CN108834143B - Network expansion method, terminal and system - Google Patents

Network expansion method, terminal and system Download PDF

Info

Publication number
CN108834143B
CN108834143B CN201810520173.4A CN201810520173A CN108834143B CN 108834143 B CN108834143 B CN 108834143B CN 201810520173 A CN201810520173 A CN 201810520173A CN 108834143 B CN108834143 B CN 108834143B
Authority
CN
China
Prior art keywords
terminal
network
request
network connection
connection request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810520173.4A
Other languages
Chinese (zh)
Other versions
CN108834143A (en
Inventor
袁晓静
翟京卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201810520173.4A priority Critical patent/CN108834143B/en
Publication of CN108834143A publication Critical patent/CN108834143A/en
Application granted granted Critical
Publication of CN108834143B publication Critical patent/CN108834143B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/18Network planning tools
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Abstract

The invention provides a method, a terminal and a system for network expansion.A first terminal receives a first message comprising a network expansion request of at least one second terminal, generates an access instruction and broadcasts the access instruction according to a preset encryption algorithm and the network expansion request, and then receives a network connection request sent by the second terminal and sends configuration parameters for network expansion to the second terminal so that the second terminal can be configured according to the configuration parameters, thereby realizing the expansion of the network coverage of the first terminal. According to the method, the terminal and the system for network expansion, the second terminal and the first terminal automatically establish network connection, and the network expansion is realized.

Description

Network expansion method, terminal and system
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method, a terminal, and a system for network expansion.
Background
With the development of the technology of the internet of things and intelligent equipment, more and more wireless terminals are accessed into the internet of things, and gateway equipment plays an important role as a core hub of a home network. The number of wireless terminal devices used by people in life is greatly increased, and it is difficult to achieve complete coverage of every corner in a home by deploying one gateway device in the home.
In the related art, there are various schemes for extending a Wireless network, wherein a common solution is to deploy an AC + AP, that is, a home gateway device is used as a Wireless Controller (AC), and an extended Wireless Access Point (AP) is deployed to connect the extended AP to a master AC by using various ways such as a power line, a network cable, or Wi-Fi, so as to implement Wireless coverage of the home network.
However, in the above scheme, the user needs to manually configure the relevant parameters for each extended AP to enable the extended AP to establish connection with the master AC, so that the user operation is cumbersome, and the network extension efficiency is low.
Disclosure of Invention
The invention provides a method, a terminal and a system for network expansion, which can realize that at least one second terminal and a first terminal automatically establish network connection, thereby realizing the purpose of network expansion, simplifying the operation process of a user and improving the efficiency of network expansion.
In a first aspect, the method for network extension provided by the present invention is applied to a first terminal, and includes:
receiving a first message, wherein the first message comprises a network extension request of at least one second terminal, and the network extension request comprises a device identifier and an access parameter of the corresponding second terminal;
generating an access instruction of the at least one second terminal according to a preset encryption algorithm and the network expansion request, and broadcasting the access instruction;
receiving a network connection request sent by the second terminal, wherein the network connection request is sent by the second terminal after the second terminal successfully decrypts the access instruction;
and sending configuration parameters for network expansion to the second terminal according to the network connection request.
Optionally, the receiving the first message includes:
receiving a first message sent by a client, wherein the client is used for managing the first terminal;
correspondingly, after sending the configuration parameters for network extension to the second terminal according to the network connection request, the method further includes:
receiving a network connection state message sent by the second terminal;
and sending a second message to the client, wherein the second message comprises the connection state of the second terminal.
Optionally, the network connection request includes a device identifier of the second terminal;
the sending, according to the network connection request, configuration parameters for network extension to the second terminal includes:
and verifying the network connection request according to the equipment identification, and if the verification is passed, sending configuration parameters for network expansion to the second terminal.
In a second aspect, the method for network expansion provided by the present invention is applied to a second terminal, and includes:
receiving an access instruction broadcasted by a first terminal, wherein the access instruction is generated according to a preset encryption algorithm and a network expansion request after the first terminal receives the network expansion request comprising at least one second terminal, and the network expansion request comprises a corresponding device identifier and an access parameter of the second terminal;
decrypting the access instruction according to a preset decryption algorithm and the equipment identifier and the access parameter of the second terminal, and if the decryption is successful, sending a network connection request to the first terminal;
receiving configuration parameters for network expansion sent by the first terminal;
and configuring the second terminal according to the configuration parameters.
Optionally, after configuring the second terminal according to the configuration parameter, the method further includes:
and sending a network connection state message to the first terminal.
Optionally, the network connection request includes a device identifier of the second terminal, where the device identifier is used for the first terminal to verify the network connection request.
In a third aspect, the terminal provided by the present invention, when being used as a first terminal, includes:
a receiving module, configured to receive a first message, where the first message includes a network extension request of at least one second terminal, and the network extension request includes a device identifier and an access parameter of the corresponding second terminal;
the encryption module is used for generating an access instruction of the at least one second terminal according to a preset encryption algorithm and the network expansion request;
the sending module is used for broadcasting the access instruction;
the receiving module is further configured to receive a network connection request sent by the second terminal, where the network connection request is sent after the second terminal successfully decrypts the access instruction;
the sending module is further configured to send a configuration parameter for network extension to the second terminal according to the network connection request.
Optionally, the receiving module is specifically configured to receive a first message sent by a client, where the client is used to manage the first terminal;
the receiving module is further configured to receive a network connection status message sent by the second terminal;
the sending module is further configured to send a second message to the client, where the second message includes a connection status of the second terminal.
Optionally, the network connection request includes a device identifier of the second terminal;
the sending module is specifically configured to verify the network connection request according to the device identifier, and send a configuration parameter for network extension to the second terminal if the verification passes.
In a fourth aspect, the terminal provided by the present invention, when being used as a second terminal, includes:
the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving an access instruction broadcasted by a first terminal, the access instruction is generated according to a preset encryption algorithm and a network extension request after the first terminal receives the network extension request comprising at least one second terminal, and the network extension request comprises a corresponding device identifier and an access parameter of the second terminal;
the decryption module is used for decrypting the access instruction according to a preset decryption algorithm and the equipment identifier and the access parameter of the second terminal;
a sending module, configured to send a network connection request to the first terminal if decryption is successful;
the receiving module is further configured to receive a configuration parameter for network extension sent by the first terminal;
and the configuration module is used for configuring the second terminal according to the configuration parameters.
Optionally, the sending module is further configured to send a network connection status message to the first terminal.
Optionally, the network connection request includes a device identifier of the second terminal, where the device identifier is used for the first terminal to verify the network connection request.
In a fifth aspect, the present invention provides a terminal, including:
a memory;
a processor; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the method of any of the first aspects or the method of any of the second aspects.
In a sixth aspect, the invention provides a computer readable storage medium having stored thereon a computer program for execution by a processor to perform a method according to any one of the first aspect or the second aspect.
In a seventh aspect, the present invention provides a system for network expansion, including: a terminal according to any of the third aspects and at least one terminal according to any of the fourth aspects.
According to the method, the terminal and the system for network expansion, provided by the invention, the first terminal receives a first message comprising a network expansion request of at least one second terminal, generates an access instruction of the at least one second terminal according to a preset encryption algorithm and the network expansion request and broadcasts the access instruction, then the first terminal receives a network connection request sent by the second terminal and sends configuration parameters for network expansion to the second terminal, so that the second terminal is configured according to the configuration parameters, and the network coverage of the first terminal is expanded. Therefore, according to the network expansion method provided by the invention, the second terminal and the first terminal automatically establish network connection to realize network expansion. And moreover, automatic configuration can be simultaneously carried out on a plurality of second terminals, and the efficiency of network expansion is further improved. In addition, after the first terminal acquires the network expansion request of the second terminal, the network expansion request is encrypted according to a preset encryption algorithm to generate an access instruction, and when the second terminal decrypts the access instruction successfully, the configuration parameters for network expansion are sent to the second terminal, so that the process of establishing connection between the second terminal and the first terminal is safer, and the security of network expansion is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a diagram of a system architecture suitable for use with an embodiment of the present invention;
fig. 2 is a flowchart of a first embodiment of a method for network expansion according to the present invention;
fig. 3 is a signaling flowchart of a first embodiment of a method for network extension according to the present invention;
fig. 4 is a flowchart of a second embodiment of a method for network expansion according to the present invention;
fig. 5 is a flowchart of a third embodiment of a method for network expansion according to the present invention;
fig. 6 is a signaling flowchart of a third embodiment of a method for network extension according to the present invention;
fig. 7 is a schematic structural diagram of a first embodiment of a terminal according to the present invention;
fig. 8 is a schematic structural diagram of a second terminal according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of a third embodiment of the terminal provided in the present invention;
fig. 10 is a schematic structural diagram of a system embodiment of network expansion provided by the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
As described above, in the related art, the expansion of the wireless network is generally performed by deploying the AC + AP, that is, the home gateway device is used as the wireless controller AC, and the expanded wireless access point AP is deployed to connect the expanded AP to the master AC by using multiple modes such as a power line, a network cable, or Wi-Fi, so as to implement wireless coverage of the home network. However, when a plurality of APs need to be extended in the above scheme, a user needs to manually configure relevant parameters for each extended AP to establish connection between the extended AP and the master AC, which results in cumbersome user operation and low network extension efficiency.
The invention provides a method, a terminal and a system for network expansion, which are used for expanding a network, simplifying the operation process of a user and improving the efficiency of network expansion by automatically establishing network connection between a plurality of expansion APs and a master control AC.
The technical solution of the present invention will be described in detail below with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
Fig. 1 is a schematic diagram of a system architecture to which an embodiment of the present invention is applied, as shown in fig. 1, in the system, a first terminal is an access gateway device that is provided by an operator to a broadband client to access internet services. One end of the first terminal is connected with a broadband access and carrying network, a local area network is formed in a coverage network area of the first terminal, and the first terminal is used as a core unit of the local area network and can control the network connection state of all other terminals in the local area network. The second terminal is a terminal device within the range of the local area network for extending the network coverage of the first terminal, that is, the first terminal is a master control AC, and the second terminal is an extended AP. As shown in fig. 1, the plurality of second terminals are respectively connected to the first terminal, and perform configuration of corresponding network parameters, so that the network of the first terminal can be expanded, and a multipoint coverage function of the local area network is implemented, so that the mobile terminal can perform seamless switching when moving at any position in the local area network, and the mobile terminal may include, but is not limited to, the smart wearable device, the mobile phone, the tablet computer, the notebook computer, the smart home, and the like shown in fig. 1.
In addition, as shown in fig. 1, the first terminal may further be connected to a client, where the client may be management software of a gateway client installed in any mobile terminal, and the client may implement configuration operation on a gateway and management on services of a local area network.
It should be noted that the subsequent embodiments of the present invention can be applied to the system architecture shown in fig. 1, and the system architecture can be used in both the home network and the office network. The first terminal refers to a gateway device having a control function in a local area network, for example: the second terminal may be an intelligent gateway or a router, and the like, and the second terminal refers to a hotspot device having an AP extension function, for example: the relay device may be a pure Wireless relay device, an Ethernet Wireless relay device, a modem Wireless relay device, an Ethernet Over Cable (EOC) terminal device with Wireless Local Area Network (WLAN) capability, or the like. In addition, the same network protocol is supported between the first terminal and the second terminal to realize the communication connection between the first terminal and the second terminal, wherein the network protocol includes but is not limited to IEEE802.11 protocol.
It can be understood that, in the embodiment of the present invention, the first terminal and the second terminal are distinguished by names according to different roles in network extension, and corresponding hardware devices may be the same or different, as long as the technical solutions of network extension of the first terminal and the second terminal in the embodiment of the present invention can be respectively implemented.
Fig. 2 is a flowchart of a first embodiment of a method for network extension provided by the present invention, fig. 3 is a signaling flowchart of the first embodiment of the method for network extension provided by the present invention, and an execution subject of the present embodiment may be a first terminal. As shown in fig. 2 and 3, the method of the present embodiment includes:
s21: receiving a first message, wherein the first message comprises a network extension request of at least one second terminal, and the network extension request comprises a device identifier and an access parameter of the corresponding second terminal.
Specifically, the first terminal receives a first message, where the first message may include network extension requests of a plurality of second terminals, and a network extension request of each second terminal may include a device identifier of the second terminal and an access parameter of the second terminal.
The device identifier may be a serial number uniquely identifying the device preset by the second terminal device when the second terminal device leaves a factory, and the access parameter may be an access code preset by the second terminal device when the second terminal device leaves the factory and used for accessing the network.
S22: and generating an access instruction of the at least one second terminal according to a preset encryption algorithm and the network expansion request, and broadcasting the access instruction.
Specifically, after receiving the first message, the first terminal encrypts the network expansion request of the second terminal by using a preset encryption algorithm to generate an access instruction. When the first terminal performs encryption processing, in an optional implementation manner, after the first message is analyzed to obtain network extension requests of N second terminals, the network extension requests of each second terminal are respectively encrypted to generate an access instruction, and finally N access instructions are obtained for broadcasting; another optional embodiment is to analyze the first message to obtain network extension requests of N second terminals, encrypt the network extension requests of the N second terminals according to a preset encryption algorithm, and combine the N encryption results into one access instruction for broadcasting, which is not specifically limited in the present invention.
When the first terminal performs encryption processing, a preset encryption algorithm may be used to encrypt the device identifier and/or the access parameter in the network expansion request, and the specifically used encryption algorithm may be negotiated by the first terminal and the second terminal in advance, or the adopted encryption algorithm may be carried in the access instruction and notified to the second terminal, so that the second terminal can decrypt the access instruction by using the preset decryption algorithm, which is not limited in the present invention.
After receiving the access instruction broadcasted by the first terminal, the second terminal decrypts the access instruction according to a preset decryption algorithm, the device identifier and the access parameter of the second terminal, if the decryption is successful, the authentication of the first terminal and the second terminal is successful, and the second terminal can expand the network of the first terminal, so that the second terminal sends a network connection request to the first terminal. If the decryption fails, the authentication between the first terminal and the second terminal fails, and the second terminal cannot be used for expanding the network of the first terminal.
S23: and receiving a network connection request sent by the second terminal, wherein the network connection request is sent by the second terminal after the second terminal successfully decrypts the access instruction.
S24: and sending configuration parameters for network expansion to the second terminal according to the network connection request.
After receiving a network connection request sent by a second terminal, a first terminal sends configuration parameters for network expansion to the second terminal, so that the second terminal configures the second terminal according to the configuration parameters, and the purpose of expanding the network of the first terminal is achieved.
The configuration parameter is to be understood as a network parameter that the second terminal needs to configure for the purpose of extending the network of the first terminal by the second terminal, and for example, the configuration parameter may include at least one of the following parameters: service Set Identifier (SSID), encryption type, password, key, Quality of Service (Qos) policy, black and white list, and the like.
It can be understood that the configuration parameters sent by the first terminal to the second terminal may be the same as or different from the corresponding parameters of the first terminal, and may be set according to the requirement of actual network expansion. For example, when a home lan needs to be extended so that the same network coverage exists at any point in the home, the configuration parameters sent by the first terminal to the second terminal are the same as the network configuration parameters of the first terminal.
In this embodiment, a first terminal receives a first message including a network extension request of at least one second terminal, and generates and broadcasts an access instruction of the at least one second terminal according to a preset encryption algorithm and the network extension request, and then the first terminal receives a network connection request sent by the second terminal and sends configuration parameters for network extension to the second terminal, so that the second terminal performs configuration according to the configuration parameters, thereby implementing extension of network coverage of the first terminal. In the network expansion process in this embodiment, the second terminal and the first terminal automatically establish network connection to realize network expansion. Further, in this embodiment, automatic configuration of multiple second terminals can be implemented simultaneously, which further improves the efficiency of network expansion. In addition, in this embodiment, after the first terminal acquires the network expansion request of the second terminal, the network expansion request is encrypted according to a preset encryption algorithm to generate an access instruction, and when the second terminal decrypts the access instruction successfully, the configuration parameters for network expansion are sent to the second terminal, so that the process of establishing connection between the second terminal and the first terminal is safer, and the security of network expansion is improved.
Fig. 4 is a flowchart of a second embodiment of the method for network expansion according to the present invention, where an execution subject of the embodiment may be a second terminal, and based on the above embodiments, as shown in fig. 4, the method of the embodiment includes:
s41: receiving an access instruction broadcasted by a first terminal, wherein the access instruction is generated according to a preset encryption algorithm and a network expansion request after the first terminal receives the network expansion request comprising at least one second terminal, and the network expansion request comprises a corresponding device identifier and an access parameter of the second terminal.
S42: and decrypting the access instruction according to a preset decryption algorithm and the equipment identifier and the access parameter of the second terminal, and if the decryption is successful, sending a network connection request to the first terminal.
S43: and receiving the configuration parameters for network extension sent by the first terminal.
S44: and configuring the second terminal according to the configuration parameters.
For a specific implementation of this embodiment, reference may be made to the first embodiment described above, which is not described herein again.
Fig. 5 is a flowchart of a third embodiment of a method for network extension provided by the present invention, and fig. 6 is a signaling flowchart of the third embodiment of the method for network extension provided by the present invention, as shown in fig. 5 and fig. 6, based on the above embodiments, the method of the present embodiment includes:
s51: a first terminal receives a first message sent by a client, wherein the client is used for managing the first terminal, the first message comprises a network extension request of at least one second terminal, and the network extension request comprises a device identifier and an access parameter of the corresponding second terminal.
Specifically, the first terminal should have a client software, and the client software can be installed in a certain mobile terminal. The client software can be used for configuring a gateway of a local area network corresponding to the first terminal and managing services of the local area network.
In this embodiment, the client first obtains a network expansion request of one or more second terminals, and then sends the network expansion request to the first terminal through the first message. The process of the client acquiring the network expansion request of the second terminal is not specifically limited, and the present invention may have various embodiments, for example: in one optional implementation manner, a user inputs information such as a device identifier and an access parameter of the second terminal into the client, so that the client obtains a network expansion request of the second terminal; another optional implementation manner is that information such as the device identifier and the access parameter in the second terminal may be displayed on the second terminal in a form of a two-dimensional code, and the network extension request of the second terminal may be acquired in a manner that the client scans the two-dimensional code.
In this embodiment, the client may obtain the network extension requests of the plurality of second terminals at a time, and then combine the plurality of network extension requests in one first message to be sent to the first terminal, so that the first terminal may perform the authentication and parameter configuration processes on the plurality of second terminals at the same time, thereby improving the efficiency of network extension.
S52: and the first terminal generates an access instruction of the at least one second terminal according to a preset encryption algorithm and the network expansion request, and broadcasts the access instruction.
S53: the second terminal receives an access instruction broadcasted by the first terminal, decrypts the access instruction according to a preset decryption algorithm and the equipment identifier and the access parameter of the second terminal, and sends a network connection request to the first terminal if decryption is successful, wherein the network connection request comprises the equipment identifier of the second terminal.
S54: and the first terminal receives the network connection request, verifies the network connection request according to the equipment identifier in the network connection request, and sends configuration parameters for network expansion to the second terminal if the verification is passed.
In this embodiment, after receiving the network extension request of the second terminal, the first terminal may obtain information such as a device identifier and an access parameter of the second terminal to be accessed to the network, and for convenience of a subsequent verification process, the first terminal may store the information such as the device identifier and the access parameter, so as to form an information list of the second terminal to be accessed.
And after the second terminal successfully decrypts the access instruction, sending a network connection request to the first terminal, wherein the network connection request can carry a corresponding device identifier. After receiving the network connection request, the first terminal compares the carried equipment identification with an information list of a second terminal to be accessed, which is stored in the first terminal, and if the equipment identification exists in the list, the verification is passed, and configuration parameters for network expansion are sent to the second terminal; if the device identification does not exist in the list, the verification is not passed, and the network connection request of the second terminal is rejected.
In this embodiment, after the first terminal acquires the network expansion request of the second terminal, the network expansion request is encrypted according to a preset encryption algorithm to generate an access instruction, and when the second terminal decrypts the access instruction successfully, the configuration parameters for network expansion are sent to the second terminal, so that the process of establishing connection between the second terminal and the first terminal is safer, and the security of network expansion is improved.
S55: and the second terminal receives configuration parameters for network expansion and configures the second terminal according to the configuration parameters.
S56: and the second terminal sends a network connection state message to the first terminal.
S57: and the first terminal receives the network connection state message and sends a second message to the client, wherein the second message comprises the connection state of the second terminal.
Specifically, the second terminal performs configuration according to the configuration parameters sent by the first terminal, and after the configuration becomes effective, the second terminal establishes network connection with the first terminal, and the second terminal sends a network connection state message to the first terminal, so that the first terminal sends the network connection state of the second terminal to the client, and the client updates the network state of the second terminal or performs further management. For example, the client may query the connection status information of the first terminal and all the second terminals, and if the connection status of a certain second terminal is abnormal, the network expansion request of the second terminal may be reinitiated.
In this embodiment, a first terminal receives a first message including a network extension request of at least one second terminal, and generates and broadcasts an access instruction of the at least one second terminal according to a preset encryption algorithm and the network extension request, and then the first terminal receives a network connection request sent by the second terminal and sends configuration parameters for network extension to the second terminal, so that the second terminal performs configuration according to the configuration parameters, thereby implementing extension of network coverage of the first terminal. In the network expansion process in this embodiment, the second terminal and the first terminal automatically establish network connection to realize network expansion. Further, in this embodiment, automatic configuration of multiple second terminals can be implemented simultaneously, which further improves the efficiency of network expansion. In addition, in this embodiment, after the first terminal acquires the network expansion request of the second terminal, the network expansion request is encrypted according to a preset encryption algorithm to generate an access instruction, and when the second terminal decrypts the access instruction successfully, the configuration parameters for network expansion are sent to the second terminal, so that the process of establishing connection between the second terminal and the first terminal is safer, and the security of network expansion is improved.
Fig. 7 is a schematic structural diagram of a first terminal according to an embodiment of the present invention, and as shown in fig. 7, when the terminal of this embodiment is used as a first terminal 700, the terminal includes: a receiving module 701, an encryption module 702, and a sending module 703.
The receiving module 701 is configured to receive a first message, where the first message includes a network extension request of at least one second terminal, and the network extension request includes a device identifier and an access parameter of the corresponding second terminal;
an encryption module 702, configured to generate an access instruction of the at least one second terminal according to a preset encryption algorithm and the network expansion request;
a sending module 703, configured to broadcast the access instruction;
the receiving module 701 is further configured to receive a network connection request sent by the second terminal, where the network connection request is sent after the second terminal successfully decrypts the access instruction;
the sending module 703 is further configured to send, according to the network connection request, configuration parameters for network extension to the second terminal.
Optionally, the receiving module 701 is specifically configured to receive a first message sent by a client, where the client is used to manage the first terminal;
a receiving module 701, further configured to receive a network connection status message sent by the second terminal;
the sending module 703 is further configured to send a second message to the client, where the second message includes the connection status of the second terminal.
Optionally, the network connection request includes a device identifier of the second terminal;
the sending module 703 is specifically configured to verify the network connection request according to the device identifier, and send a configuration parameter for network extension to the second terminal if the verification passes.
The terminal of this embodiment may be configured to execute the technical solution of the first terminal side in any of the method embodiments, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 8 is a schematic structural diagram of a second terminal embodiment provided in the present invention, and as shown in fig. 8, when the terminal of this embodiment is used as the second terminal 800, the terminal includes: a receiving module 801, a decryption module 802, a sending module 803, and a configuration module 804.
The receiving module 801 is configured to receive an access instruction broadcasted by a first terminal, where the access instruction is generated according to a preset encryption algorithm and a network extension request after the first terminal receives the network extension request including at least one second terminal, and the network extension request includes a device identifier and an access parameter of the corresponding second terminal;
a decryption module 802, configured to decrypt the access instruction according to a preset decryption algorithm and the device identifier and the access parameter of the second terminal;
a sending module 803, configured to send a network connection request to the first terminal if the decryption is successful;
a receiving module 801, configured to receive configuration parameters for network extension sent by the first terminal;
a configuration module 804, configured to configure the second terminal according to the configuration parameter.
Optionally, the sending module 803 is further configured to send a network connection status message to the first terminal.
Optionally, the network connection request includes a device identifier of the second terminal, where the device identifier is used for the first terminal to verify the network connection request.
The terminal of this embodiment may be configured to execute the technical solution at the second terminal side in any of the method embodiments described above, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 9 is a schematic structural diagram of a third embodiment of the terminal provided in the present invention, and as shown in fig. 9, the terminal 900 in this embodiment includes: memory 901, processor 902 and computer programs. The computer program is stored in the memory 901 and configured to be executed by the processor 902 to implement the technical solution of the first terminal side in any one of the above method embodiments, or the technical solution of the second terminal side in any one of the above method embodiments, and the implementation principle and the technical effect are similar, which are not described herein again.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored, where the computer program is executed by a processor to implement the technical solution of the first terminal side in any of the above method embodiments, or the technical solution of the second terminal side in any of the above method embodiments, and implementation principles and technical effects thereof are similar, and are not described herein again.
Fig. 10 is a schematic structural diagram of a system embodiment of network expansion provided in the present invention, and as shown in fig. 10, a system 1000 of network expansion of the present embodiment includes: a first terminal 1001 and at least one second terminal 1002, wherein the first terminal 1001 may adopt the structure of the terminal shown in fig. 7, and the second terminal 1002 may adopt the structure of the terminal shown in fig. 8. The system of this embodiment may implement the technical solution of any of the above method embodiments, and the implementation principle and technical effect are similar, which are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of a unit is merely a logical division, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: a U disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In the foregoing embodiments of the network device or the terminal device, it should be understood that the Processor may be a Central Processing Unit (CPU), or may be other general-purpose processors, Digital Signal Processors (DSP), Application Specific Integrated Circuits (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present application may be embodied directly in a hardware processor, or in a combination of the hardware and software modules in the processor.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (9)

1. A method for network expansion is applied to a first terminal and comprises the following steps:
receiving a first message, wherein the first message comprises a network extension request of at least one second terminal, and the network extension request comprises a device identifier and an access parameter of the corresponding second terminal;
generating an access instruction of the at least one second terminal according to a preset encryption algorithm and the network expansion request, and broadcasting the access instruction;
receiving a network connection request sent by the second terminal, wherein the network connection request is sent by the second terminal after the second terminal successfully decrypts the access instruction; the network connection request comprises a device identifier of the second terminal;
and verifying the network connection request according to the equipment identification, and if the verification is passed, sending configuration parameters for network expansion to the second terminal.
2. The method of claim 1, wherein receiving the first message comprises:
receiving a first message sent by a client, wherein the client is used for managing the first terminal;
correspondingly, after sending the configuration parameters for network extension to the second terminal according to the network connection request, the method further includes:
receiving a network connection state message sent by the second terminal;
and sending a second message to the client, wherein the second message comprises the connection state of the second terminal.
3. A method for network expansion is applied to a second terminal, and comprises the following steps:
receiving an access instruction broadcasted by a first terminal, wherein the access instruction is generated according to a preset encryption algorithm and a network expansion request after the first terminal receives the network expansion request comprising at least one second terminal, and the network expansion request comprises a corresponding device identifier and an access parameter of the second terminal;
decrypting the access instruction according to a preset decryption algorithm and the equipment identifier and the access parameter of the second terminal, and if the decryption is successful, sending a network connection request to the first terminal; the network connection request comprises a device identifier of the second terminal, and the device identifier is used for the first terminal to verify the network connection request;
receiving configuration parameters for network expansion sent by the first terminal;
and configuring the second terminal according to the configuration parameters.
4. The method of claim 3, wherein after configuring the second terminal according to the configuration parameter, further comprising:
and sending a network connection state message to the first terminal.
5. A terminal, when acting as a first terminal, comprising:
a receiving module, configured to receive a first message, where the first message includes a network extension request of at least one second terminal, and the network extension request includes a device identifier and an access parameter of the corresponding second terminal;
the encryption module is used for generating an access instruction of the at least one second terminal according to a preset encryption algorithm and the network expansion request;
the sending module is used for broadcasting the access instruction;
the receiving module is further configured to receive a network connection request sent by the second terminal, where the network connection request is sent after the second terminal successfully decrypts the access instruction; the network connection request comprises a device identifier of the second terminal; the sending module is further configured to verify the network connection request according to the device identifier, and send a configuration parameter for network extension to the second terminal if the verification is passed.
6. A terminal, when acting as a second terminal, comprising:
the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving an access instruction broadcasted by a first terminal, the access instruction is generated according to a preset encryption algorithm and a network extension request after the first terminal receives the network extension request comprising at least one second terminal, and the network extension request comprises a corresponding device identifier and an access parameter of the second terminal;
the decryption module is used for decrypting the access instruction according to a preset decryption algorithm and the equipment identifier and the access parameter of the second terminal;
a sending module, configured to send a network connection request to the first terminal if decryption is successful; the network connection request comprises a device identifier of the second terminal, and the device identifier is used for the first terminal to verify the network connection request;
the receiving module is further configured to receive a configuration parameter for network extension sent by the first terminal;
and the configuration module is used for configuring the second terminal according to the configuration parameters.
7. A terminal, comprising:
a memory;
a processor; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the method of claim 1 or 2, or the method of claim 3 or 4.
8. A computer-readable storage medium, having stored thereon a computer program;
the computer program is executed by a processor to implement the method of claim 1 or 2, or the method of claim 3 or 4.
9. A system for network expansion, comprising: a terminal according to claim 5 and at least one terminal according to claim 6.
CN201810520173.4A 2018-05-28 2018-05-28 Network expansion method, terminal and system Active CN108834143B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810520173.4A CN108834143B (en) 2018-05-28 2018-05-28 Network expansion method, terminal and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810520173.4A CN108834143B (en) 2018-05-28 2018-05-28 Network expansion method, terminal and system

Publications (2)

Publication Number Publication Date
CN108834143A CN108834143A (en) 2018-11-16
CN108834143B true CN108834143B (en) 2021-06-29

Family

ID=64145770

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810520173.4A Active CN108834143B (en) 2018-05-28 2018-05-28 Network expansion method, terminal and system

Country Status (1)

Country Link
CN (1) CN108834143B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112135512A (en) * 2019-02-02 2020-12-25 苏州宝时得电动工具有限公司 Wireless network connection method and system of mower and mower
CN110995428B (en) * 2019-12-13 2020-10-23 夏侯淑琴 Electronic equipment using fusion access and corresponding access method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101150472A (en) * 2007-10-22 2008-03-26 华为技术有限公司 Authentication method, authentication server and terminal in WIMAX
CN101656956A (en) * 2008-08-22 2010-02-24 华为技术有限公司 Method, system and gateway for accessing 3GPP network
CN101990204A (en) * 2009-08-07 2011-03-23 中国移动通信集团公司 Method and device for accessing service by using card inserted terminal
CN106332084A (en) * 2016-09-08 2017-01-11 上海斐讯数据通信技术有限公司 Wireless network expanding method, wireless network expanding system and wireless network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2760875T3 (en) * 2014-04-30 2020-05-18 Affirmed Networks Inc Optimization of capacity extension in a mobile network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101150472A (en) * 2007-10-22 2008-03-26 华为技术有限公司 Authentication method, authentication server and terminal in WIMAX
CN101656956A (en) * 2008-08-22 2010-02-24 华为技术有限公司 Method, system and gateway for accessing 3GPP network
CN101990204A (en) * 2009-08-07 2011-03-23 中国移动通信集团公司 Method and device for accessing service by using card inserted terminal
CN106332084A (en) * 2016-09-08 2017-01-11 上海斐讯数据通信技术有限公司 Wireless network expanding method, wireless network expanding system and wireless network

Also Published As

Publication number Publication date
CN108834143A (en) 2018-11-16

Similar Documents

Publication Publication Date Title
CN108366362B (en) MESH network and MESH equipment security network distribution method thereof
CN110139271B (en) Method, system and device for configuring intelligent household equipment to access network in batch
US8208455B2 (en) Method and system for transporting configuration protocol messages across a distribution system (DS) in a wireless local area network (WLAN)
Akyol et al. A survey of wireless communications for the electric power system
US8929276B2 (en) Repeater WPS connection method and apparatus
CN107409307B (en) Method and medium for allowing or denying a wireless network device access to a wireless local area network
WO2020098253A1 (en) Network access method and apparatus, related devices, and storage medium
US10305684B2 (en) Secure connection method for network device, related apparatus, and system
KR102062162B1 (en) Security authentication method, configuration method and related devices
CN105682093A (en) Wireless network access method and access device, and client
WO2007047118A2 (en) Virtual lan override in a multiple bssid mode of operation
WO2023280194A1 (en) Network connection management method and apparatus, readable medium, program product, and electronic device
US11871223B2 (en) Authentication method and apparatus and device
CN112119651B (en) Access technology agnostic service network authentication method and device
CN113347741A (en) Online method and system of gateway equipment
CN108834143B (en) Network expansion method, terminal and system
WO2008098510A1 (en) Mehtod and apparatus for acquiring access controller information in wireless lan
CN102970680A (en) Method and device for network switching
JP2018526846A (en) Wireless device configuration and authentication
US20060039305A1 (en) Method and system for EAP encapsulation exchange for a setup configuration protocol in a WLAN
CN110943835A (en) Distribution network encryption method and system for sending wireless local area network information
US8229398B2 (en) GSM authentication in a CDMA network
US20110314136A1 (en) Method and System for Improved Communication Network Setup
CN112512064A (en) Wireless network distribution method, wireless gateway and equipment to be accessed
CN114697958A (en) Network access method and system of wireless access point, AP and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant