CN110266547A - A kind of network-building method and equipment - Google Patents
A kind of network-building method and equipment Download PDFInfo
- Publication number
- CN110266547A CN110266547A CN201910588594.5A CN201910588594A CN110266547A CN 110266547 A CN110266547 A CN 110266547A CN 201910588594 A CN201910588594 A CN 201910588594A CN 110266547 A CN110266547 A CN 110266547A
- Authority
- CN
- China
- Prior art keywords
- equipment
- sub
- information
- networked capabilities
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
- H04L41/0816—Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0823—Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
Abstract
The present invention is suitable for field of computer technology, provides a kind of network-building method and equipment, this method comprises: sending first identifier information to sub- equipment when detecting that networked capabilities change;Authentication is carried out to the first sub- equipment for sending the authentication request information;Obtain the second identifier information that the described first sub- equipment is sent;When determining that the networked capabilities of the described first sub- equipment are greater than the networked capabilities of itself, by current configuration information update it is the configuration information of the described first sub- equipment, and notifies that the described first sub- device configuration is new main equipment.Above scheme, local device carries out authentication when detecting that itself networked capabilities changes, to sub- equipment, when the networked capabilities of the first sub- equipment are greater than the networked capabilities of local device, current configuration information is updated, and notifies that the first sub- device configuration is new main equipment.The automatic conversion between main equipment and sub- equipment is realized, reduces configuration work amount, improves allocative efficiency.
Description
Technical field
The invention belongs to field of computer technology more particularly to a kind of network-building method and equipment.
Background technique
With the continuous development of household wireless LAN, separate unit radio reception device is covered to be limited in scope, Duo Taishe
Standby networking requirements simultaneously are increasing.User selects an equipment as main equipment, remaining multiple devices conduct under this scene
Sub- equipment.Wherein, main equipment is for being connected to wide area network and the sub- equipment distribution of configuration information into local area network, and sub- equipment is from master
Configuration information is obtained in equipment to be configured, and provides WLAN service with this.However, when selected main equipment damages
When bad or user wants replacement main equipment, need to reconfigure main equipment and sub- equipment.Existing configuration mode is that will own
Equipment factory reset, reconfigure an equipment as main equipment, be reconfigured its minor equipment, this configuration mode is matched
It sets that heavy workload, configuration flow are cumbersome, and allocative efficiency is low, makes troubles to user.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of network-building method and equipment, to solve in the prior art, using biography
The mode for HRP-configured master device and the sub- equipment of uniting, leads to that configuration work amount is big, configuration flow is cumbersome, and allocative efficiency is low, gives user
The problem of making troubles.
The first aspect of the embodiment of the present invention provides a kind of network-building method, comprising:
When detecting that networked capabilities change, to sub- device broadcasts first identifier information;The first identifier information
For identifying itself networked capabilities;The first identifier information is based on the first identifier information for triggering the sub- equipment
Send authentication request information;
When receiving authentication request information, the first sub- equipment for sending the authentication request information is carried out
Authentication;
When authentication result is to be verified, the second identifier information that the described first sub- equipment is sent is obtained;It is described
Second identifier information is used to identify the networked capabilities of the described first sub- equipment;
When being based on the second identifier information and the first identifier information, the networking energy of the described first sub- equipment is determined
When power is greater than the networked capabilities of itself, by current configuration information update it is the configuration information of the described first sub- equipment, and notifies
The first sub- device configuration is new main equipment.
The second aspect of the embodiment of the present invention provides a kind of networking equipment, which includes:
Transmission unit, for when detecting that networked capabilities change, to sub- device broadcasts first identifier information;It is described
First identifier information is used to identify the networked capabilities of itself;The first identifier information is for triggering the sub- equipment based on described
First identifier information sends authentication request information;
Authentication unit, for when receiving authentication request information, to sending the authentication request information
First sub- equipment carries out authentication;
Acquiring unit, for obtaining the described first sub- equipment is sent second when authentication result is to be verified
Identification information;The second identifier information is used to identify the networked capabilities of the described first sub- equipment;
Updating unit, for determining described first when being based on the second identifier information and the first identifier information
It is matching for the described first sub- equipment by current configuration information update when the networked capabilities of sub- equipment are greater than the networked capabilities of itself
Confidence breath, and notify that the described first sub- device configuration is new main equipment.
The third aspect of the embodiment of the present invention provides another networking equipment, including processor, input equipment, output are set
Standby and memory, the processor, input equipment, output equipment and memory are connected with each other, wherein the memory is for depositing
The computer program that holding equipment executes the above method is stored up, the computer program includes program instruction, and the processor is matched
It sets for calling described program to instruct, execution following steps:
When detecting that networked capabilities change, to sub- device broadcasts first identifier information;The first identifier information
For identifying itself networked capabilities;The first identifier information is based on the first identifier information for triggering the sub- equipment
Send authentication request information;
When receiving authentication request information, the first sub- equipment for sending the authentication request information is carried out
Authentication;
When authentication result is to be verified, the second identifier information that the described first sub- equipment is sent is obtained;It is described
Second identifier information is used to identify the networked capabilities of the described first sub- equipment;
When being based on the second identifier information and the first identifier information, the networking energy of the described first sub- equipment is determined
When power is greater than the networked capabilities of itself, by current configuration information update it is the configuration information of the described first sub- equipment, and notifies
The first sub- device configuration is new main equipment.
