces of information respectively corresponding to a plurality of devices are registered in advance to the network host. And when the network host receives the verification request sent by the network AP, extracting the network name and the equipment identifier carried in the verification request. And the network host searches from the registered device identifications according to the extracted device identification to see whether a device identification matched with the extracted device identification exists. If the device identification matched with the extracted device identification exists in the registered device identifications, judging that the device is allowed to be networked; otherwise, it is determined that the device is not allowed to network.
Step S105, the network host sends a network password algorithm to the network AP when judging that the device is allowed to be networked.
Step S106, the network AP receives the network password algorithm sent by the network host, and the received network password algorithm calculates the random word string to obtain the encrypted network password.
It should be noted that the network encryption algorithm may be a mathematical calculation formula, and when calculating the random word string, the random word string is brought into the mathematical calculation formula, and the calculation result is the network encryption. In the actual design process, the network cryptographic algorithm is not limited to be a mathematical calculation formula, and may be other symmetric or asymmetric cryptographic algorithms, which are not listed here. The present embodiment does not limit the form of the mathematical calculation formula and the number of the random word strings, and the mathematical calculation formula may be designed in any form according to the actual design requirement, and the number of the random word strings may be designed in any suitable value, which is not illustrated in the present embodiment.
Step S107, the network AP sends the received network name and the encrypted network password obtained by calculation to the equipment.
And step S108, the equipment receives the network name and the network password sent by the network AP and automatically networks according to the received network name and the network password.
Through the content, it is not difficult to discover that the implementation mode enables any equipment to realize automatic networking as long as certain conditions are met in the coverage range of the network AP, the universal applicability is achieved, meanwhile, the networking enables the network connected with the equipment to be reliable, user information leakage can be avoided, the possibility that the network information is stolen is reduced, and the normal use of the network AP is not influenced whether the network AP is in a hidden state or not.
A second embodiment of the present invention relates to a networked system. The second embodiment is an improvement on the first embodiment, and the main improvement lies in that: in the second embodiment, the external network name and the network algorithm password may be encrypted for transmission, where the algorithm may use the same encryption algorithm as the device connection password or other self-agreed encryption algorithm.
As shown in fig. 2, the workflow of the networked system includes:
step S201, the device broadcasts its own device information when activated. The device information carries a network name and an identifier of the device, and the network name comprises a fixed string and a random string.
It is worth mentioning that the device may be activated by: when the device needs to be networked, the user manually opens the relevant application to search for a nearby network AP. The device may be determined to be activated when the user opens the relevant application to cause the device to search for a nearby network AP. When the device is activated, the device may send a networking request in a broadcast transmission manner, so that the network AP within range coverage can receive the networking request sent by the device, and the network AP performs subsequent operations according to the received networking request. In practical application, the device can broadcast self information at low frequency, and realize free switching in a plurality of networks with the technology; or automatic networking of the background is realized, and the user experience is further promoted.
In addition, it should be noted that the information carried by the device information may be a complete network name, or may be directly a fixed string. For example, a complete network name usually includes a fixed string and a random string, and in a case where the random string is blank, it may be considered that only the fixed string is sent by the device.
Step S202, the network AP scans the information of the devices that need to be networked.
It should be noted that when the network AP scans the device information that needs to be networked, the device information may be parsed, so as to extract the network name and the identifier of the device in the device information.
Step S203, the network AP sends an authentication request carrying the network name and the device identifier to the network host.
In step S204, the network host receives the verification request sent by the network AP, and determines whether to allow the device to be networked according to the fixed string in the network name and the identifier of the device.
It should be noted that, when receiving the authentication request sent by the network AP, the network host may parse the authentication request, so as to extract the network name and the device identifier carried in the authentication request.
Preferably, in an actual application, the embodiment may register information corresponding to the device in advance in the network host, where the information corresponding to the device includes an identifier of the device and a network cryptographic algorithm. Through the design, when the network host judges whether the equipment is allowed to be networked, the network host can specifically judge whether the equipment is allowed to be networked according to whether the received equipment identification can be found from the registered equipment identifications. For example, a plurality of pieces of information respectively corresponding to a plurality of devices are registered in advance to the network host. And when the network host receives the verification request sent by the network AP, extracting the network name and the equipment identifier carried in the verification request. And the network host searches from the registered device identifications according to the extracted device identification to see whether a device identification matched with the extracted device identification exists. If the device identification matched with the extracted device identification exists in the registered device identifications, judging that the device is allowed to be networked; otherwise, it is determined that the device is not allowed to network.
In step S205, the network host sends the network password algorithm to the network AP when determining that the device is allowed to be networked.
It is worth mentioning that in practical applications, if the network host determines that the device is not allowed to be networked, the identity of the device is recorded. Through the design, when the device needs to be networked, if the identifier of the device is recorded in the network host, the network host can send an instruction for rejecting the networking of the device to the network AP, which is helpful for further ensuring the security of the network information propagation.
Preferably, to further ensure the security of device networking, a plurality of different sets of network cryptographic algorithms may be stored on the network host. If so, the network cryptographic algorithm comprises a plurality of groups of network cryptographic algorithms in one-to-one correspondence with the identifiers of the devices and is stored on the network host; the network host is specifically configured to send a group of network cryptographic algorithms to the network AP according to the identifier of the device when it is determined that networking of the device is allowed. Or, the network cryptographic algorithm is a plurality of groups of network cryptographic algorithms stored on the network host; the network host is specifically configured to select one group of network cryptographic algorithms from the multiple groups of network cryptographic algorithms at random or according to a preset sequence and send the selected group of network cryptographic algorithms to the network AP when it is determined that the device is allowed to be networked.
In step S206, the network AP receives the network password algorithm sent by the network host, and calculates the random string according to the received network password algorithm to obtain the encrypted network password.
It should be noted that the network encryption algorithm may be a mathematical calculation formula, and when calculating the random word string, the random word string is brought into the mathematical calculation formula, and the calculation result is the network encryption. In the actual design process, the network cryptographic algorithm is not limited to be a mathematical calculation formula, and may be other symmetric or asymmetric cryptographic algorithms, which are not listed here. The present embodiment does not limit the form of the mathematical calculation formula and the number of the random word strings, and the mathematical calculation formula may be designed in any form according to the actual design requirement, and the number of the random word strings may be designed in any suitable value, which is not illustrated in the present embodiment.
In step S207, the network AP determines whether it is possible to link the device according to the encrypted network password.
In step S208, after determining that the device can be linked according to the encrypted network password, the network AP sends the received network name and the encrypted network password obtained by calculation to the device. By the method, illegal networking of the fake equipment can be avoided, namely, the aim of realizing network access by monitoring and forging the authentication information by other equipment can be avoided.
It should be noted that, when the network AP determines that the device cannot be linked according to the network password, the device is recorded in the blacklist according to the identifier of the device, and the blacklist is reported to the network host. Or when the network AP judges that the equipment cannot be linked according to the network password, the identification of the equipment is uploaded to the network host, and the identification of the equipment is recorded to a blacklist of the network host through the network host. Through the design, the network host can prevent the devices recorded in the blacklist from being networked, and further avoid illegal networking of the fake devices. For example, when a device needs to be networked, if the identifier of the device is recorded in the black list of the network host, the network host may send an instruction to the network AP to reject networking of the device, which is helpful to further ensure security of network information propagation.
Step S209, the device receives the network name and the network password sent by the network AP, and automatically performs networking according to the received network name and the received network password.
Through the content, it is not difficult to discover that the implementation mode enables any equipment to realize automatic networking as long as certain conditions are met in the coverage range of the network AP, the universal applicability is achieved, meanwhile, the networking enables the network connected with the equipment to be reliable, user information leakage can be avoided, the possibility that the network information is stolen is reduced, and the normal use of the network AP is not influenced whether the network AP is in a hidden state or not.
The third embodiment of the invention relates to a networking method, which is based on the networking system of the first or second embodiment and is applied to a network access node (AP). As shown in fig. 3, the networking method includes:
step 301, scanning the information of the devices needing networking. The device information carries a network name and an identifier of the device, and the network name comprises a fixed string and a random string.
In addition, it should be noted that the information carried by the device information may be a complete network name, or may be directly a fixed string. For example, a complete network name usually includes a fixed string and a random string, and in a case where the random string is blank, it may be considered that only the fixed string is sent by the device.
Step 302, sending an authentication request carrying the network name and the device identifier to the network host.
Step 303, receiving a network cryptographic algorithm sent by the network host.
And step 304, calculating the random word string according to the received network password algorithm to obtain the encrypted network password.
Step 305, determining whether the device can be linked according to the encrypted network password. If yes, go to step 306; otherwise, go to step 307.
Step 306, the network name and the encrypted network password are sent to the device. Wherein, the device can automatically network according to the network name and the network password.
Step 307, recording the device to a blacklist according to the identifier of the device and reporting the blacklist to the network host.
It is worth mentioning that, in practical application, when it is determined that the device cannot be linked according to the network password, the identifier of the device may be uploaded to the network host, and the identifier of the device is recorded in the blacklist by the network host. For example, when a device needs to be networked, if the identifier of the device is recorded in the black list of the network host, the network host may send an instruction to the network AP to reject networking of the device, which is helpful to further ensure security of network information propagation.
Since the first or second embodiment corresponds to the present embodiment, the present embodiment can be implemented in cooperation with the first or second embodiment. The related technical details mentioned in the first or second embodiment are still valid in this embodiment, and the technical effects that can be achieved in the first or second embodiment can also be achieved in this embodiment, and are not described here again in order to reduce repetition. Accordingly, the related-art details mentioned in the present embodiment can also be applied to the first or second embodiment.
Through the content, it is not difficult to discover that the implementation mode enables any equipment to realize automatic networking as long as certain conditions are met in the coverage range of the network AP, the universal applicability is achieved, meanwhile, the networking enables the network connected with the equipment to be reliable, user information leakage can be avoided, the possibility that the network information is stolen is reduced, and the normal use of the network AP is not influenced whether the network AP is in a hidden state or not.
The fourth embodiment of the invention relates to a networking method, and the networking system based on the first or second embodiment is applied to a network host. As shown in fig. 4, the networking method includes:
step 401, receiving a verification request carrying a network name and an identifier of a device sent by a network AP. The network name comprises a fixed string and a random string.
In addition, the complete network name usually includes a fixed string and a random string, and when the random string is blank, it may be determined that the device transmits only the fixed string.
Step 402, determining whether to allow the device to be networked according to the fixed string in the network name and the identifier of the device. If so, go to step 403; otherwise, step 404 is entered.
It should be noted that, when receiving the authentication request sent by the network AP, the network host may parse the authentication request, so as to extract the network name and the device identifier carried in the authentication request.
Preferably, in an actual application, the embodiment may register information corresponding to the device in advance in the network host, where the information corresponding to the device includes an identifier of the device and a network cryptographic algorithm. Through the design, when the network host judges whether the equipment is allowed to be networked, the network host can specifically judge whether the equipment is allowed to be networked according to whether the received equipment identification can be found from the registered equipment identifications. For example, a plurality of pieces of information respectively corresponding to a plurality of devices are registered in advance to the network host. And when the network host receives the verification request sent by the network AP, extracting the network name and the equipment identifier carried in the verification request. And the network host searches from the registered device identifications according to the extracted device identification to see whether a device identification matched with the extracted device identification exists. If the device identification matched with the extracted device identification exists in the registered device identifications, judging that the device is allowed to be networked; otherwise, it is determined that the device is not allowed to network.
Step 403, sending the network cryptographic algorithm to the network AP.
At step 404, the identity of the device is recorded.
Since the first or second embodiment corresponds to the present embodiment, the present embodiment can be implemented in cooperation with the first or second embodiment. The related technical details mentioned in the first or second embodiment are still valid in this embodiment, and the technical effects that can be achieved in the first or second embodiment can also be achieved in this embodiment, and are not described here again in order to reduce repetition. Accordingly, the related-art details mentioned in the present embodiment can also be applied to the first or second embodiment.
Through the content, it is not difficult to discover that the implementation mode enables any equipment to realize automatic networking as long as certain conditions are met in the coverage range of the network AP, the universal applicability is achieved, meanwhile, the networking enables the network connected with the equipment to be reliable, user information leakage can be avoided, the possibility that the network information is stolen is reduced, and the normal use of the network AP is not influenced whether the network AP is in a hidden state or not.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.