CN109196916A - A kind of method, apparatus and system obtaining authentication information - Google Patents

A kind of method, apparatus and system obtaining authentication information Download PDF

Info

Publication number
CN109196916A
CN109196916A CN201780032665.2A CN201780032665A CN109196916A CN 109196916 A CN109196916 A CN 109196916A CN 201780032665 A CN201780032665 A CN 201780032665A CN 109196916 A CN109196916 A CN 109196916A
Authority
CN
China
Prior art keywords
equipment
authentication information
network
beacon message
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201780032665.2A
Other languages
Chinese (zh)
Inventor
许剑峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN109196916A publication Critical patent/CN109196916A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/02Selection of wireless resources by user or terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Abstract

The embodiment of the present application provides a kind of method, apparatus and system for obtaining authentication information, is related to field of communication technology, can be improved the success rate for obtaining authentication information.This method comprises: the second equipment receives the first beacon message of the network state of the identification information including the first equipment that the first equipment is sent and the first equipment;And the second equipment sends the first authentication information for the first equipment access first network according to first beacon message to the first equipment;In the case where the second equipment determines that the first equipment receives the failure of the first authentication information, the second equipment creates the second network;And the second equipment sends the first authentication information to the first equipment using second network.

Description

A kind of method, apparatus and system obtaining authentication information
This application claims Patent Office of the People's Republic of China is submitted on December 30th, 2016, application No. is 201611265890.4, a kind of priority of the Chinese patent application of entitled " method and apparatus of WiFi network configuration ", entire contents are hereby incorporated by reference in the application.
Technical field
The invention relates to field of communication technology more particularly to a kind of method, apparatus and system for obtaining authentication information.
Background technique
In wireless communication field, with the fast development of Wireless Fidelity (wireless fidelity, Wi-Fi) technology, smart machine can access the wireless network (can be referred to as Wi-Fi network) set up using Wi-Fi technology according to authentication information.
At present, during smart machine accesses Wi-Fi network, for the smart machine (hereinafter referred to as the first equipment) of no input unit (such as keyboard or touch display screen), first equipment can not input the authentication information of Wi-Fi network by input unit, in this case, first equipment can receive the authentication information of other smart machines (hereinafter referred to as the second equipment) broadcast, multicast or unicast in the case where monitoring operating mode, to access Wi-Fi network according to the authentication information.
However, in the above method, the carrier frequency as used by the authentication information of the second device broadcasts, multicast or unicast Wi-Fi network is typically larger than the first equipment and receives carrier frequency used by the authentication information, therefore the first equipment possibly can not receive the authentication information of the second equipment transmission, in this way, it is relatively low to may cause the first standby success rate for obtaining authentication information.
Summary of the invention
The application provides a kind of method, apparatus and system for obtaining authentication information, can be improved the success rate for obtaining authentication information.
In a first aspect, the application provides a kind of method for obtaining authentication information, this method may include: that the second equipment receives the first beacon message that the first equipment is sent;And the second equipment sends the first authentication information for first equipment access first network according to its received first beacon message to the first equipment;And in the case where the second equipment determines that the first equipment receives the failure of the first authentication information, the second equipment creates the second network;And the second equipment sends the first authentication information to the first equipment using the second network, wherein the network state of identification information and the first equipment in the first beacon message including the first equipment.
The method provided by the present application for obtaining authentication information, during first the first authentication information of device request, second equipment can send the first authentication information to the first equipment by the way of broadcast, in the first equipment in the first authentication information failure for obtaining the second device broadcasts under monitoring operating mode, second equipment can create the second network, and the second equipment can send the first authentication information to the first equipment using second network, therefore can be improved the success rate that the first equipment obtains the first authentication information.
In the first optional implementation of first aspect, above-mentioned second equipment determines that the method that the second equipment receives the first authentication information may include: that the second equipment according to the second beacon message determines the first equipment The failure of the first authentication information is received, includes the identification information of the first equipment and the network state of the first equipment in second beacon message.
In the application, the success of the first authentication information or failure are obtained in the first equipment, first equipment continue broadcast beacon message the case where (be properly termed as Situation1) under, second equipment receives the second beacon message of the first device broadcasts, second equipment can be according to the network state of the first equipment in second beacon message, determine whether the first equipment gets the first authentication information, when the network state of the first equipment is to have not been obtained to the state (below referred to as the second state) of the first authentication information, second equipment determines that the first equipment obtains the failure of the first authentication information.When the first equipment receives the failure of the first authentication information, first device broadcasts beacon message, when first equipment obtains the success of the first authentication information, first equipment go off the air beacon message the case where (be properly termed as Situation2) under, second equipment is after the first beacon message for receiving the first device broadcasts, the second beacon message of the first device broadcasts is also received, then the second equipment is you can learn that the first equipment has not been obtained to the first authentication information.
In second of optional implementation of first aspect, the method that above-mentioned second equipment creates the second network may include: the service set (service set identifier, SSID) that the second network is arranged according to its received second beacon message for the second equipment.
In the application, the second equipment can be according to the SSID of its second network of received second beacon message equipment.Specifically, the mark of the first equipment carried in its received second beacon message (can be able to be media access control (the Medium Access Control of the first equipment by the second equipment, MAC) the sequence number of address or the first equipment) as the second network SSID a part, and a special identifier is arranged in the field that the second equipment can also specify in the SSID of the second network, the mark be used to indicate second equipment be in the state of the first authentication information can be provided, to which the first equipment can determine that second equipment can provide the first authentication information for the first equipment according to the SSID of second network.
In the application, second network can be without password, the password of second network may be the password of network-based security level setting, so that the first equipment can access the second network according to the SSID of the second network and the password of the second network when the first equipment gets the SSID of the second network.
Second aspect, the application provide a kind of method for obtaining authentication information, and this method may include: the first beacon message that the first device broadcasts are used to request the first authentication information;And the first equipment receives the first authentication information that the second equipment is sent according to first beacon message;And in the case where the first equipment determines that the first equipment obtains the failure of the first authentication information, the first equipment accesses the second network of the second equipment creation;And the first equipment receives first authentication information that the second equipment uses the second network to send, wherein the network state of identification information and the first equipment in first beacon message including the first equipment, first authentication information access first network for the first equipment.
The method provided by the present application for obtaining authentication information, due to when the first equipment is in the first authentication information failure for obtaining the transmission of the second equipment under monitoring operating mode, first equipment can access the second network of the second equipment creation, to which the first equipment can receive the first authentication information that the second equipment uses the second network to send, therefore it can be improved the success rate that the first equipment obtains the first authentication information.
In the first optional implementation of second aspect, above-mentioned first equipment determines that the method that first equipment obtains the failure of the first authentication information may include: when the first equipment does not receive the first authentication information of the second equipment transmission within a preset period of time, and the first equipment determines that the first equipment obtains the first certification letter Breath failure.
In the application, after first the first beacon message of device broadcasts, first equipment can wait other equipment to send the first authentication information to the first equipment, if the first equipment does not receive the first authentication information broadcasting in one section of preset time period after the first beacon message, then the first equipment can determine that first equipment obtains the failure of the first authentication information, to which the first equipment can obtain the first authentication information by other means, to guarantee that first equipment can access first network according to the first authentication information.
In second of optional implementation of second aspect, the method provided by the present application for obtaining authentication information can also include: first the second beacon message of device broadcasts.
In the third optional implementation of second aspect, after the first authentication information that the first equipment receives that the second equipment is sent according to the first beacon message of the first device broadcasts, the method provided by the present application for obtaining authentication information can also include: first the second beacon message of device broadcasts, include the network state of the first equipment in second beacon message.
In the application, for Situation1, when first equipment determines that the first equipment obtains the failure of the first authentication information, (second beacon message is identical as the first beacon message for the second beacon message that first equipment can be broadcasted, the network state of the first equipment is the second state i.e. in second beacon message), to request the first authentication information to the other equipment around first equipment again.For Situation2, first equipment receives after the first authentication information that the second equipment is sent, the second beacon message that first equipment can be broadcasted, the network state of the first equipment can be first state or the second state in second beacon message, so that the second equipment can determine that the first equipment obtains the success of the first authentication information or failure according to the second beacon message.
In the 4th kind of optional implementation of second aspect, before the second network that the first equipment accesses the creation of the second equipment, the method provided by the present application for obtaining authentication information can also include: in the case where the first equipment gets the SSID of the second network, and the first equipment determines that the second equipment is to provide the equipment of the first authentication information for first equipment according to the SSID of the second network.
In the application, first equipment can detecte the SSID of multiple networks, when the first equipment gets the SSID of the second network, first equipment can know that the second equipment can provide the first authentication information for the first equipment according to the mark of the first equipment in the SSID of the second network, and first equipment can know that second equipment is according to the special identifier in the SSID of the second network to provide the state of the first authentication information for the first equipment, so, second equipment can determine that corresponding second equipment of the SSID of second network is can to provide the equipment of the first authentication information for the first equipment, to which the first equipment can access the second network, and receive the first authentication information that the second equipment uses second network to send.
The third aspect, the application provide a kind of equipment for obtaining authentication information, which includes receiving module, sending module and creation module.Wherein, receiving module can be used for receiving the first beacon message of the first equipment transmission;Sending module can be used for sending the first authentication information for first equipment access first network to the first equipment according to received first beacon message of receiving module;Creation module can be used for creating the second network in the case where the equipment determines that the first equipment receives the failure of the first authentication information;Sending module can be also used for sending the first authentication information to the first equipment using the second network, wherein the network state of identification information and the first equipment in first beacon message including the first equipment.
In the first optional implementation of the third aspect, the equipment provided by the present application for obtaining authentication information further includes determining module, which is used for according to the received second beacon report of receiving module Text determines that the first equipment receives the failure of the first authentication information, includes the identification information of the first equipment and the network state of the first equipment in second beacon message.
In second of optional implementation of the third aspect, above-mentioned creation module is specifically used for that the SSID of the second network is arranged according to received second beacon message of receiving module.
The third aspect and its technical effect of various optional implementations may refer to above-mentioned to first aspect and its associated description of the technical effect of various optional implementations, and details are not described herein again.
Fourth aspect, the application provide a kind of equipment for obtaining authentication information, which may include sending module, receiving module and AM access module.Sending module can be used for broadcasting the first beacon message for requesting the first authentication information;Receiving module can be used for receiving the first authentication information that the second equipment is sent according to the first beacon message;AM access module can be used in the case where the equipment determines that the equipment obtains the failure of the first authentication information, the second network of access the second equipment creation;Receiving module can be also used for receiving the first authentication information for equipment access first network that the second equipment is sent using the second network, wherein the network state of identification information and the equipment in first beacon message including the equipment.
In the first optional implementation of fourth aspect, the equipment provided by the present application for obtaining authentication information can also include determining module.The determining module can be used for determining that the equipment obtains the failure of the first authentication information when receiving module does not receive the first authentication information of the second equipment transmission within a preset period of time.
In second of optional implementation of fourth aspect, above-mentioned sending module can be also used for broadcasting the second beacon message after receiving module receives the failure of the first authentication information.
In the third optional implementation of fourth aspect, above-mentioned sending module be can be also used for after the first authentication information that receiving module receives that the second equipment is sent, and broadcast the second beacon message.
In the 4th kind of optional implementation of fourth aspect, above-mentioned determining module be can be also used in the case where the equipment gets the SSID of the second network, determine that the second equipment is to provide the equipment of the first authentication information for the equipment according to the SSID of the second network.
Fourth aspect and its technical effect of various optional implementations may refer to above-mentioned to second aspect and its associated description of the technical effect of various optional implementations, and details are not described herein again.
5th aspect, provides a kind of equipment for obtaining authentication information, which may include processor, transceiver and the memory being of coupled connections with the processor.The memory can be used for storing computer instruction.When second equipment operation, the processor executes the computer instruction of memory storage, the processor is used to control transceiver and receives the first beacon message that the first equipment is sent, and includes the identification information of the first equipment and the network state of the first equipment in first beacon message;And it controls transceiver and the first authentication information is sent to the first equipment according to the first beacon message, which accesses first network for the first equipment;And in the case where determining that the first equipment receives the failure of the first authentication information, create the second network;And it controls transceiver and the first authentication information is sent to the first equipment using the second network.
In the first optional implementation of the 5th aspect, above-mentioned processor is specifically used for determining that the first equipment receives the failure of the first authentication information according to the second beacon message, includes the identification information of the first equipment and the network state of the first equipment in second beacon message.
In second of optional implementation of the 5th aspect, above-mentioned processor is specifically used for that the SSID of the second network is arranged according to the second beacon message.
6th aspect, provides a kind of computer readable storage medium, which may include computer instruction.When the computer instruction is run on one device so that the equipment execute in above-mentioned first aspect and its various optional implementations it is one of any described in acquisition authentication information method.
7th aspect, a kind of computer program product including computer instruction is provided, when the computer program product is run on one device so that the equipment execute in above-mentioned first aspect and its various optional implementations it is one of any described in acquisition authentication information method.
The description of the related content and technical effect of 5th aspect to the 7th aspect may refer to above-mentioned to first aspect and its associated description of the related content of various optional implementations and technical effect, and details are not described herein again.
Eighth aspect provides a kind of equipment for obtaining authentication information, which may include processor, transceiver and the memory being of coupled connections with the processor.The memory can be used for storing computer instruction.When first equipment operation, the processor executes the computer instruction of memory storage, processor is for controlling the first beacon message of transceiver broadcasts, the network state of identification information and the first equipment in first beacon message including the first equipment, for first beacon message for requesting the first authentication information, which accesses first network for equipment;And it controls transceiver and receives the first authentication information that the second equipment is sent according to the first beacon message;And in the case where determining that the first equipment obtains the failure of the first authentication information, the second network of access the second equipment creation;And it controls transceiver and receives the first authentication information that the second equipment uses the second network to send.
In the first optional implementation of eighth aspect, the equipment that above-mentioned processor is specifically used for determining when above-mentioned transceiver does not receive the first authentication information of the second equipment transmission within a preset period of time this for obtaining authentication information obtains the failure of the first authentication information.
In second of optional implementation of eighth aspect, after above-mentioned transceiver can be used for receiving the failure of the first authentication information, the first beacon message is broadcasted.
In the third optional implementation of eighth aspect, above-mentioned transceiver can be also used for after receiving the first authentication information that the second equipment is sent according to the first beacon message, the second beacon message is broadcasted, which includes that this is used to obtain the identification information of the equipment of authentication information and the network state of the equipment.
In the 4th kind of optional implementation of eighth aspect, above-mentioned processor can be also used in the case where getting the SSID of the second network, determine that the second equipment is to provide the equipment of the first authentication information for the equipment for being used to obtain authentication information according to the SSID of the second network.
9th aspect, provides a kind of computer readable storage medium, which may include computer instruction.When the computer instruction is run on one device so that the equipment execute in above-mentioned second aspect and its various optional implementations it is one of any described in acquisition authentication information method.
Tenth aspect, a kind of computer program product including computer instruction is provided, when the computer program product is run on one device so that the equipment execute in above-mentioned second aspect and its various optional implementations it is one of any described in acquisition authentication information method.
The description of related content and technical effect of eighth aspect to the tenth aspect may refer to above-mentioned to second aspect and its associated description of the related content of various optional implementations and technical effect, and details are not described herein again.
In first aspect into the tenth aspect, above-mentioned first authentication information may include at least one in the certification certificate of the SSID of first network, the password of first network and first network.
In the application, when the first equipment accesses first network, according to actual use demand, the first equipment can be according at least one access first network in the certification certificate of the SSID of first network, the password of first network and first network.
In first aspect into the tenth aspect, above-mentioned second network is the second network of the second equipment creation.
In the application, when the first equipment obtains the failure of the first authentication information, and when the second equipment determines that the first equipment obtains the failure of the first authentication information, second equipment can create a hot spot networks (i.e. the second network), to which the second equipment can send the first authentication information to the first equipment using the second network, it can so guarantee that the first equipment successfully obtains the first authentication information.
Tenth on the one hand, and the application provides a kind of communication system, the communication system may include it is one of any in the above-mentioned third aspect and its various optional implementations described in equipment, it is one of any in fourth aspect and its various optional implementations described in equipment.
Or, the communication system may include equipment described in above-mentioned 5th aspect, equipment described in 7th aspect, wherein, in the third aspect and its various optional implementations it is one of any described in equipment, and the 5th equipment described in aspect be the second equipment, it is one of any in fourth aspect and its various optional implementations described in equipment and the 7th aspect described in equipment be the first equipment.
The related content and technical effect of tenth one side may refer to above-mentioned to first aspect and its associated description of the related content and technical effect of various optional implementations and second aspect and its various optional implementations, and details are not described herein again.
Detailed description of the invention
Fig. 1 is a kind of structural schematic diagram of communication system provided by the embodiments of the present application;
Fig. 2 is a kind of hardware schematic of intelligent desk lamp provided by the embodiments of the present application;
Fig. 3 is a kind of hardware schematic of mobile phone provided by the embodiments of the present application;
Fig. 4 is the method schematic diagram one provided by the embodiments of the present application for obtaining authentication information;
Fig. 5 is the method schematic diagram two provided by the embodiments of the present application for obtaining authentication information;
Fig. 6 is the method schematic diagram three provided by the embodiments of the present application for obtaining authentication information;
Fig. 7 is the method schematic diagram four provided by the embodiments of the present application for obtaining authentication information;
Fig. 8 is the structural schematic diagram one of the second equipment provided by the embodiments of the present application;
Fig. 9 is the structural schematic diagram two of the second equipment provided by the embodiments of the present application;
Figure 10 is the structural schematic diagram one of the first equipment provided by the embodiments of the present application;
Figure 11 is the structural schematic diagram two of the first equipment provided by the embodiments of the present application.
Specific embodiment
The terms "and/or", only a kind of incidence relation for describing affiliated partner, indicates may exist three kinds of relationships, for example, A and/or B, can indicate: individualism A exists simultaneously A and B, these three situations of individualism B.
Term " first " and " second " in the specification and claims of the embodiment of the present application etc. are rather than to be used for the particular order of description object for distinguishing different objects.For example, the first equipment and the second equipment etc. are the particular orders for distinguishing different equipment, rather than for describing equipment.
In the embodiment of the present application, " illustrative " or " such as " etc. words for indicate make example, illustration or explanation.Be described as in the embodiment of the present application " illustrative " or " such as " any embodiment or design scheme be not necessarily to be construed as than other embodiments or design scheme more preferably or more advantage.Specifically, use " illustrative " or " such as " etc. words be intended to that related notion is presented in specific ways.
Some concepts involved in the method, apparatus and system provided by the embodiments of the present application for obtaining authentication information are illustrated below.
Service set (SSID): it can be understood as the title of wireless network, SSID can distinguish different wireless networks, when some equipment accesses wireless network, the password of SSID and the wireless network can be used for the equipment and complete authentication, then access the wireless network again.In general, SSID can be at most made of 32 bytes.
Beacon (Beacon) technology: Beacon technology is a kind of communication technology that message push may be implemented.Such as, if being equipped with the application program for supporting to pass through Beacon technology PUSH message on the smart machine (such as smart phone) of user, when the smart phone enters in the service range of the base station Beacon, the application program on the smart phone can push the message of response to user.Illustratively, when user enters in some market, the mobile phone of the user can receive the market Discount Promotion information, this process realizes that message pushes using Beacon technology.
In order to solve in background technique, the lower problem of the success rate of the first equipment acquisition authentication information, the embodiment of the present application provides a kind of method, apparatus and system for obtaining authentication information.In the case that first equipment obtains the failure of the first authentication information in the listen mode, first equipment can access the second network of the second equipment creation, to which the second equipment can send the first authentication information to the first equipment using the second network, it so, it is possible to improve the success rate that the first equipment obtains the first authentication information.
The method provided by the embodiments of the present application for obtaining authentication information can be applied in wireless communication system, Fig. 1 is the configuration diagram of communication system provided by the embodiments of the present application, as shown in Figure 1, the communication system may include: the first equipment 10, the second equipment 11 and router 12.Wherein the second equipment is connected to Wi-Fi network by router 12, first equipment 10 is the smart machine of the Wi-Fi network to be accessed in the communication system, first equipment 10 does not have input unit, in the communication system, when the first equipment 10 needs to access Wi-Fi network, first equipment 10 can obtain the authentication information for accessing the Wi-Fi network from the second equipment 11, to which the first equipment 10 can access the Wi-Fi network by router, in this way, the first equipment 10 can be communicated using the Wi-Fi network with other equipment.
In the embodiment of the present application, above-mentioned first equipment is the smart machine of not input unit, and the second equipment can be the smart machine with input unit, and the first equipment can be the equipment such as intelligent desk lamp, intelligent washing machine, intelligent socket and intelligent refrigerator.
Illustratively, the embodiment of the present application introduces the hardware configuration of the first equipment by taking intelligent desk lamp as an example, and each component parts of intelligent desk lamp provided by the embodiments of the present application is specifically introduced below with reference to Fig. 2.As shown in figure 3, intelligent desk lamp provided by the embodiments of the present application may include: the components such as control unit 20, memory 21, communication unit 22 and power supply 23.It will be appreciated by those skilled in the art that, the structure of intelligent desk lamp shown in Figure 2 does not constitute the restriction to intelligent desk lamp, it may include the more or fewer components of component such as shown in Fig. 2, perhaps certain components in component as shown in Figure 2 can be combined or can be different from component layout as shown in Figure 2.
Control unit 20 is the core component of intelligent desk lamp, for controlling intelligent other component, control unit is alternatively referred to as one chip microcomputer or single-chip microcontroller, it is central processing unit (central process unit, CPU), memory, timer, counter and a variety of I/O Interface integrations be on a single die, the computer of chip-scale is formed, the control unit 20 of the intelligent desk lamp can be used for controlling the time of the opening and closing of the first equipment of the brightness of intelligent desk lamp, dead color or control.
Memory 21 is used to store the program code and data of intelligent desk lamp.
In the embodiment of the present application, it can be there are many memory in intelligent desk lamp, such as read-only memory reservoir (Read Only Memory ROM) random access memory (Random Access Memory, RAM) dynamic memory reservoir (DRAM), flash memory (Flash).
Communication unit 22 is used to complete the communication between intelligent desk lamp and other equipment, communication unit may include communication interface, the communication interface can have the structure of transmission-receiving function for transceiver, transmission circuit etc., communication interface includes serial communication interface and parallel communication interface, communication unit 22 can also include Wi-Fi module, intelligent desk lamp can be accessed in a network by Wi-Fi module, so as to be communicated using the network with other equipment.
Power supply 23 is used to power to all parts of intelligent desk lamp, and power supply 23 can be battery.Optionally, power supply 23 can be logically contiguous by power-supply management system and control unit 20, to realize the functions such as management charging, electric discharge and power managed by power-supply management system.
Optionally, intelligent desk lamp as shown in Figure 2 can also include sensor (such as thermometer sensor, photosensitive line sensor etc.), bluetooth module etc., and details are not described herein.
Second equipment provided by the embodiments of the present application can be mobile phone, tablet computer, laptop, Ultra-Mobile PC (ultra-mobile personal computer, UMPC), net book or personal digital assistant (personal digital assistant, PDA) etc..
Illustratively, the embodiment of the present application introduces the hardware configuration of the second equipment so that the second equipment is mobile phone as an example.Each component parts of mobile phone provided by the embodiments of the present application is specifically introduced below with reference to Fig. 3.As shown in figure 3, mobile phone provided by the embodiments of the present application includes: the components such as processor 30, radio frequency (radio frequency, RF) circuit 31, power supply 32, memory 33, input unit 34, display unit 35 and voicefrequency circuit 36.It will be appreciated by those skilled in the art that, the structure of mobile phone shown in Fig. 3 does not constitute the restriction to mobile phone, it may include the more or fewer components of component such as shown in Fig. 3, perhaps certain components in component as shown in Figure 3 can be combined or can be different from component layout as shown in Figure 3.
Processor 30 is the control centre of mobile phone, utilizes the various pieces of various interfaces and connection whole mobile phone.By running or executing the software program and/or module that are stored in memory 33, and the data that calling is stored in memory 33, the various functions and processing data of mobile phone are executed, to carry out integral monitoring to mobile phone.Optionally, processor 30 may include one or more processing units.Optionally, processor 30 can integrate application processor and modem processor, wherein the main processing operation system of application processor, user interface and application program etc.;Modem processor mainly handles wireless communication.It is understood that above-mentioned modem processor may be the processor with 30 individualism of processor.
RF circuit 31 can be used for receive and send messages or communication process in, send and receive signal.For example, being handled after the downlink information of base station is received to processor 30;In addition, the data of uplink are sent to base station.In general, RF circuit include but is not limited to antenna, at least one amplifier, transceiver, coupler, Low-noise amplifier (low noise amplifier, LNA) and duplexer etc..It is wirelessly communicated in addition, mobile phone can also be realized by the other equipment in RF circuit 31 and network.Any communication standard or agreement can be used in wireless communication, including but not limited to global system for mobile communications (global system of mobile communication, GSM), general packet radio service (general packet radio service, GPRS), CDMA (code division multiple access, CDMA), wideband code division multiple access (wideband code division multiple access, WCDMA), LTE, Email and short message service (short messaging service, SM S) etc..
Power supply 32 can be used for all parts power supply of mobile phone, and power supply 32 can be battery.Optionally, power supply can be logically contiguous by power-supply management system and processor 30, to realize the functions such as management charging, electric discharge and power managed by power-supply management system.
Memory 33 can be used for storing software program and/or module, and processor 30 is stored in the software program and/or module of memory 33 by operation, thereby executing the various function application and data processing of mobile phone.Memory 33 can mainly include storing program area and storage data area, wherein storing program area can application program (such as sound-playing function, image player function etc.) needed for storage program area, at least one function etc.;Storage data area, which can be stored, uses created data (such as audio data, image data, phone directory etc.) etc. according to mobile phone.In addition, memory 33 may include high-speed random access memory, it can also include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Input unit 34 can be used for receiving the number or character information of input, and generate key signals input related with the user setting of mobile phone and function control.Specifically, input unit 34 may include touch screen 341 and other input equipments 342.Touch screen 341, also referred to as touch panel, the touch operation (for example user uses the operations of any suitable object or attachment on touch screen 341 or near touch screen 341 such as finger, stylus) of collectable user on it or nearby, and corresponding attachment device is driven according to preset formula.Optionally, touch screen 341 may include both touch detecting apparatus and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and touch operation bring signal is detected, transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 30, and can receive order that processor 30 is sent and be executed.Furthermore, it is possible to realize touch screen 341 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.Other input equipments 342 can include but is not limited to one of physical keyboard, function key (such as volume control button, power switch button etc.), trace ball, mouse and operating stick etc. or a variety of.
Display unit 35 can be used for showing information input by user or be supplied to the information of user and the various menus of mobile phone.Display unit 35 may include display panel 351.Optionally, display panel 351 can be configured using the forms such as liquid crystal display (liquid crystal display, LCD), Organic Light Emitting Diode (organic light-emitting diode, OLED).Further, touch screen 341 can cover display panel 351, after touch screen 341 detects touch operation on it or nearby, processor 30 is sent to determine the type of touch event, is followed by subsequent processing device 30 according to the type of touch event and corresponding visual output is provided on display panel 351.Although touch screen 341 and display panel 351 are to realize that the function that outputs and inputs of mobile phone in certain embodiments can as two independent components in Fig. 3 That mobile phone is realized so that touch screen 341 and display panel 351 is integrated outputs and inputs function.
Wi-Fi module 36 can be used in mobile phone access Wi-Fi network, so that mobile phone can be communicated using Wi-Fi network with other equipment.
In conjunction with above-mentioned communication system shown in FIG. 1, the embodiment of the present application provides a kind of method for obtaining authentication information, as shown in figure 4, this method may include S101-S112:
S101, first the first beacon message of device broadcasts.
Wherein, the network state of mark and the first equipment in first beacon message of the first device broadcasts including the first equipment, the mark of first equipment can be with unique identification first equipment, the network state of first equipment may include the state (referred to as the second state below) for having got the state (being referred to as first state below) of the first authentication information and having had not been obtained to the first authentication information, first state can indicate that first equipment is in the state for having got the authentication information of first network, second state can indicate that the first equipment is in the state that the authentication information of first network has not been obtained, in first beacon message, the network state of first equipment is the second state.
In the embodiment of the present application, first equipment can broadcast beacon message to the other equipment around first equipment using Beacon technology, which is mainly used for the authentication information (being referred to as the first authentication information below) for the Wi-Fi (being referred to as first network below) for requesting the first equipment to be accessed.Specifically, first equipment can add the mark of the first equipment and the network state (can be first state or the second state) of the first equipment in the reserved field of beacon message, then to the other device broadcasts beacon message around first equipment, so that other equipment can know the presence of the first equipment and the network state of first equipment according to the beacon message.
Illustratively, as shown in table 1 below, the few examples for the information for including for beacon message provided by the embodiments of the present application.
Table 1
Title Length (byte) Effect
Timestamp 8 The time of the synchronous equipment for receiving beacon message
Beacon interval 2 Send the time interval of beacon message
Performance information 2 For notifying other equipment, the case where network performance
Service set 2-34 For distinguishing different networks
The rate of support 3-10 The rate that the equipment for sending beacon message is supported
Frequency parameter collection 7 The parameter of beacon message is sent using frequency hopping
The content enumerated in above-mentioned table 1 is the partial information in beacon message, and beacon message can also include other kinds of information, and the embodiment of the present application will not enumerate.
It should be noted that, in the embodiment of the present application, the mark of first equipment can be the product ID of the first equipment, or the MAC Address of the first equipment, it can also be that other can be with the mark of unique identification first equipment, it can be specifically not construed as limiting according to actual use demand selection, the embodiment of the present application.
It optionally, can be using the network state of mark first equipment of instruction, so that the second equipment can know the network state of the first equipment according to this mark in the embodiment of the present application.
Illustratively, in the embodiment of the present application, the mark for being used to indicate the network state of the first equipment can specifically be indicated using " 0 " or " 1 ".For example, can indicate the network-like of the first equipment using " 0 " State is first state, and " 1 " is used to indicate the network state of the first equipment for the second state;The network state that " 1 " can also be used to indicate the first equipment uses " 0 " to indicate the network state of the first equipment for the second state for first state.Certainly, what the embodiment of the present application can also be met the actual needs using other identifies the network state of above-mentioned first equipment is arranged, and the embodiment of the present application will not enumerate.
S102, the second equipment receive the first beacon message that the first equipment is sent.
The first beacon message that S103, the second equipment are sent according to the first equipment sends the first authentication information to the first equipment.
In the embodiment of the present application, after first the first beacon message of device broadcasts, second equipment receives the first beacon message of the first device broadcasts (sending), second equipment can know whether the first equipment has got the first authentication information for accessing first network according to the mark of the first equipment in first beacon message and the network state of the first equipment, if the network state of the first equipment is the second state, then the second equipment determines that the first equipment has not been obtained to the first authentication information, so that the second equipment sends the first authentication information to the first equipment.
Optionally, in the embodiment of the present application, the second equipment can be sent the authentication information of first network to broadcast, in a manner of multicast or unicast, so that the first equipment can receive the first authentication information of the second device broadcasts, multicast or unicast.
Optionally, in the embodiment of the present application, the first authentication information may include at least one in the certification certificate of the SSID of first network, the password of first network and first network.In a communications system, when some equipment (such as above-mentioned first equipment) needs to access first network, first equipment can input at least one in the certification certificate of the SSID of first network, the password of first network and first network, after at least one of the certification certificate of the SSID of the first network, the password of first network and first network are verified successfully, first equipment can access first network, and the first equipment can be using the first network and other communication between devices.
S104, the first equipment receive the first authentication information that the second equipment is sent.
In the embodiment of the present application, when first the first beacon message of device broadcasts, the first equipment is in listening mode, i.e. the first equipment can listen to the information of the broadcast of the other equipment around first equipment, multicast or unicast.First equipment receives the first authentication information that the second equipment is sent and is specifically as follows the first authentication information that the first equipment listens to the second device broadcasts, multicast or unicast, then first authentication information can be saved in first equipment by the first equipment, so that the first equipment can access first network according to the first authentication information.
S105, the first equipment determine that the first equipment obtains the failure of the first authentication information.
In the embodiment of the present application, during the first equipment obtains the first authentication information, it is understood that there may be some factors cause the first equipment to obtain signal(-) carrier frequency mismatch between authentication information failure, such as wireless signal interference, equipment etc..Illustratively, by taking signal(-) carrier frequency mismatches this factor as an example, since the second equipment is usually broadcasted, the used carrier frequency (being properly termed as the second carrier frequency) of multicast or unicast data (i.e. the first authentication information) is relatively high, and usually to receive carrier frequency used by data (being properly termed as first carrier frequency) relatively low for the first equipment, in the case where the second carrier frequency is greater than first carrier frequency, first equipment possibly can not receive the first authentication information of the second equipment transmission, so as to cause the first equipment to obtain the failure of the first authentication information.
Optionally, in the embodiment of the present application, after the first equipment receives the first authentication information that the second equipment is sent, the first equipment may determine whether to continue to broadcast beacon message, specifically, may include two kinds of following situations (being denoted as Situation1 and Situation2 respectively):
Situation1: the first equipment obtains the success of the first authentication information or failure, and the first equipment continues to broadcast beacon message.
In the embodiment of the present application, in Situation1, no matter whether the first equipment gets the first authentication information, first equipment continues to broadcast beacon message (being properly termed as the second beacon message below), second beacon message can be to be used to indicate the first equipment to obtain the successful beacon message of the first authentication information (being properly termed as beacon message 1 below), or second beacon message can be used to indicate the first equipment obtain the first authentication information failure beacon message (be properly termed as beacon message 2 below, in this case, beacon message 2 is identical as above-mentioned first beacon message).Specifically, when first equipment obtains the success of the first authentication information, first equipment can broadcast beacon message 1, in the beacon message 1, the network state of first equipment is first state, after other equipment receive the beacon message 1, it can know that the first equipment has got the first authentication information according to the first state;When first equipment obtains the failure of the first authentication information, first equipment can broadcast beacon message 2, in the beacon message 2, the network state of first equipment is the second state, after other equipment receive the beacon message 2, it can know that the first equipment has not been obtained to the first authentication information according to second state.
When Situation2: the first equipment receives the failure of the first authentication information, the first equipment continues to broadcast beacon message, and when the first equipment obtains the success of the first authentication information, the first equipment is gone off the air beacon message.
In the embodiment of the present application, in Situation2, if the first equipment obtains the success of the first authentication information, then the first equipment stops peripherad other device broadcasts beacon messages, if the first equipment obtains the failure of the first authentication information, then the first equipment will continue to broadcast beacon message (being properly termed as the second beacon message), second beacon message is the beacon message for being used to indicate the first equipment and obtaining the failure of the first authentication information, other equipment receive second beacon message of the first device broadcasts, you can learn that the first equipment has not been obtained to the first authentication information.
It should be noted that, in the embodiment of the present application, above-mentioned second beacon message can be beacon message identical with the first beacon report, such as, when the first equipment obtains the failure of the first authentication information, second beacon message of the first device broadcasts is identical as the first beacon message, and the network state of the first equipment and the network state of the first equipment in the first beacon message are the second state in the second beacon message;Second beacon message may be the beacon message different from the first beacon message, such as, when the first equipment obtains the success of the first authentication information, second beacon message of the first device broadcasts is different from the first beacon message, the network state of the first equipment is first state in second beacon message, the network state of the first equipment is the second state in first beacon message, so that the second equipment can determine that the first equipment obtains the success of the first authentication information or failure according to the second beacon message.
In the embodiment of the present application, according to the above-mentioned two different situations of Situation1 and Situation2, after the first equipment determines that first equipment obtains the failure of the first authentication information, the first equipment can continue to execute following step:
S106, first the second beacon message of device broadcasts.
In the embodiment of the present application, for Situation1, the first equipment determines that the first equipment obtains the first certification When information fails, (second beacon message is identical as the first beacon message for the second beacon message that first equipment can be broadcasted, the network state of the first equipment is the second state i.e. in second beacon message), to request the first authentication information to the other equipment around first equipment again.For Situation2, after the first equipment receives the first authentication information that the second equipment is sent, the second beacon message that the first equipment can be broadcasted, the network state of the first equipment can be first state or the second state in second beacon message.
S107, the second equipment receive the second beacon message that the first equipment is sent.
S108, the second equipment determine that the first equipment obtains the failure of the first authentication information according to its received second beacon message.
In the embodiment of the present application, if the network state of the first equipment is first state in the second beacon message, the second equipment can determine that the first equipment obtains the failure of the first authentication information according to second state in its received second beacon message.
S109, the second equipment create the second network.
In the embodiment of the present application, second equipment receives the second beacon message of the first equipment transmission, and in the case where the second equipment determines that the first equipment receives the failure of the first authentication information, second equipment can create a hot spot networks (referred to as the second network below), to which other equipment access after second network, second equipment can transmit data between other equipment or multiple other equipment access second network, can transmit data between multiple other equipment.
It should be noted that, in the embodiment of the present application, second equipment is before creating the second network, second equipment is likely to be at the state of access first network, and the second equipment cannot access simultaneously two different networks (such as the second equipment cannot simultaneously couple in router Wi-Fi network and operator provide cellular network), in this case, after the second equipment determines that the first equipment obtains the failure of the first authentication information, second equipment creates before the second network, second equipment exits first network first, to guarantee that the second equipment can successfully create the second network.
S110, the first equipment access the second network of the second equipment creation.
In the embodiment of the present application, when the first equipment obtains the first authentication information failure of the second device broadcasts, first equipment can access the second network that second equipment is created according to its received second beacon message, in this way, the first equipment, which can use, transmits data between second network and other equipment.
S111, the second equipment send the first authentication information to the first equipment using the second network.
In the embodiment of the present application, since the second equipment can provide the first authentication information for the first equipment access first network, after the second network of the second equipment creation, the second equipment can send the first authentication information to the first equipment using second network.
It should be noted that, in the embodiment of the present application, since the second equipment has input unit, so that the second equipment can interact between user, i.e. user can input the first authentication information by the input unit of the second equipment, therefore the second equipment can provide the first authentication information for the first equipment.
Optionally, in the embodiment of the present application, when second equipment sends the first authentication information to the first equipment, second equipment can will be sent to the first equipment after first encrypted authentication information, second equipment can be using some cryptographic protocols or digital certificate verification agreement to the first encrypted authentication information, after second equipment receives encrypted first authentication information, first equipment can be decrypted using corresponding decryption method, to get the first authentication information, so, it is ensured that the safety of the first authentication information transmission process.
In the embodiment of the present application, second equipment can use User Datagram Protocol (user datagram protocol, UDP), transmission control protocol (transmission control protocol, TCP) or the agreement of other transmission data sends the first authentication information, specifically suitable Data Transport Protocol can be selected to send the first authentication information according to actual use demand, the embodiment of the present application is not construed as limiting.
S112, the first equipment receive the first authentication information that the second equipment uses the second network to send.
In the embodiment of the present application, after the first equipment receives the first authentication information of second equipment using the transmission of the second network, the first equipment can access first network according to first authentication information, so that the first equipment can be communicated using the first network with other equipment.Specifically, the first equipment exits the second network of the second equipment creation, and then the first equipment accesses first network according to the first authentication information again after the first equipment receives the first authentication information that the second equipment is sent.
Illustratively, assuming that the first equipment is intelligent desk lamp, the desk lamp accesses after first network, the intelligent desk lamp can be communicated with other smart machines (such as mobile phone), such as mobile phone can send message to the intelligent desk lamp, to control the brightness of the intelligent desk lamp or the color of light etc..
The method provided by the embodiments of the present application for obtaining authentication information, during the first equipment obtains the first authentication information for the first equipment access first network, first equipment can broadcast the first beacon message for requesting the first authentication information, the network state of identification information and the first equipment in first beacon message including the first equipment, second equipment receives after the first beacon message of the first equipment transmission, second equipment sends the first authentication information to the first equipment according to beacon message, in the case where the first equipment receives the first authentication information failure that the second equipment is sent, second equipment creates the second network (i.e. the hot spot networks of the second equipment creation), after the second network that the first equipment accesses the creation of the second equipment, second equipment can send the first authentication information to the first equipment using second network.Compared with prior art, in the embodiment of the present application, since the first equipment is in the first authentication information failure for obtaining the transmission of the second equipment under monitoring operating mode, first equipment can access the second network of the second equipment creation, to which the second equipment can send the first authentication information to the first equipment using the second network, therefore it can be improved the success rate that the first equipment obtains the first authentication information.
Optionally, in the embodiment of the present application, in conjunction with Fig. 4, as shown in figure 5, above-mentioned S105 can specifically be realized by S105a:
S105a, the first equipment do not receive the first authentication information of the second equipment transmission within a preset period of time, and the first equipment determines that first equipment obtains the first authentication information failure.
In the embodiment of the present application, after first the first beacon message of device broadcasts, first equipment can wait other equipment to send the first authentication information to the first equipment, if the first equipment does not receive the first authentication information broadcasting in one section of preset time period after the first beacon message, the first equipment can determine that first equipment obtains the failure of the first authentication information.
It should be noted that in the embodiment of the present application, the when a length of 90s of above-mentioned preset time period, or the period of other durations, can be determined according to the actual situation, the embodiment of the present application is not construed as limiting.
Optionally, in the embodiment of the present application, in conjunction with Fig. 4, as shown in fig. 6, above-mentioned S109 can specifically be realized by S109a:
The second network is arranged according to the second beacon message that the first equipment is sent in S109a, the second equipment SSID。
In the embodiment of the present application, when the second equipment determines that the first equipment obtains the failure of the first authentication information, the second equipment can create the second network (i.e. above-mentioned hot spot networks).The method that second equipment creates the second network is specifically as follows: the second equipment first turns on the hot spot networks of the second equipment, and secondly the SSID of second network can be arranged in the second equipment according to the second beacon message that the first equipment is sent after its reception the first authentication information failure.
Specifically, the method that the SSID of the second network is arranged according to the second beacon message that the first equipment is sent for second equipment are as follows: in the case where meeting the format of SSID, second equipment can a part by the mark of the first equipment carried in its received beacon message (can be the MAC Address of the first equipment or the sequence number of the first equipment) as the SSID of the second network, and a special identifier is arranged in the field that the second equipment can also specify in the SSID of the second network, the mark be used to indicate second equipment be in the state of the first authentication information can be provided, that is the SSID of the second network can be made of the mark of the first equipment and a special identifier.
Illustratively, assuming that the byte number (byte number of SSID at most can be 32 bytes) of the SSID of the second network is 10 bytes, first equipment is identified as MAC Address, the byte number of the MAC Address is 6 bytes, in the case where the byte number of special identifier is less than or equal to 4 bytes, the byte number of the special identifier can be arranged in second equipment according to actual needs, and the embodiment of the present application is not especially limited.
It should be noted that, in the embodiment of the present application, when the sequence number for being identified as the first equipment of above-mentioned first equipment, if the sequence number of first equipment and the byte number of above-mentioned special identifier have been more than the maximum number of byte (32 bytes) of the SSID of the second network, can be using a part of the sequence number of the first equipment as a part of the SSID of the second network.
In the embodiment of the present application, the SSID of the second network can be arranged by above-mentioned method, and about the password of the second network, the password of the second network can be arranged with network-based security level.Such as, when the safety requirements to network is lower, second network can be without password, when the requirement of the security level to network is gradually increased, the fixed password that the password of second network can make an appointment for the first equipment and the second equipment, or can also be the password of other methods setting, below by the sequence according to the security level of network from low to high, illustrate the setting method of the password of the second network (respectively with Sample1-Sample4).
Sample1, the second network are without password.
In the embodiment of the present application, when the second network is without password, for the first equipment during accessing the second network, the first equipment can be directly accessed second network according to the SSID of the second network.
Sample2, the second network password be fixed password that the first equipment and the second equipment are made an appointment.
In the embodiment of the present application, the fixed password that the password of the second network can make an appointment for the first equipment and the second equipment, for the first equipment during accessing the second network, the first equipment can access second network according to the SSID and fixed password of the second network.
Sample3, the second network password be computable password.
In the embodiment of the present application, the password of second network can be for the computable password of certain rule setting, and the first equipment and the second equipment make an appointment and the rule of password are arranged, during the first equipment accesses the second network, the computable password can be sent to the second equipment by the first equipment, and second Equipment can know (i.e. the password be the second network password) of the rule setting for the setting password made an appointment according to the password by the rule for the setting password made an appointment, and the second equipment allows the first equipment the second network of access.
Illustratively, the setting rule of the computable password can be the rule by the MAC Address of the first equipment or sequence number according to certain aligned transfer (such as inverted order arrangement), it can be either the rule of specified a few combination of bytes (such as the 1st byte, the 3rd byte, the 5th byte) together of the MAC Address or sequence number of the first equipment, or it can also be not especially limited for the rule that other are satisfied the use demand, the embodiment of the present application.
Sample4, the second network password be password using public and private key encryption mechanism.
In the embodiment of the present application, password encryption of the public private key mechanism to first network can be used, first equipment and the second equipment have respective public key and private key respectively, wherein, public key (the i.e. public key of available first equipment of the first equipment of first equipment and the available other side of the second equipment, the public key of available first equipment of second equipment), second equipment can be using the public key of first equipment and password encryption of the private key to first network of the second equipment, first equipment receives the password of encrypted first network, first equipment can be using the public key of the second equipment and the private key decryption of the first equipment, to obtain the password of first network.
Optionally, in the embodiment of the present application, in conjunction with Fig. 6, as shown in fig. 7, the method provided by the embodiments of the present application for obtaining authentication information can also include S110a-S110b before above-mentioned S110:
S110a, the first equipment obtain the SSID of the second network.
S110b, when the first equipment gets the SSID of the second network, the first equipment determines that the second equipment is to provide the equipment of the first authentication information for the first equipment.
In the embodiment of the present application, first equipment can detecte the SSID of multiple networks, when the first equipment gets the SSID of the second network, first equipment can know that the second equipment can provide the first authentication information for the first equipment according to the mark of the first equipment in the SSID of the second network, and first equipment can know that second equipment is according to the special identifier in the SSID of the second network to provide the state of the first authentication information for the first equipment, so, second equipment can determine that corresponding second equipment of the SSID of second network is can to provide the equipment of the first authentication information for the first equipment, to which the first equipment can access the second network, and receive the first authentication information that the second equipment uses second network to send.
It is above-mentioned that mainly scheme provided by the embodiments of the present application is described from the angle of interaction between each network element.It is understood that each network element, such as the first equipment, the second equipment etc. are in order to realize the above functions, it comprises execute the corresponding hardware configuration of each function and/or software module.Those skilled in the art should be readily appreciated that, unit and algorithm steps described in conjunction with the examples disclosed in the embodiments of the present disclosure, and the embodiment of the present application can be realized with the combining form of hardware or hardware and computer software.Some function is executed in a manner of hardware or computer software driving hardware actually, specific application and design constraint depending on technical solution.Professional technician can use different methods to achieve the described function each specific application, but this realization is it is not considered that exceed scope of the present application.
Two or more functions can also be integrated in a processing module according to the division that above method example carries out functional module to the first equipment, second equipment etc. for example, each functional module of each function division can be corresponded to by the embodiment of the present application.Above-mentioned integrated module both can be using hardware Form is realized, can also be realized in the form of software function module.It should be noted that being schematically that only a kind of logical function partition, there may be another division manner in actual implementation to the division of module in the embodiment of the present application.
In the case where each function division of use correspondence each functional module, Fig. 8 shows a kind of possible structural schematic diagram of the second equipment involved in above-described embodiment, as shown in figure 8, the second equipment may include: receiving module 40, sending module 41 and creation module 42.The S102 and S107 that receiving module 40 can be used for that the second equipment is supported to execute in above method embodiment;The S103 and S111 that sending module 41 can be used for that the second equipment is supported to execute in above method embodiment;The S109 (including S109a) that creation module 42 can be used for that the second equipment is supported to execute in above method embodiment.Optionally, as shown in figure 8, second equipment can also include determining module 43.The S108 that determining module 43 can be used for that the first equipment is supported to execute in above method embodiment.Wherein, all related contents for each step that above method embodiment is related to can quote the function description of corresponding function module, and details are not described herein.
Using integrated unit, Fig. 9 shows a kind of possible structural schematic diagram of the second equipment involved in above-described embodiment.As shown in figure 9, the second equipment may include: processing module 50 and communication module 51.Processing module 50 can be used for the movement to the second equipment and carry out control management, such as, the S108 and S109 (including S109a) that processing module 50 can be used for that the second equipment is supported to execute in above method embodiment, and/or other processes for techniques described herein.Communication module 51 can be used for supporting the communication of the second equipment Yu other network entities, such as S102, S107, S103 and S111 that communication module 51 can be used for that the second equipment is supported to execute in above method embodiment.Optionally, as shown in figure 9, second equipment can also include memory module 52, for storing the program code and data of the second equipment.
Wherein, processing module 50 can be processor or controller (such as can be above-mentioned processor 30 as shown in Figure 3), such as it can be central processing unit (central processing unit, CPU), general processor, digital signal processor (digital signal processor, DSP), specific integrated circuit (application-specific integrated circuit, ASIC), field programmable gate array (field programmable gate array, ) or other programmable logic device FPGA, transistor logic, hardware component or any combination thereof.It, which may be implemented or executes, combines various illustrative logic blocks, module and circuit described in the embodiment of the present application disclosure.Above-mentioned processor is also possible to realize the combination of computing function, such as combines comprising one or more microprocessors, DSP and the combination of microprocessor etc..Communication module 51 can be transceiver, transmission circuit or communication interface etc. (such as can be above-mentioned RF circuit 31 as shown in Figure 3).Memory module 52 can be memory.
In the case where each function division of use correspondence each functional module, Figure 10 shows a kind of possible structural schematic diagram of the first equipment involved in above-described embodiment, as shown in Figure 10, the first equipment may include: sending module 60, receiving module 61 and AM access module 62.The S101 and S106 that sending module 60 can be used for that the first equipment is supported to execute in above method embodiment;The S104 and S112 that receiving module 61 can be used for that the first equipment is supported to execute in above method embodiment;The S110 that AM access module 62 can be used for that the first equipment is supported to execute in above method embodiment.Optionally, as shown in Figure 10, which can also include determining module 63 and acquisition module 64.The S105 (including S105a) and S110b that determining module 63 can be used for that the first equipment is supported to execute in above method embodiment;Obtaining module 64 can be with For supporting the first equipment to execute the S110a in above method embodiment.Wherein, all related contents for each step that above method embodiment is related to can quote the function description of corresponding function module, and details are not described herein.
Using integrated unit, Figure 11 shows a kind of possible structural schematic diagram of the first equipment involved in above-described embodiment.As shown in figure 11, the first equipment may include: processing module 70 and communication module 71.Processing module 70 can be used for the movement to the first equipment and carry out control management, such as, processing module 70 can be used for that the first equipment is supported to execute S105 (including S105a), S110a, S110b and S110 in above method embodiment, and/or other processes for techniques described herein.Communication module 71 can be used for supporting the communication of the first equipment Yu other network entities, such as S101, S104, S106 and S112 that communication module 71 can be used for that the first equipment is supported to execute in above method embodiment.Optionally, as shown in figure 11, which can also include memory module 72, for storing the program code and data of the first equipment.
Wherein, processing module 70 can be processor or controller (such as can be above-mentioned control unit 20 as shown in Figure 2), such as can be CPU, general processor, DSP, ASIC, FPGA or other programmable logic device, transistor logic, hardware component or any combination thereof.It, which may be implemented or executes, combines various illustrative logic blocks, module and circuit described in the embodiment of the present application disclosure.Above-mentioned processor is also possible to realize the combination of computing function, such as combines comprising one or more microprocessors, DSP and the combination of microprocessor etc..Communication module 71 can be transceiver, transmission circuit or communication interface etc. (such as can be above-mentioned communication unit 22 as shown in Figure 2).Memory module 72 can be memory (such as can be above-mentioned memory 21 as shown in Figure 2).
In the above-described embodiments, it can be realized wholly or partly by software, hardware, firmware or any combination thereof.When being realized using software program, can entirely or partly realize in the form of a computer program product.The computer program product includes one or more computer instructions.When loading and execute on computers the computer instruction, entirely or partly generate according to the process or function in the embodiment of the present application.The computer can be general purpose computer, special purpose computer, computer network or other programmable devices.The computer instruction may be stored in a computer readable storage medium, or it is transmitted from a computer readable storage medium to another computer readable storage medium, such as, the computer instruction can be transmitted from a web-site, computer, server or data center by wired (such as coaxial cable, optical fiber, Digital Subscriber Line (digital subscriber line, DSL)) mode or wireless (such as infrared, wireless, microwave etc.) mode to another web-site, computer, server or data center.The computer readable storage medium can be any usable medium that computer can access or include the data storage devices such as one or more usable mediums integrated server, data center.The usable medium can be magnetic medium (such as, floppy disk, disk, tape), optical medium (such as, digital video disk (digital video disc, )) or semiconductor medium (such as solid state hard disk (solid state drives, SSD)) etc. DVD.
Through the above description of the embodiments, it is apparent to those skilled in the art that, for convenience and simplicity of description, only the example of the division of the above functional modules, in practical application, it can according to need and be completed by different functional modules above-mentioned function distribution, i.e., the internal structure of device is divided into different functional modules, to complete all or part of the functions described above.It is above-mentioned The specific work process of the system, apparatus, and unit of description, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method may be implemented in other ways.Such as, the apparatus embodiments described above are merely exemplary, such as, the division of the module or unit, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed mutual coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or unit, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, and component shown as a unit may or may not be physical unit, it can and it is in one place, or may be distributed over multiple network units.It can some or all of the units may be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
In addition, each functional unit in each embodiment of the application can integrate in one processing unit, it is also possible to each unit and physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated unit both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and when sold or used as an independent product, can store in a computer readable storage medium.Based on this understanding, substantially all or part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products the technical solution of the application in other words, the computer software product is stored in a storage medium, it uses including some instructions so that a computer equipment (can be personal computer, server or the network equipment etc.) or processor execute all or part of the steps of each embodiment the method for the application.And storage medium above-mentioned includes: the various media that can store program code such as flash memory, mobile hard disk, read-only memory, random access memory, magnetic or disk.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, and any change or replacement within the technical scope of the present application should all be covered within the scope of protection of this application.Therefore, the protection scope of the application should be based on the protection scope of the described claims.

Claims (28)

  1. A method of obtaining authentication information characterized by comprising
    Second equipment receives the first beacon message that the first equipment is sent, and includes the identification information of first equipment and the network state of first equipment in first beacon message;
    Second equipment sends the first authentication information to first equipment according to first beacon message, and first authentication information accesses first network for first equipment;
    In the case where second equipment determines that first equipment receives first authentication information failure, second equipment creates the second network;
    Second equipment sends first authentication information to first equipment using second network.
  2. The method according to claim 1, wherein second equipment determines that first equipment receives the first authentication information failure, comprising:
    Second equipment determines that first equipment receives first authentication information and fails according to the second beacon message, includes the identification information of first equipment and the network state of first equipment in second beacon message.
  3. According to the method described in claim 2, it is characterized in that, second equipment creates the second network, comprising:
    The service set SSID of second network is arranged according to second beacon message for second equipment.
  4. According to claim 1 to method described in 3 any one, which is characterized in that
    First authentication information includes at least one in the certification certificate of the SSID of the first network, the password of the first network and the first network.
  5. The method according to claim 1, which is characterized in that
    Second network is the hot spot networks of second equipment creation.
  6. A method of obtaining authentication information characterized by comprising
    First the first beacon message of device broadcasts, the network state of identification information and first equipment in first beacon message including first equipment, for first beacon message for requesting the first authentication information, first authentication information accesses first network for first equipment;
    First equipment receives first authentication information that the second equipment is sent according to first beacon message;
    In the case where first equipment determines that first equipment obtains first authentication information failure, first equipment accesses the second network of the second equipment creation;
    First equipment receives first authentication information that second equipment uses second network to send.
  7. According to the method described in claim 6, it is characterized in that, first equipment determines that first equipment obtains the first authentication information failure, comprising:
    First equipment does not receive first authentication information that second equipment is sent within a preset period of time, and first equipment determines that first equipment obtains the first authentication information failure.
  8. The method according to the description of claim 7 is characterized in that after first equipment determines that first equipment obtains the first authentication information failure, the method also includes:
    First device broadcasts, second beacon message.
  9. According to the method described in claim 6, it is characterized in that, after first equipment receives first authentication information that sends according to first beacon message of the second equipment, the method also includes:
    First device broadcasts, second beacon message, second beacon message include the identification information of first equipment and the network state of first equipment.
  10. According to the method described in claim 6, it is characterized in that, first equipment accesses before the second network of second equipment creation, the method also includes:
    In the case where first equipment gets the service set SSID of second network, first equipment determines that second equipment is to provide the equipment of first authentication information for first equipment according to the SSID of second network.
  11. According to method described in claim 6 to 10 any one, which is characterized in that
    First authentication information includes at least one in the certification certificate of the SSID of first network and the password of the first network and the first network.
  12. According to claim 1 to method described in 11 any one, which is characterized in that
    Second network is the hot spot networks of the second equipment creation after second equipment determines that first equipment receives the first authentication information failure.
  13. A kind of equipment, which is characterized in that the equipment includes receiving module, sending module and creation module;
    The receiving module includes the identification information of first equipment and the network state of first equipment in first beacon message for receiving the first beacon message of the first equipment transmission;
    The sending module, for sending the first authentication information to first equipment according to received first beacon message of the receiving module, first authentication information accesses first network for first equipment;
    The creation module, for creating the second network in the case where the equipment determines that first equipment receives first authentication information failure;
    The sending module is also used to send first authentication information to first equipment using second network.
  14. Equipment according to claim 13, which is characterized in that the equipment further includes determining module;
    The determining module includes the identification information of first equipment and the network state of first equipment in second beacon message for determining that first equipment receives first authentication information and fails according to the second beacon message.
  15. Equipment according to claim 14, which is characterized in that
    The creation module, specifically for the service set SSID of second network is arranged according to second beacon message.
  16. Equipment described in 3 to 15 any one according to claim 1, which is characterized in that
    First authentication information includes at least one in the certification certificate of the SSID of the first network, the password of the first network and the first network.
  17. Equipment described in 3 to 16 any one according to claim 1, which is characterized in that
    Second network is the hot spot networks of second equipment creation.
  18. A kind of equipment, which is characterized in that the equipment includes sending module, receiving module and AM access module;
    The sending module, for broadcasting the first beacon message, the network state of identification information and the equipment in first beacon message including the equipment, for first beacon message for requesting the first authentication information, first authentication information accesses first network for the equipment;
    The receiving module, first authentication information sent for receiving the second equipment according to first beacon message;
    The AM access module, for accessing the second network of the second equipment creation in the case where the equipment determines that the equipment obtains first authentication information failure;
    The receiving module is also used to receive first authentication information that second equipment uses second network to send.
  19. Equipment according to claim 18, which is characterized in that the equipment further includes determining module;
    The determining module, for when the receiving module does not receive first authentication information that second equipment is sent within a preset period of time, determining that the equipment obtains the first authentication information failure.
  20. Equipment according to claim 19, which is characterized in that
    The sending module is also used to after the receiving module receives the first authentication information failure, broadcasts second beacon message.
  21. Equipment according to claim 18, which is characterized in that
    The sending module, it is also used to after first authentication information that the receiving module receives that the second equipment is sent according to first beacon message, the second beacon message is broadcasted, second beacon message includes the identification information of the equipment and the network state of the equipment.
  22. Equipment according to claim 18, which is characterized in that
    The determining module is also used in the case where the equipment gets the service set SSID of the second network, determines that second equipment is that the equipment of first authentication information is provided for the equipment according to the SSID of second network.
  23. Equipment described in 8 to 22 any one according to claim 1, which is characterized in that
    First authentication information includes at least one in the certification certificate of the SSID of first network, the password of the first network and the first network.
  24. A kind of equipment, which is characterized in that the equipment includes processor, transceiver and the memory being of coupled connections with the processor;
    The memory is for storing computer instruction, when equipment operation, the processor executes the computer instruction of the memory storage, the processor is used to control the transceiver and receives the first beacon message that the first equipment is sent, and includes the identification information of first equipment and the network state of first equipment in first beacon message;And it controls the transceiver and the first authentication information is sent to first equipment according to first beacon message, first authentication information accesses first network for first equipment;And in the case where determining that first equipment receives first authentication information failure, create the second network;And it controls the transceiver and first authentication information is sent to first equipment using second network.
  25. A kind of equipment, which is characterized in that the equipment includes processor, transceiver and the memory being of coupled connections with the processor;
    The memory is for storing computer instruction, when equipment operation, the processor executes the computer instruction of the memory storage, the processor is for controlling first beacon message of transceiver broadcasts, the network state of identification information and the equipment in first beacon message including the equipment, for first beacon message for requesting the first authentication information, first authentication information accesses first network for first equipment;And it controls the transceiver and receives first authentication information that the second equipment is sent according to first beacon message;And in the case where determining that the equipment obtains first authentication information failure, the second network of the second equipment creation is accessed;And it controls the transceiver and receives first authentication information that second equipment uses second network to send.
  26. A kind of computer readable storage medium, which is characterized in that including computer instruction, when the computer instruction is run on one device, so that the method that the equipment executes the acquisition authentication information as described in claim 1 to 5 any one.
  27. A kind of computer readable storage medium, which is characterized in that including computer instruction, when the computer instruction is run on one device, so that the method that the equipment executes the acquisition authentication information as described in claim 6 to 12 any one.
  28. A kind of communication system, it is characterized in that, including the equipment as described in claim 13 to 17 any one or claim 24, equipment as described in claim 18-23 any one or claim 25, the equipment as described in claim 13 to 17 any one or 24 is the first equipment, the equipment as described in claim 18 to 23 any one or 25 is the second equipment, and second equipment provides the first authentication information for first equipment.
CN201780032665.2A 2016-12-30 2017-05-26 A kind of method, apparatus and system obtaining authentication information Pending CN109196916A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN2016112658904 2016-12-30
CN201611265890 2016-12-30
PCT/CN2017/086163 WO2018120624A1 (en) 2016-12-30 2017-05-26 Method, apparatus and system for obtaining authentication information

Publications (1)

Publication Number Publication Date
CN109196916A true CN109196916A (en) 2019-01-11

Family

ID=62706865

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780032665.2A Pending CN109196916A (en) 2016-12-30 2017-05-26 A kind of method, apparatus and system obtaining authentication information

Country Status (2)

Country Link
CN (1) CN109196916A (en)
WO (1) WO2018120624A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110662236A (en) * 2019-09-30 2020-01-07 上海趣威文化发展有限公司 Network configuration method, system and device
CN113630282A (en) * 2020-05-07 2021-11-09 北京华为数字技术有限公司 Method and device for detecting server state

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113163381B (en) * 2021-04-16 2024-04-12 横店集团得邦照明股份有限公司 Intelligent lamp supporting rapid distribution network and implementation method thereof

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150078299A1 (en) * 2013-09-18 2015-03-19 Qualcomm Incorporated Deferral based on bssid information
CN105049416A (en) * 2015-06-15 2015-11-11 小米科技有限责任公司 Method and apparatus for accessing to wifi network
CN105323824A (en) * 2015-11-16 2016-02-10 北京京东世纪贸易有限公司 WIFI equipment, electronic device and method for assisting WIFI equipment access to network

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8938785B2 (en) * 2012-06-08 2015-01-20 Time Warner Cable Enterprises Llc Wireless session configuration persistence
CN103716911B (en) * 2014-01-02 2017-06-30 福建星网锐捷通讯股份有限公司 A kind of methods, devices and systems of configuration of wireless terminal
CN104880019A (en) * 2015-06-18 2015-09-02 合肥美菱股份有限公司 Remote binding method for intelligent refrigerator
CN105578561A (en) * 2015-12-21 2016-05-11 深圳市控博士科技有限公司 System and method for intelligent air-conditioning socket to access household gateway wireless local area network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150078299A1 (en) * 2013-09-18 2015-03-19 Qualcomm Incorporated Deferral based on bssid information
CN105049416A (en) * 2015-06-15 2015-11-11 小米科技有限责任公司 Method and apparatus for accessing to wifi network
CN105323824A (en) * 2015-11-16 2016-02-10 北京京东世纪贸易有限公司 WIFI equipment, electronic device and method for assisting WIFI equipment access to network

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110662236A (en) * 2019-09-30 2020-01-07 上海趣威文化发展有限公司 Network configuration method, system and device
CN113630282A (en) * 2020-05-07 2021-11-09 北京华为数字技术有限公司 Method and device for detecting server state
CN113630282B (en) * 2020-05-07 2022-12-27 北京华为数字技术有限公司 Method and device for detecting server state

Also Published As

Publication number Publication date
WO2018120624A1 (en) 2018-07-05

Similar Documents

Publication Publication Date Title
CN110505606B (en) Bluetooth Mesh network and distribution network authentication method, equipment and storage medium thereof
WO2020029798A1 (en) Control information transmission method and device
KR101661408B1 (en) Operator-assisted device-to-device(d2d) discovery
TWI584624B (en) Method and apparatus for allocating ip address in wireless communication network
WO2017080378A1 (en) Method implementing licensed-assisted access, network equipment, and terminal equipment
CN109792662A (en) A kind of indicating means of frequency spectrum resource, apparatus and system
JP7200312B2 (en) Method and terminal device for establishing a hotspot connection
CN105340328A (en) Method and apparatus for performing wireless docking service
CN105657719A (en) Sensor gateway
TW201513710A (en) A method, apparatus and system of configuring equipments for joining a network group
US20110182207A1 (en) Wireless communication device, program, wireless communication method, and wireless communication system
CN107846672A (en) Communication pattern system of selection, IoT equipment and the storage medium of multimode IoT equipment
CN105357737A (en) Method and device for accessing WiFi device to wireless access point
CN103947135A (en) Individual and group paging in a wireless network
CN106028266B (en) Information transmission method, device and system
CN109196916A (en) A kind of method, apparatus and system obtaining authentication information
CN108605206A (en) A kind of social information exchange method and device
JP2020520139A (en) Wireless access point, terminal device, and method for waking up the terminal device by the wireless access point
CN109391379B (en) HARQ indication method, device and system
WO2018082546A1 (en) Detection method and transmission method for downlink control channel, network side device, and terminal
US20200221383A1 (en) Method and apparatus for providing service by using bluetooth low energy technology
CN104244172A (en) Information interaction method and device
WO2021164312A1 (en) Wireless network information configuration method and apparatus for device
WO2022077508A1 (en) Synchronization signal block (ssb) transmission method, terminal device and network device
CN110383705A (en) A kind of method, apparatus and system of trained transmission beam

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190111