The fourth aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage
Media storage has computer program, and the computer program performs the steps of when being executed by processor
When detecting that networked capabilities change, to sub- device broadcasts first identifier information;The first identifier information
For identifying itself networked capabilities;The first identifier information is based on the first identifier information for triggering the sub- equipment
Send authentication request information;
When receiving authentication request information, the first sub- equipment for sending the authentication request information is carried out
Authentication;
When authentication result is to be verified, the second identifier information that the described first sub- equipment is sent is obtained;It is described
Second identifier information is used to identify the networked capabilities of the described first sub- equipment;
When being based on the second identifier information and the first identifier information, the networking energy of the described first sub- equipment is determined
When power is greater than the networked capabilities of itself, by current configuration information update it is the configuration information of the described first sub- equipment, and notifies
The first sub- device configuration is new main equipment.
A kind of network-building method provided in an embodiment of the present invention and equipment have the advantages that
The embodiment of the present invention sends first identifier letter to sub- equipment when main equipment detects that networked capabilities change
Breath, triggering main equipment are based on the first identifier information and send authentication request information;To transmission authentication request information
Sub- equipment carries out authentication;When authentication passes through, compare the networked capabilities of main equipment Yu sub- equipment;The connection of group equipment
When net ability is greater than the networked capabilities of main equipment, current configuration information update is the configuration information of sub- equipment by main equipment, and
Notify that sub- device configuration is new main equipment.Aforesaid way realizes the automatic conversion between main equipment and sub- equipment, reduces
Configuration work amount, configuration flow are simple;And due to being automatically configured between main equipment and sub- equipment, allocative efficiency is improved, is liberated
User, it is user-friendly.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art
Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some
Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these
Attached drawing obtains other attached drawings.
Fig. 1 is a kind of implementation flow chart for network-building method that one embodiment of the invention provides;
Fig. 2 be another embodiment of the present invention provides a kind of network-building method implementation flow chart;
Fig. 3 is a kind of implementation flow chart for network-building method that further embodiment of this invention provides;
Fig. 4 is a kind of schematic diagram for networking equipment that one embodiment of the invention provides;
Fig. 5 be another embodiment of the present invention provides a kind of networking equipment schematic diagram.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
Referring to Figure 1, Fig. 1 is a kind of schematic flow diagram of network-building method provided in an embodiment of the present invention.In the present embodiment
The executing subject of network-building method is main equipment, and main equipment refers to that the sub- equipment distribution for being connected to wide area network and into local area network is matched
The equipment of confidence breath, sub- equipment refer to that configuration information is obtained from main equipment to be configured, and provides WLAN service with this
Equipment.Network-building method as shown in Figure 1 can include:
S101: when detecting that networked capabilities change, to sub- device broadcasts first identifier information;The first identifier
Information is used to identify the networked capabilities of itself;The first identifier information is based on the first identifier for triggering the sub- equipment
Information sends authentication request information.
The equipment that main equipment refers to the sub- equipment distribution of configuration information for being connected to wide area network and into local area network, sub- equipment
Refer to that configuration information is obtained from main equipment to be configured, and provides the equipment of WLAN service with this.It is completed in each building
Network in, the quantity of main equipment is one, and the quantity of sub- equipment is one or more, is not limited this.
When main equipment and sub- equipment are without any configuration, all devices are default setting, user Ke Ren at this time
Wherein an equipment is configured for meaning selection, such as configuration registry account, administrator's password, and the equipment by configuration is known as master and sets
Standby, the configuration information that minor equipment obtains the main equipment is configured.Networked capabilities refer to the energy of these equipment connection network
Power.
When user in advance to plant is configured to obtain main equipment out when, main equipment detects the networked capabilities of itself.Tool
Body, it can be detected by following four mode.The first: main equipment sends the message about network connecting request to gateway, when
When obtaining the response message of the gateway, it was demonstrated that main equipment can network;Second: main equipment is to dynamic host configuration protocol service
Device (Dynamic Host Configuration Protocol, DHCP) sends message about network connecting request, when obtaining
When the response message of the server, request message is sent to name server (Domain Name Server, DNS), obtains DNS
When the response message of server, it was demonstrated that main equipment can network;The third: main equipment detects whether to deposit point pair over ethernet
Point agreement (point-to-point protocol over ethernet, PPPoE) server, main equipment, which is worked as, detects PPPoE
In the presence of server, it was demonstrated that main equipment can network;4th kind: main equipment detection Dynamic Host Configuration Protocol server whether there is, and main equipment is worked as
In the presence of detecting Dynamic Host Configuration Protocol server, it was demonstrated that main equipment can network.
The above-mentioned provable main equipment of four kinds of modes currently has network savvy, but the ability specifically networked is different, can
It is interpreted as the height or strong and weak different of connection network capabilities, i.e., above-mentioned different networking mode corresponds to the different networking of main equipment
Ability.The networked capabilities of above-mentioned four kinds of modes successively reduce, i.e. the first the networked capabilities highest for indicating main equipment, followed by the
Two kinds, followed by the third, minimum is the 4th kind.
For intuitive, the convenient height for knowing current device networked capabilities, can be set with first identifier message identification master
Standby networked capabilities.Specifically, first identifier information can be set to it is excellent, good, in, it is poor, cannot network;Also it can be set
One, second, third, fourth, fifth etc., wherein excellent and the first expression current networked capabilities of main equipment are very good;It is good and
Two indicate that the current networked capabilities of main equipment are relatively good;In and third indicate the current networked capabilities of main equipment it is general;Difference and the
Four indicate that the current networked capabilities of main equipment are poor;It cannot network and the 5th indicates main equipment currently without networked capabilities.On
It states first identifier information to be merely illustrative, user can be configured according to the actual situation, for example, first identifier information can also
It is set as the five, the 4th, third, second, first;Or A, B, C, D, E etc., and first identifier information and main equipment connection can abilities
The corresponding relationship of height, user can also sets itself, this is not construed as limiting.
When main equipment detects that networked capabilities change, to sub- device broadcasts first identifier information;Work as main equipment
When detecting that networked capabilities change, the networked capabilities after variation are sent to sub- equipment.Main equipment sends the to sub- equipment
The mode of one identification information, which can be, is broadcast to sub- equipment by wireless link layer protocols, is also possible to pass by wireless management frame
It is sent to sub- equipment.It is subject to actual conditions, does not limit this.Wherein, first identifier information is being received for triggering sub- equipment
Authentication request information is sent based on the first identifier information when to first identifier information, i.e., sub- equipment receives main equipment transmission
First identifier information when, to the main equipment send authentication request information.
S102: when receiving authentication request information, the first son for sending the authentication request information is set
It is standby to carry out authentication.
The quantity of sub- equipment can be one or more, and when the quantity of group equipment is one, the first sub- equipment refers to the son
Equipment;When the quantity of group equipment is multiple, the first sub- equipment refers to any in the sub- equipment for sending authentication request information
One.Specifically, main equipment receives the authentication request information that the first sub- equipment is sent, and to the transmission authentication request
You carry out authentication at the first sub- equipment of information.
The mode that main equipment carries out authentication to the first sub- equipment can be, and be verified by characteristic value.Specifically,
Characteristic values are set for all sub- equipment in advance, and the characteristic value that these are set is stored into the database of main equipment, when the
When one sub- equipment receives first identifier information, the authentication request information comprising characteristic value, main equipment are sent to main equipment
The authentication request information comprising characteristic value that the first sub- equipment is sent is received, and searches this feature value in the database, when
When finding this feature, it was demonstrated that authentication passes through;When not finding this feature value in the database, it was demonstrated that authentication is lost
It loses.
The mode that main equipment carries out authentication to the first sub- equipment is also possible to by judging that the encryption information of both sides is
It is no identical.Specifically, main equipment obtains the first validation value that the first sub- equipment generates, and generated with itself the second validation value,
Token generates the first encryption information, and first encryption information and the second validation value are sent to the first sub- equipment;First son is set
It is standby that second encryption information is generated according to the first validation value, token, the second validation value, and compare the first encryption information and the second encryption
Whether information is identical, and when the first encryption information is identical as the second encryption information, the second encryption information is sent to main equipment;It is main
Whether equipment compares the first encryption information identical as the second encryption information, when the first encryption information is identical as the second encryption information
When, determine that authentication result is to be verified, when the first encryption information and the second encryption information difference, determines authentication
As a result do not pass through for verifying.Wherein, token can be randomly generated by server, when being used for main equipment and sub- authentication
Validation value is encrypted;First validation value can be the first random number, the First Eigenvalue etc. that the first sub- equipment generates, second
Validation value can be the second random number, the Second Eigenvalue etc. that main equipment generates, and not limit this.
Further, it in order to keep the network established safer, is verified using main equipment and the first sub- equipment bidirectional identification, tool
Body, S102 may include S1021-S1024, specific as follows:
S1021: the first validation value that the described first sub- equipment is sent is obtained;First validation value is set by first son
It is standby to generate.
First validation value is generated by the first sub- equipment, for the authentication between main equipment.Wherein, the first validation value
It can be the first random number, the First Eigenvalue etc. that the first sub- equipment generates, not limit this.Specifically, the first sub- equipment
The first validation value of itself generation is sent, main equipment receives the first validation value that the first sub- equipment is sent.It is further possible to
It is main equipment to first the first validation value acquisition request of sub- equipment transmission, the first sub- equipment receives the first validation value acquisition request
When to main equipment send the first validation value, main equipment receives the first validation value that the first sub- equipment is sent.
S1022: the second validation value, token and first validation value based on generation generate the first encryption information.
Second validation value is generated by main equipment, for the authentication between the first sub- equipment.Wherein, the second validation value
It can be the second random number, the Second Eigenvalue etc. that main equipment generates, not limit this.Main equipment is added by preset token
Close algorithm is encrypted to obtain the first encryption information to the first validation value, the second validation value.
S1023: first encryption information and second validation value are sent to the described first sub- equipment;Described
Two validation values are based on second validation value, the token and first validation value life for triggering the described first sub- equipment
At the second encryption information, and when first encryption information is identical as second encryption information, second encryption is returned
Information.
First encryption information and the second validation value itself generated are sent to the first sub- equipment by main equipment;First son is set
For when receiving the second validation value, the second validation value, the first validation value encrypt by preset token Encryption Algorithm
To the second encryption information.The second encryption information that the first Encryption Algorithm and self-encryption that first sub- equipment interconnection receives obtain
It is compared, when the first encryption information is identical as the second encryption information, the second encryption information is sent to main equipment, can also incite somebody to action
" the first encryption information is identical as the second encryption information " is sent to main equipment together;When the first encryption information and the second encryption information
When different, it can not be sent to main equipment with what, " the first encryption information is different from the second encryption information " can also be sent, also
" authentication does not pass through " etc. can be sent, this is not construed as limiting.
It is worth noting that user can be with predetermined encryption algorithm, it can use different Encryption Algorithm, but verifying every time
When, when the Encryption Algorithm of the secondary main equipment for participating in verifying and the first sub- equipment use is identical.
S1024: second encryption information that the described first sub- equipment is sent is obtained;When first encryption information and institute
State the second encryption information it is identical when, determine authentication result be verified;When first encryption information and described second
When encryption information difference, determine that authentication result does not pass through for verifying.
Main equipment receives the second encryption information that the first sub- equipment is sent;Or main equipment sends second to the first sub- equipment
Encryption information acquisition request when the first sub- equipment receives the second Encryptionlnfo Request, judges that the first encryption information adds with second
Whether confidential information is identical, and sends the second encryption information to main equipment.When main equipment gets second that the first sub- equipment is sent
When encryption information, it is whether identical as the second encryption information to compare the first encryption information.When the first encryption information and the second encryption are believed
Manner of breathing simultaneously, determines that this authentication result is to be verified;When the first encryption information and the second encryption information be not identical,
Determine that this authentication result does not pass through for verifying.
Further, in order to improve the safety of network struction, when authentication result be verifying not by when, main equipment
The information that this identifying object (the i.e. first sub- equipment) is sent after verifying can be rejected.
S103: when authentication result is to be verified, the second identifier information that the described first sub- equipment is sent is obtained;
The second identifier information is used to identify the networked capabilities of the described first sub- equipment.
Second identifier information is used to identify the networked capabilities of the first sub- equipment.Specifically, second identifier information can be set
For it is excellent, good, in, it is poor, cannot network;Also it can be set first, second, third, fourth, 5th etc., wherein excellent and the first table
Show that the first sub- current networked capabilities of equipment are very good;Good and second the first sub- current networked capabilities of equipment of expression are relatively good;In
And third indicates that the first sub- current networked capabilities of equipment are general;Difference and the 4th the first sub- current networked capabilities ratio of equipment of expression
It is poor;It cannot network and the 5th indicates the first sub- equipment currently without networked capabilities.Above-mentioned second identifier information is merely illustrative
Property explanation, user can be configured according to the actual situation, for example, second identifier information may be alternatively provided as the five, the 4th, third,
The second, first;Or A, B, C, D, E etc., and the corresponding relationship of second identifier information and main equipment connection energy ability height, Yong Huye
Can sets itself, this is not construed as limiting.
It should be noted that for the ease of comparing the networked capabilities of main equipment and the first sub- equipment, when time building network
When, first identifier information should be identical with the form of expression of second identifier information, i.e., first identifier information be it is excellent, good, in, it is poor,
When cannot network, second identifier information also should with it is excellent, good, in, poor, cannot network indicates;First identifier information is first, the
Two, when third, the four, the 5th, second identifier information should also be indicated with the first, second, third, fourth, the 5th.
When authentication result is to be verified, main equipment obtains the second identifier information that the first sub- equipment is sent.Tool
Body, the first sub- equipment detects the networked capabilities of itself, the side of specific detection mode and above-mentioned main equipment detection networked capabilities
Formula is identical, and details are not described herein again.When the first sub- equipment detects the networked capabilities of itself, second identifier information is sent to master
Equipment, main equipment receive the second identifier information that the first sub- equipment is sent.
S104: when being based on the second identifier information and the first identifier information, the described first sub- equipment is determined
It is the configuration information of the described first sub- equipment by current configuration information update when networked capabilities are greater than the networked capabilities of itself,
And notify that the described first sub- device configuration is new main equipment.
Main equipment is based on second identifier information and first identifier information, determines the networked capabilities of the first sub- equipment and itself
Power.Specifically, main equipment compares the first sub- equipment and equipment of itself according to second identifier information and first identifier information
Networked capabilities power.For example, when second identifier information be it is excellent, first identifier information be it is middle when, the networking of the first sub- equipment
Ability is greater than the networked capabilities of main equipment;When second identifier information is first, and first identifier information is third, the first sub- equipment
Networked capabilities be greater than main equipment networked capabilities.It is merely illustrative, does not limit this herein.
When the networked capabilities of the first sub- equipment be greater than main equipment networked capabilities when, main equipment by current configuration information more
New is the configuration information of the first sub- equipment, to configure itself to sub- equipment, and notifies that the first sub- device configuration is that new master sets
It is standby.Specifically, main equipment disconnect with the connection of server, close agency and firewall etc., it is current to obtain the first sub- equipment
The configuration information update of main equipment is the configuration information of the first sub- equipment by configuration information.And notify the first sub- equipment conversion
For new main equipment.After first sub- equipment receives the notice, server is connected, realizes the connection with wide area network, opens agency
And firewall etc., the configuration information of the first sub- equipment is converted to the configuration information of new main equipment.
Further, in order to ensure the networked capabilities of current main equipment are best, so that beginning in current network building
Optimal control centre is kept eventually, and best web experience is brought to user.In one implementation, this programme can be;
When main equipment detects that itself networked capabilities remains unchanged in predetermined period, the second identifier of the first sub- equipment is obtained
Information;Then execute S104.
Specifically, it is relatively good to occur the initial networked capabilities of main equipment in order to prevent, but networked capabilities are never sent out later
Changing, and the networked capabilities for thering are the networked capabilities of equipment to be already higher than main equipment in remaining sub- equipment, but due to main equipment
The case where networked capabilities never change, and carry out configuration information update without method triggering main equipment, sub- equipment appearance.It is main
When equipment detects that networked capabilities remain unchanged in predetermined period, the second identifier information of the first sub- equipment is actively obtained.In advance
If the period is that user is arranged according to the actual situation, such as to can be set to the detection in primary, every 30 seconds of detection in every 10 seconds one inferior, right
This is without limitation.After main equipment gets the second identifier information of the first sub- equipment, the first obtained mark is detected based on itself
Know information and executes S104.
It further, is best based on the above-mentioned networked capabilities for ensuring current main equipment, so that current network constructs
In remain optimal control centre, on the basis of best web experience is brought to user, improve internet security.Another
In a kind of implementation, this programme can be main equipment and first carry out authentication with the first sub- equipment, pass through when authentication and
When detecting that networked capabilities remain unchanged in predetermined period, the second identifier information of the first sub- equipment is obtained;When main equipment obtains
When getting the second identifier information of the first sub- equipment, the first identifier information obtained based on itself detection executes S104.This realization
The process that authentication is carried out in mode is identical as S102, and details are not described herein again.
The embodiment of the present invention sends first identifier letter to sub- equipment when main equipment detects that networked capabilities change
Breath, triggering main equipment are based on the first identifier information and send authentication request information;To transmission authentication request information
Sub- equipment carries out authentication;When authentication passes through, compare the networked capabilities of main equipment Yu sub- equipment;The connection of group equipment
When net ability is greater than the networked capabilities of main equipment, current configuration information update is the configuration information of sub- equipment by main equipment, and
Notify that sub- device configuration is new main equipment.Aforesaid way realizes the automatic conversion between main equipment and sub- equipment, reduces
Configuration work amount, configuration flow are simple;And due to being automatically configured between main equipment and sub- equipment, allocative efficiency is improved, is liberated
User, it is user-friendly.
Refer to Fig. 2, Fig. 2 be another embodiment of the present invention provides a kind of network-building method schematic flow diagram.This implementation
The executing subject of network-building method is main equipment in example, and main equipment refers to the sub- equipment point for being connected to wide area network and into local area network
The equipment for sending out configuration information, sub- equipment refer to that obtaining configuration information from main equipment is configured, provide WLAN clothes with this
The equipment of business.
The present embodiment embodiment corresponding with Fig. 1 is distinguished as S205, and S201-S204 is corresponding with Fig. 1 in the present embodiment
S101-S104 in embodiment is identical, referring specifically to the associated description of S101-S104 in the corresponding embodiment of Fig. 1, this
Place does not repeat.
It should be noted that S205 is arranged side by side with S204, S205 is not executed after S204.Main equipment is set according to the first son
The standby size with itself networked capabilities determines and executes S204 or S205 after S203.It is subject to actual conditions when specific implementation,
It does not limit this.
S205: when being based on the second identifier information and the first identifier information, the described first sub- equipment is determined
When networked capabilities are less than or equal to itself networked capabilities, keep current configuration information constant.
Main equipment is based on second identifier information and first identifier information, determines the networked capabilities of the first sub- equipment and itself
Between power.Specifically, main equipment compares the first sub- equipment and itself according to second identifier information and first identifier information
Power between the networked capabilities of equipment.For example, when first identifier information is excellent, the first son is set in when second identifier information being
Standby networked capabilities are less than the networked capabilities of main equipment;When second identifier information is third, and first identifier information is first, the
The networked capabilities of one sub- equipment are less than the networked capabilities of main equipment;When second identifier information is second, first identifier information is the
When two, the networked capabilities of the first sub- equipment are equal to the networked capabilities of main equipment.It is merely illustrative herein, this is not limited
It is fixed.
When the networked capabilities of the first sub- equipment are less than or equal to the networked capabilities of main equipment, main equipment keeps current and matches
Confidence breath is not altered, i.e. main equipment or main equipment.At this point, the first sub- equipment is without the change for carrying out configuration information.It can
To be interpreted as not needing to configure new main equipment at this time.
The embodiment of the present invention sends first identifier letter to sub- equipment when main equipment detects that networked capabilities change
Breath, triggering main equipment are based on the first identifier information and send authentication request information;To transmission authentication request information
Sub- equipment carries out authentication;When authentication passes through, compare the networked capabilities of main equipment Yu sub- equipment;The connection of group equipment
When net ability is greater than the networked capabilities of main equipment, current configuration information update is the configuration information of sub- equipment by main equipment, and
Notify that sub- device configuration is new main equipment.Aforesaid way realizes the automatic conversion between main equipment and sub- equipment, reduces
Configuration work amount, configuration flow are simple;And due to being automatically configured between main equipment and sub- equipment, allocative efficiency is improved, is liberated
User, it is user-friendly.
Fig. 3 is referred to, Fig. 3 is a kind of schematic flow diagram for network-building method that further embodiment of this invention provides.This implementation
The executing subject of network-building method is main equipment in example, and main equipment refers to the sub- equipment point for being connected to wide area network and into local area network
The equipment for sending out configuration information, sub- equipment refer to that obtaining configuration information from main equipment is configured, provide WLAN clothes with this
The equipment of business.
The present embodiment embodiment corresponding with Fig. 2 is distinguished as S306-S307, in the present embodiment S301-S305 with Fig. 2 pairs
The S201-S205 in embodiment answered is identical, retouches referring specifically to the correlation of S201-S205 in the corresponding embodiment of Fig. 2
It states, does not repeat herein.
It should be noted that S305 is arranged side by side with S304 in the present embodiment, S305 is not executed after S304.Main equipment
According to the first sub- equipment and itself networked capabilities, determines and execute S304 or S305 after S303.With practical feelings when specific implementation
Subject to condition, do not limit this.And S306-S307 is executed after S304, if that execute is S305, is not carried out
S306-S307.It is specific as follows:
When performing S304: when determining described first based on the second identifier information and the first identifier information
It is matching for the described first sub- equipment by current configuration information update when the networked capabilities of sub- equipment are greater than the networked capabilities of itself
Confidence breath, and notify the described first sub- device configuration be new main equipment the step for after, execute S306-S307.
S306: the target configuration information of the new main equipment is obtained.
Main equipment (being configured with new main equipment at this time, main equipment here refers to old main equipment) obtains new master and sets
Standby target configuration information.Specifically, main equipment sends target configuration information acquisition request, new main equipment to new main equipment
After receiving target configuration information acquisition request, target configuration information is sent to main equipment, main equipment receives new master and sets
The target configuration information that preparation is sent.Target configuration information may include IP address, firewall rule, wireless client mode, clothes
Business device setting etc., does not limit this.
S307: it is configured according to the target configuration information.
Main equipment is configured according to the target configuration information got.For example, main equipment is matched according to the target received
Confidence breath configuration IP address, firewall, client, server etc..
When performing S305: when determining described first based on the second identifier information and the first identifier information
When the networked capabilities of sub- equipment are less than or equal to itself networked capabilities, when the step for keeping current configuration information constant,
Due to not being updated to the configuration information of main equipment, so S306-S307 will not be executed.
The embodiment of the present invention sends first identifier letter to sub- equipment when main equipment detects that networked capabilities change
Breath, triggering main equipment are based on the first identifier information and send authentication request information;To transmission authentication request information
Sub- equipment carries out authentication;When authentication passes through, compare the networked capabilities of main equipment Yu sub- equipment;The connection of group equipment
When net ability is greater than the networked capabilities of main equipment, current configuration information update is the configuration information of sub- equipment by main equipment, and
Notify that sub- device configuration is new main equipment.Aforesaid way realizes the automatic conversion between main equipment and sub- equipment, reduces
Configuration work amount, configuration flow are simple;And due to being automatically configured between main equipment and sub- equipment, allocative efficiency is improved, is liberated
User, it is user-friendly.
Fig. 4 is referred to, Fig. 4 is a kind of schematic diagram for networking equipment that one embodiment of the invention provides.Equipment includes each
Unit is used to execute each step in the corresponding embodiment of Fig. 1, Fig. 2, Fig. 3.It is corresponding referring specifically to Fig. 1, Fig. 2, Fig. 3
Associated description in embodiment.For ease of description, only the parts related to this embodiment are shown.Referring to fig. 4, equipment 4 is wrapped
It includes:
Transmission unit 410, for when detecting that networked capabilities change, to sub- device broadcasts first identifier information;
The first identifier information is used to identify the networked capabilities of itself;The first identifier information is based on for triggering the sub- equipment
The first identifier information sends authentication request information;
Authentication unit 420, for when receiving authentication request information, to sending the authentication request information
The first sub- equipment carry out authentication;
Acquiring unit 430, for when authentication result is to be verified, obtaining that the first sub- equipment sends
Two identification informations;The second identifier information is used to identify the networked capabilities of the described first sub- equipment;
Updating unit 440, for determining described the when being based on the second identifier information and the first identifier information
It is the described first sub- equipment by current configuration information update when the networked capabilities of one sub- equipment are greater than the networked capabilities of itself
Configuration information, and notify that the described first sub- device configuration is new main equipment.
Further, authentication unit 420 is specifically used for:
Obtain the first validation value that the described first sub- equipment is sent;First validation value is raw by the described first sub- equipment
At;
The second validation value, token and first validation value based on generation generate the first encryption information;
First encryption information and second validation value are sent to the described first sub- equipment;Second verifying
Value is based on second validation value, the token and first validation value generation second for triggering the described first sub- equipment
Encryption information, and when first encryption information is identical as second encryption information, return to second encryption information;
Obtain second encryption information that the described first sub- equipment is sent;When first encryption information and described second
When encryption information is identical, determine that authentication result is to be verified;When first encryption information and second encryption are believed
When ceasing different, determine that authentication result does not pass through for verifying.
Further, equipment further include:
Determination unit, for determining described first when being based on the second identifier information and the first identifier information
When the networked capabilities of sub- equipment are less than or equal to itself networked capabilities, keep current configuration information constant.
Further, equipment further include:
Identification information obtaining unit, for when detecting that networked capabilities remain unchanged in predetermined period, described in acquisition
The second identifier information of first sub- equipment.
Further, equipment further include:
Configuration information acquiring unit, for obtaining the target configuration information of the new main equipment;
Configuration unit, for being configured according to the target configuration information.
Refer to Fig. 5, Fig. 5 be another embodiment of the present invention provides a kind of networking equipment schematic diagram.As shown in figure 5,
The equipment 5 of the embodiment includes: processor 50, memory 51 and is stored in the memory 51 and can be in the processor
The computer program 52 run on 50.The processor 50 realizes above-mentioned each equipment network when executing the computer program 52
Step in embodiment of the method, such as S101 shown in FIG. 1 to S104.Alternatively, the processor 50 executes the computer journey
The function of each unit in above-mentioned each Installation practice, such as the function of unit 410 to 440 shown in Fig. 4 are realized when sequence 52.
Illustratively, the computer program 52 can be divided into one or more units, one or more of
Unit is stored in the memory 51, and is executed by the processor 50, to complete the present invention.One or more of lists
Member can be the series of computation machine program instruction section that can complete specific function, and the instruction segment is for describing the computer journey
Implementation procedure of the sequence 52 in the equipment 5.For example, the computer program 52 can be divided into transmission unit, verifying list
Member, acquiring unit and updating unit, each unit concrete function are as described above.
The equipment includes but are not limited to, processor 50, memory 51.It will be understood by those skilled in the art that Fig. 5 is only
It is only the example of equipment 5, does not constitute the restriction to equipment 5, may include than illustrating more or fewer components, or combination
Certain components or different components, such as the equipment can also include input-output equipment, network access equipment, bus
Deng.
Alleged processor 50 can be central processing unit (Central Processing Unit, CPU), can also be
Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
Deng.
The memory 51 can be the internal storage unit of the equipment 5, such as the hard disk or memory of equipment 5.It is described
Memory 51 is also possible to the External memory equipment of the equipment 5, such as the plug-in type hard disk being equipped in the equipment 5, intelligence
Storage card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card)
Deng.Further, the memory 51 can also both include the internal storage unit of the equipment 5 or set including external storage
It is standby.The memory 51 is for other programs and data needed for storing the computer program and the equipment.It is described to deposit
Reservoir 51 can be also used for temporarily storing the data that has exported or will export.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality
Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each
Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified
Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all
It is included within protection scope of the present invention.
Claims (10)
1. a kind of network-building method characterized by comprising
When detecting that networked capabilities change, to sub- device broadcasts first identifier information;The first identifier information is used for
Identify the networked capabilities of itself;The first identifier information is sent for triggering the sub- equipment based on the first identifier information
Authentication request information;
When receiving authentication request information, identity is carried out to the first sub- equipment for sending the authentication request information
Verifying;
When authentication result is to be verified, the second identifier information that the described first sub- equipment is sent is obtained;Described second
Identification information is used to identify the networked capabilities of the described first sub- equipment;
When being based on the second identifier information and the first identifier information, determine that the networked capabilities of the described first sub- equipment are big
It is the configuration information of the described first sub- equipment by current configuration information update, and described in notice when the networked capabilities of itself
First sub- device configuration is new main equipment.
2. network-building method as described in claim 1, which is characterized in that it is described when receiving authentication request information, it is right
The the first sub- equipment for sending the authentication request information carries out authentication, comprising:
Obtain the first validation value that the described first sub- equipment is sent;First validation value is generated by the described first sub- equipment;
The second validation value, token and first validation value based on generation generate the first encryption information;
First encryption information and second validation value are sent to the described first sub- equipment;Second validation value is used
The second encryption of second validation value, the token and first validation value generation is based in triggering the first sub- equipment
Information, and when first encryption information is identical as second encryption information, return to second encryption information;
Obtain second encryption information that the described first sub- equipment is sent;When first encryption information and second encryption
When information is identical, determine that authentication result is to be verified;When first encryption information and second encryption information not
Meanwhile determining that authentication result does not pass through for verifying.
3. network-building method as described in claim 1, which is characterized in that further include:
When being based on the second identifier information and the first identifier information, determine that the networked capabilities of the described first sub- equipment are small
When itself networked capabilities, keep current configuration information constant.
4. network-building method as described in claim 1, which is characterized in that described when based on the second identifier information and described
Current when determining that the networked capabilities of the described first sub- equipment are greater than the networked capabilities of itself, is matched confidence by first identifier information
Breath is updated to the configuration information of the described first sub- equipment, and notifies the described first sub- device configuration to go back before new main equipment
Include:
When detecting that networked capabilities remain unchanged in predetermined period, the second identifier information of the first sub- equipment is obtained.
5. such as the described in any item network-building methods of Claims 1-4, which is characterized in that described to believe when based on the second identifier
Breath and the first identifier information will be worked as when determining that the networked capabilities of the described first sub- equipment are greater than the networked capabilities of itself
Preceding configuration information update is the configuration information of the described first sub- equipment, and notifies that the described first sub- device configuration is that new master sets
After standby, further includes:
Obtain the target configuration information of the new main equipment;
It is configured according to the target configuration information.
6. a kind of networking equipment characterized by comprising
Transmission unit, for when detecting that networked capabilities change, to sub- device broadcasts first identifier information;Described first
Identification information is used to identify the networked capabilities of itself;The first identifier information is based on described first for triggering the sub- equipment
Identification information sends authentication request information;
Authentication unit, for when receiving authentication request information, to sending the first of the authentication request information
Sub- equipment carries out authentication;
Acquiring unit, for obtaining the second identifier that the described first sub- equipment is sent when authentication result is to be verified
Information;The second identifier information is used to identify the networked capabilities of the described first sub- equipment;
Updating unit, for determining that first son is set when being based on the second identifier information and the first identifier information
It is the described first sub- equipment with confidence by current configuration information update when standby networked capabilities are greater than the networked capabilities of itself
Breath, and notify that the described first sub- device configuration is new main equipment.
7. networking equipment as claimed in claim 6, which is characterized in that the authentication unit is specifically used for:
Obtain the first validation value that the described first sub- equipment is sent;First validation value is generated by the described first sub- equipment;
The second validation value, token and first validation value based on generation generate the first encryption information;
First encryption information and second validation value are sent to the described first sub- equipment;Second validation value is used
The second encryption of second validation value, the token and first validation value generation is based in triggering the first sub- equipment
Information, and when first encryption information is identical as second encryption information, return to second encryption information;
Obtain second encryption information that the described first sub- equipment is sent;When first encryption information and second encryption
When information is identical, determine that authentication result is to be verified;When first encryption information and second encryption information not
Meanwhile determining that authentication result does not pass through for verifying.
8. networking equipment as claimed in claim 6, which is characterized in that further include:
Identification information obtaining unit, for obtaining described first when detecting that networked capabilities remain unchanged in predetermined period
The second identifier information of sub- equipment.
9. a kind of networking equipment, including memory, processor and storage are in the memory and can be on the processor
The computer program of operation, which is characterized in that the processor realizes such as claim 1 to 5 when executing the computer program
The step of any one the method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists
In when the computer program is executed by processor the step of any one of such as claim 1 to 5 of realization the method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910588594.5A CN110266547B (en) | 2019-07-02 | 2019-07-02 | Networking method and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910588594.5A CN110266547B (en) | 2019-07-02 | 2019-07-02 | Networking method and equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110266547A true CN110266547A (en) | 2019-09-20 |
CN110266547B CN110266547B (en) | 2022-05-24 |
Family
ID=67923791
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910588594.5A Active CN110266547B (en) | 2019-07-02 | 2019-07-02 | Networking method and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110266547B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040114538A1 (en) * | 2000-12-27 | 2004-06-17 | Stephane Bouet | Device roles and piconet connections |
CN101114901A (en) * | 2006-07-26 | 2008-01-30 | 联想(北京)有限公司 | Safety authentication system, apparatus and method for non-contact type wireless data transmission |
CN101145895A (en) * | 2007-09-20 | 2008-03-19 | 中兴通讯股份有限公司 | Master/slave device switching method |
CN101394306A (en) * | 2008-07-08 | 2009-03-25 | 国电南瑞科技股份有限公司 | Seamless switching method for dual server system |
CN101777158A (en) * | 2010-01-13 | 2010-07-14 | 北京飞天诚信科技有限公司 | Method and system for secure transaction |
CN102469093A (en) * | 2010-11-19 | 2012-05-23 | 中国电信股份有限公司 | System and method for controlling networking authorization on networking application |
CN102647276A (en) * | 2011-02-17 | 2012-08-22 | 英飞凌科技股份有限公司 | Systems and methods for device and data authentication |
US20160205098A1 (en) * | 2014-06-09 | 2016-07-14 | Beijing Stone Sheild Technology Co., Ltd. | Identity verifying method, apparatus and system, and related devices |
CN108323241A (en) * | 2018-01-25 | 2018-07-24 | 深圳市为通博科技有限责任公司 | Principal and subordinate's role transforming method, chip and data transmission system |
-
2019
- 2019-07-02 CN CN201910588594.5A patent/CN110266547B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040114538A1 (en) * | 2000-12-27 | 2004-06-17 | Stephane Bouet | Device roles and piconet connections |
CN101114901A (en) * | 2006-07-26 | 2008-01-30 | 联想(北京)有限公司 | Safety authentication system, apparatus and method for non-contact type wireless data transmission |
CN101145895A (en) * | 2007-09-20 | 2008-03-19 | 中兴通讯股份有限公司 | Master/slave device switching method |
CN101394306A (en) * | 2008-07-08 | 2009-03-25 | 国电南瑞科技股份有限公司 | Seamless switching method for dual server system |
CN101777158A (en) * | 2010-01-13 | 2010-07-14 | 北京飞天诚信科技有限公司 | Method and system for secure transaction |
CN102469093A (en) * | 2010-11-19 | 2012-05-23 | 中国电信股份有限公司 | System and method for controlling networking authorization on networking application |
CN102647276A (en) * | 2011-02-17 | 2012-08-22 | 英飞凌科技股份有限公司 | Systems and methods for device and data authentication |
US20160205098A1 (en) * | 2014-06-09 | 2016-07-14 | Beijing Stone Sheild Technology Co., Ltd. | Identity verifying method, apparatus and system, and related devices |
CN108323241A (en) * | 2018-01-25 | 2018-07-24 | 深圳市为通博科技有限责任公司 | Principal and subordinate's role transforming method, chip and data transmission system |
Also Published As
Publication number | Publication date |
---|---|
CN110266547B (en) | 2022-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11706102B2 (en) | Dynamically deployable self configuring distributed network management system | |
CN110351385B (en) | Home gateway system and data forwarding method | |
CN110072236A (en) | Equipment connection method, equipment and system | |
CN104348903A (en) | Communication system for establishing P2P connections and the corresponding devices | |
CN112671763B (en) | Data synchronization method and device in networking environment, computer equipment and storage medium | |
CN106535187A (en) | Smart home equipment access method and system based on wireless router terminal | |
CN113595791B (en) | Equipment network distribution method and device, electronic equipment and computer readable medium | |
CA2357444A1 (en) | System and methods for automatic negotiation in distributed computing | |
CN113365227A (en) | WI-SUN network system, and network access method, device and equipment based on WI-SUN network system | |
WO2019196451A1 (en) | Networking method and device for wireless vrv system | |
CN107302428B (en) | Method for negotiating cipher algorithm of data transmission service in power distribution network | |
JP2006261827A (en) | Network apparatus, management apparatus thereof, network connection method, and network connection management method thereof | |
CN105099837A (en) | Wired general medium networking technology networking method and apparatus for home network | |
CN104253702B (en) | A kind of terminal management method and system | |
CN109600265B (en) | Access circuit AC configuration information issuing method, device and server | |
CN110266547A (en) | A kind of network-building method and equipment | |
WO2010124571A1 (en) | Node information acquirement method, client, and server | |
CN108183925B (en) | IoT-based narrowband communication method | |
CN107995125B (en) | Traffic scheduling method and device | |
CN113098737B (en) | User node admission control method and device and electronic equipment | |
CN115001863A (en) | Network security vulnerability detection method, device, medium and electronic equipment | |
CN104902497B (en) | A kind of method and device of managing mobile phone hot spot connection | |
CN104219072B (en) | A kind of restoration methods and device of safety governor SC | |
CN112087745A (en) | Network distribution method and device of household appliance, electronic device and storage medium | |
TWI836734B (en) | Software-defined network controller-based automatic management system, method, and computer-readable medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |