CN110266547A - A kind of network-building method and equipment - Google Patents

A kind of network-building method and equipment Download PDF

Info

Publication number
CN110266547A
CN110266547A CN201910588594.5A CN201910588594A CN110266547A CN 110266547 A CN110266547 A CN 110266547A CN 201910588594 A CN201910588594 A CN 201910588594A CN 110266547 A CN110266547 A CN 110266547A
Authority
CN
China
Prior art keywords
equipment
sub
information
networked capabilities
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910588594.5A
Other languages
Chinese (zh)
Other versions
CN110266547B (en
Inventor
杨前
纪明亭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TP Link Technologies Co Ltd
Original Assignee
TP Link Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TP Link Technologies Co Ltd filed Critical TP Link Technologies Co Ltd
Priority to CN201910588594.5A priority Critical patent/CN110266547B/en
Publication of CN110266547A publication Critical patent/CN110266547A/en
Application granted granted Critical
Publication of CN110266547B publication Critical patent/CN110266547B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/0816Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition

Abstract

The present invention is suitable for field of computer technology, provides a kind of network-building method and equipment, this method comprises: sending first identifier information to sub- equipment when detecting that networked capabilities change;Authentication is carried out to the first sub- equipment for sending the authentication request information;Obtain the second identifier information that the described first sub- equipment is sent;When determining that the networked capabilities of the described first sub- equipment are greater than the networked capabilities of itself, by current configuration information update it is the configuration information of the described first sub- equipment, and notifies that the described first sub- device configuration is new main equipment.Above scheme, local device carries out authentication when detecting that itself networked capabilities changes, to sub- equipment, when the networked capabilities of the first sub- equipment are greater than the networked capabilities of local device, current configuration information is updated, and notifies that the first sub- device configuration is new main equipment.The automatic conversion between main equipment and sub- equipment is realized, reduces configuration work amount, improves allocative efficiency.

Description

A kind of network-building method and equipment
Technical field
The invention belongs to field of computer technology more particularly to a kind of network-building method and equipment.
Background technique
With the continuous development of household wireless LAN, separate unit radio reception device is covered to be limited in scope, Duo Taishe Standby networking requirements simultaneously are increasing.User selects an equipment as main equipment, remaining multiple devices conduct under this scene Sub- equipment.Wherein, main equipment is for being connected to wide area network and the sub- equipment distribution of configuration information into local area network, and sub- equipment is from master Configuration information is obtained in equipment to be configured, and provides WLAN service with this.However, when selected main equipment damages When bad or user wants replacement main equipment, need to reconfigure main equipment and sub- equipment.Existing configuration mode is that will own Equipment factory reset, reconfigure an equipment as main equipment, be reconfigured its minor equipment, this configuration mode is matched It sets that heavy workload, configuration flow are cumbersome, and allocative efficiency is low, makes troubles to user.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of network-building method and equipment, to solve in the prior art, using biography The mode for HRP-configured master device and the sub- equipment of uniting, leads to that configuration work amount is big, configuration flow is cumbersome, and allocative efficiency is low, gives user The problem of making troubles.
The first aspect of the embodiment of the present invention provides a kind of network-building method, comprising:
When detecting that networked capabilities change, to sub- device broadcasts first identifier information;The first identifier information For identifying itself networked capabilities;The first identifier information is based on the first identifier information for triggering the sub- equipment Send authentication request information;
When receiving authentication request information, the first sub- equipment for sending the authentication request information is carried out Authentication;
When authentication result is to be verified, the second identifier information that the described first sub- equipment is sent is obtained;It is described Second identifier information is used to identify the networked capabilities of the described first sub- equipment;
When being based on the second identifier information and the first identifier information, the networking energy of the described first sub- equipment is determined When power is greater than the networked capabilities of itself, by current configuration information update it is the configuration information of the described first sub- equipment, and notifies The first sub- device configuration is new main equipment.
The second aspect of the embodiment of the present invention provides a kind of networking equipment, which includes:
Transmission unit, for when detecting that networked capabilities change, to sub- device broadcasts first identifier information;It is described First identifier information is used to identify the networked capabilities of itself;The first identifier information is for triggering the sub- equipment based on described First identifier information sends authentication request information;
Authentication unit, for when receiving authentication request information, to sending the authentication request information First sub- equipment carries out authentication;
Acquiring unit, for obtaining the described first sub- equipment is sent second when authentication result is to be verified Identification information;The second identifier information is used to identify the networked capabilities of the described first sub- equipment;
Updating unit, for determining described first when being based on the second identifier information and the first identifier information It is matching for the described first sub- equipment by current configuration information update when the networked capabilities of sub- equipment are greater than the networked capabilities of itself Confidence breath, and notify that the described first sub- device configuration is new main equipment.
The third aspect of the embodiment of the present invention provides another networking equipment, including processor, input equipment, output are set Standby and memory, the processor, input equipment, output equipment and memory are connected with each other, wherein the memory is for depositing The computer program that holding equipment executes the above method is stored up, the computer program includes program instruction, and the processor is matched It sets for calling described program to instruct, execution following steps:
When detecting that networked capabilities change, to sub- device broadcasts first identifier information;The first identifier information For identifying itself networked capabilities;The first identifier information is based on the first identifier information for triggering the sub- equipment Send authentication request information;
When receiving authentication request information, the first sub- equipment for sending the authentication request information is carried out Authentication;
When authentication result is to be verified, the second identifier information that the described first sub- equipment is sent is obtained;It is described Second identifier information is used to identify the networked capabilities of the described first sub- equipment;
When being based on the second identifier information and the first identifier information, the networking energy of the described first sub- equipment is determined When power is greater than the networked capabilities of itself, by current configuration information update it is the configuration information of the described first sub- equipment, and notifies The first sub- device configuration is new main equipment.
The fourth aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage Media storage has computer program, and the computer program performs the steps of when being executed by processor
When detecting that networked capabilities change, to sub- device broadcasts first identifier information;The first identifier information For identifying itself networked capabilities;The first identifier information is based on the first identifier information for triggering the sub- equipment Send authentication request information;
When receiving authentication request information, the first sub- equipment for sending the authentication request information is carried out Authentication;
When authentication result is to be verified, the second identifier information that the described first sub- equipment is sent is obtained;It is described Second identifier information is used to identify the networked capabilities of the described first sub- equipment;
When being based on the second identifier information and the first identifier information, the networking energy of the described first sub- equipment is determined When power is greater than the networked capabilities of itself, by current configuration information update it is the configuration information of the described first sub- equipment, and notifies The first sub- device configuration is new main equipment.
A kind of network-building method provided in an embodiment of the present invention and equipment have the advantages that
The embodiment of the present invention sends first identifier letter to sub- equipment when main equipment detects that networked capabilities change Breath, triggering main equipment are based on the first identifier information and send authentication request information;To transmission authentication request information Sub- equipment carries out authentication;When authentication passes through, compare the networked capabilities of main equipment Yu sub- equipment;The connection of group equipment When net ability is greater than the networked capabilities of main equipment, current configuration information update is the configuration information of sub- equipment by main equipment, and Notify that sub- device configuration is new main equipment.Aforesaid way realizes the automatic conversion between main equipment and sub- equipment, reduces Configuration work amount, configuration flow are simple;And due to being automatically configured between main equipment and sub- equipment, allocative efficiency is improved, is liberated User, it is user-friendly.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is a kind of implementation flow chart for network-building method that one embodiment of the invention provides;
Fig. 2 be another embodiment of the present invention provides a kind of network-building method implementation flow chart;
Fig. 3 is a kind of implementation flow chart for network-building method that further embodiment of this invention provides;
Fig. 4 is a kind of schematic diagram for networking equipment that one embodiment of the invention provides;
Fig. 5 be another embodiment of the present invention provides a kind of networking equipment schematic diagram.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
Referring to Figure 1, Fig. 1 is a kind of schematic flow diagram of network-building method provided in an embodiment of the present invention.In the present embodiment The executing subject of network-building method is main equipment, and main equipment refers to that the sub- equipment distribution for being connected to wide area network and into local area network is matched The equipment of confidence breath, sub- equipment refer to that configuration information is obtained from main equipment to be configured, and provides WLAN service with this Equipment.Network-building method as shown in Figure 1 can include:
S101: when detecting that networked capabilities change, to sub- device broadcasts first identifier information;The first identifier Information is used to identify the networked capabilities of itself;The first identifier information is based on the first identifier for triggering the sub- equipment Information sends authentication request information.
The equipment that main equipment refers to the sub- equipment distribution of configuration information for being connected to wide area network and into local area network, sub- equipment Refer to that configuration information is obtained from main equipment to be configured, and provides the equipment of WLAN service with this.It is completed in each building Network in, the quantity of main equipment is one, and the quantity of sub- equipment is one or more, is not limited this.
When main equipment and sub- equipment are without any configuration, all devices are default setting, user Ke Ren at this time Wherein an equipment is configured for meaning selection, such as configuration registry account, administrator's password, and the equipment by configuration is known as master and sets Standby, the configuration information that minor equipment obtains the main equipment is configured.Networked capabilities refer to the energy of these equipment connection network Power.
When user in advance to plant is configured to obtain main equipment out when, main equipment detects the networked capabilities of itself.Tool Body, it can be detected by following four mode.The first: main equipment sends the message about network connecting request to gateway, when When obtaining the response message of the gateway, it was demonstrated that main equipment can network;Second: main equipment is to dynamic host configuration protocol service Device (Dynamic Host Configuration Protocol, DHCP) sends message about network connecting request, when obtaining When the response message of the server, request message is sent to name server (Domain Name Server, DNS), obtains DNS When the response message of server, it was demonstrated that main equipment can network;The third: main equipment detects whether to deposit point pair over ethernet Point agreement (point-to-point protocol over ethernet, PPPoE) server, main equipment, which is worked as, detects PPPoE In the presence of server, it was demonstrated that main equipment can network;4th kind: main equipment detection Dynamic Host Configuration Protocol server whether there is, and main equipment is worked as In the presence of detecting Dynamic Host Configuration Protocol server, it was demonstrated that main equipment can network.
The above-mentioned provable main equipment of four kinds of modes currently has network savvy, but the ability specifically networked is different, can It is interpreted as the height or strong and weak different of connection network capabilities, i.e., above-mentioned different networking mode corresponds to the different networking of main equipment Ability.The networked capabilities of above-mentioned four kinds of modes successively reduce, i.e. the first the networked capabilities highest for indicating main equipment, followed by the Two kinds, followed by the third, minimum is the 4th kind.
For intuitive, the convenient height for knowing current device networked capabilities, can be set with first identifier message identification master Standby networked capabilities.Specifically, first identifier information can be set to it is excellent, good, in, it is poor, cannot network;Also it can be set One, second, third, fourth, fifth etc., wherein excellent and the first expression current networked capabilities of main equipment are very good;It is good and Two indicate that the current networked capabilities of main equipment are relatively good;In and third indicate the current networked capabilities of main equipment it is general;Difference and the Four indicate that the current networked capabilities of main equipment are poor;It cannot network and the 5th indicates main equipment currently without networked capabilities.On It states first identifier information to be merely illustrative, user can be configured according to the actual situation, for example, first identifier information can also It is set as the five, the 4th, third, second, first;Or A, B, C, D, E etc., and first identifier information and main equipment connection can abilities The corresponding relationship of height, user can also sets itself, this is not construed as limiting.
When main equipment detects that networked capabilities change, to sub- device broadcasts first identifier information;Work as main equipment When detecting that networked capabilities change, the networked capabilities after variation are sent to sub- equipment.Main equipment sends the to sub- equipment The mode of one identification information, which can be, is broadcast to sub- equipment by wireless link layer protocols, is also possible to pass by wireless management frame It is sent to sub- equipment.It is subject to actual conditions, does not limit this.Wherein, first identifier information is being received for triggering sub- equipment Authentication request information is sent based on the first identifier information when to first identifier information, i.e., sub- equipment receives main equipment transmission First identifier information when, to the main equipment send authentication request information.
S102: when receiving authentication request information, the first son for sending the authentication request information is set It is standby to carry out authentication.
The quantity of sub- equipment can be one or more, and when the quantity of group equipment is one, the first sub- equipment refers to the son Equipment;When the quantity of group equipment is multiple, the first sub- equipment refers to any in the sub- equipment for sending authentication request information One.Specifically, main equipment receives the authentication request information that the first sub- equipment is sent, and to the transmission authentication request You carry out authentication at the first sub- equipment of information.
The mode that main equipment carries out authentication to the first sub- equipment can be, and be verified by characteristic value.Specifically, Characteristic values are set for all sub- equipment in advance, and the characteristic value that these are set is stored into the database of main equipment, when the When one sub- equipment receives first identifier information, the authentication request information comprising characteristic value, main equipment are sent to main equipment The authentication request information comprising characteristic value that the first sub- equipment is sent is received, and searches this feature value in the database, when When finding this feature, it was demonstrated that authentication passes through;When not finding this feature value in the database, it was demonstrated that authentication is lost It loses.
The mode that main equipment carries out authentication to the first sub- equipment is also possible to by judging that the encryption information of both sides is It is no identical.Specifically, main equipment obtains the first validation value that the first sub- equipment generates, and generated with itself the second validation value, Token generates the first encryption information, and first encryption information and the second validation value are sent to the first sub- equipment;First son is set It is standby that second encryption information is generated according to the first validation value, token, the second validation value, and compare the first encryption information and the second encryption Whether information is identical, and when the first encryption information is identical as the second encryption information, the second encryption information is sent to main equipment;It is main Whether equipment compares the first encryption information identical as the second encryption information, when the first encryption information is identical as the second encryption information When, determine that authentication result is to be verified, when the first encryption information and the second encryption information difference, determines authentication As a result do not pass through for verifying.Wherein, token can be randomly generated by server, when being used for main equipment and sub- authentication Validation value is encrypted;First validation value can be the first random number, the First Eigenvalue etc. that the first sub- equipment generates, second Validation value can be the second random number, the Second Eigenvalue etc. that main equipment generates, and not limit this.
Further, it in order to keep the network established safer, is verified using main equipment and the first sub- equipment bidirectional identification, tool Body, S102 may include S1021-S1024, specific as follows:
S1021: the first validation value that the described first sub- equipment is sent is obtained;First validation value is set by first son It is standby to generate.
First validation value is generated by the first sub- equipment, for the authentication between main equipment.Wherein, the first validation value It can be the first random number, the First Eigenvalue etc. that the first sub- equipment generates, not limit this.Specifically, the first sub- equipment The first validation value of itself generation is sent, main equipment receives the first validation value that the first sub- equipment is sent.It is further possible to It is main equipment to first the first validation value acquisition request of sub- equipment transmission, the first sub- equipment receives the first validation value acquisition request When to main equipment send the first validation value, main equipment receives the first validation value that the first sub- equipment is sent.
S1022: the second validation value, token and first validation value based on generation generate the first encryption information.
Second validation value is generated by main equipment, for the authentication between the first sub- equipment.Wherein, the second validation value It can be the second random number, the Second Eigenvalue etc. that main equipment generates, not limit this.Main equipment is added by preset token Close algorithm is encrypted to obtain the first encryption information to the first validation value, the second validation value.
S1023: first encryption information and second validation value are sent to the described first sub- equipment;Described Two validation values are based on second validation value, the token and first validation value life for triggering the described first sub- equipment At the second encryption information, and when first encryption information is identical as second encryption information, second encryption is returned Information.
First encryption information and the second validation value itself generated are sent to the first sub- equipment by main equipment;First son is set For when receiving the second validation value, the second validation value, the first validation value encrypt by preset token Encryption Algorithm To the second encryption information.The second encryption information that the first Encryption Algorithm and self-encryption that first sub- equipment interconnection receives obtain It is compared, when the first encryption information is identical as the second encryption information, the second encryption information is sent to main equipment, can also incite somebody to action " the first encryption information is identical as the second encryption information " is sent to main equipment together;When the first encryption information and the second encryption information When different, it can not be sent to main equipment with what, " the first encryption information is different from the second encryption information " can also be sent, also " authentication does not pass through " etc. can be sent, this is not construed as limiting.
It is worth noting that user can be with predetermined encryption algorithm, it can use different Encryption Algorithm, but verifying every time When, when the Encryption Algorithm of the secondary main equipment for participating in verifying and the first sub- equipment use is identical.
S1024: second encryption information that the described first sub- equipment is sent is obtained;When first encryption information and institute State the second encryption information it is identical when, determine authentication result be verified;When first encryption information and described second When encryption information difference, determine that authentication result does not pass through for verifying.
Main equipment receives the second encryption information that the first sub- equipment is sent;Or main equipment sends second to the first sub- equipment Encryption information acquisition request when the first sub- equipment receives the second Encryptionlnfo Request, judges that the first encryption information adds with second Whether confidential information is identical, and sends the second encryption information to main equipment.When main equipment gets second that the first sub- equipment is sent When encryption information, it is whether identical as the second encryption information to compare the first encryption information.When the first encryption information and the second encryption are believed Manner of breathing simultaneously, determines that this authentication result is to be verified;When the first encryption information and the second encryption information be not identical, Determine that this authentication result does not pass through for verifying.
Further, in order to improve the safety of network struction, when authentication result be verifying not by when, main equipment The information that this identifying object (the i.e. first sub- equipment) is sent after verifying can be rejected.
S103: when authentication result is to be verified, the second identifier information that the described first sub- equipment is sent is obtained; The second identifier information is used to identify the networked capabilities of the described first sub- equipment.
Second identifier information is used to identify the networked capabilities of the first sub- equipment.Specifically, second identifier information can be set For it is excellent, good, in, it is poor, cannot network;Also it can be set first, second, third, fourth, 5th etc., wherein excellent and the first table Show that the first sub- current networked capabilities of equipment are very good;Good and second the first sub- current networked capabilities of equipment of expression are relatively good;In And third indicates that the first sub- current networked capabilities of equipment are general;Difference and the 4th the first sub- current networked capabilities ratio of equipment of expression It is poor;It cannot network and the 5th indicates the first sub- equipment currently without networked capabilities.Above-mentioned second identifier information is merely illustrative Property explanation, user can be configured according to the actual situation, for example, second identifier information may be alternatively provided as the five, the 4th, third, The second, first;Or A, B, C, D, E etc., and the corresponding relationship of second identifier information and main equipment connection energy ability height, Yong Huye Can sets itself, this is not construed as limiting.
It should be noted that for the ease of comparing the networked capabilities of main equipment and the first sub- equipment, when time building network When, first identifier information should be identical with the form of expression of second identifier information, i.e., first identifier information be it is excellent, good, in, it is poor, When cannot network, second identifier information also should with it is excellent, good, in, poor, cannot network indicates;First identifier information is first, the Two, when third, the four, the 5th, second identifier information should also be indicated with the first, second, third, fourth, the 5th.
When authentication result is to be verified, main equipment obtains the second identifier information that the first sub- equipment is sent.Tool Body, the first sub- equipment detects the networked capabilities of itself, the side of specific detection mode and above-mentioned main equipment detection networked capabilities Formula is identical, and details are not described herein again.When the first sub- equipment detects the networked capabilities of itself, second identifier information is sent to master Equipment, main equipment receive the second identifier information that the first sub- equipment is sent.
S104: when being based on the second identifier information and the first identifier information, the described first sub- equipment is determined It is the configuration information of the described first sub- equipment by current configuration information update when networked capabilities are greater than the networked capabilities of itself, And notify that the described first sub- device configuration is new main equipment.
Main equipment is based on second identifier information and first identifier information, determines the networked capabilities of the first sub- equipment and itself Power.Specifically, main equipment compares the first sub- equipment and equipment of itself according to second identifier information and first identifier information Networked capabilities power.For example, when second identifier information be it is excellent, first identifier information be it is middle when, the networking of the first sub- equipment Ability is greater than the networked capabilities of main equipment;When second identifier information is first, and first identifier information is third, the first sub- equipment Networked capabilities be greater than main equipment networked capabilities.It is merely illustrative, does not limit this herein.
When the networked capabilities of the first sub- equipment be greater than main equipment networked capabilities when, main equipment by current configuration information more New is the configuration information of the first sub- equipment, to configure itself to sub- equipment, and notifies that the first sub- device configuration is that new master sets It is standby.Specifically, main equipment disconnect with the connection of server, close agency and firewall etc., it is current to obtain the first sub- equipment The configuration information update of main equipment is the configuration information of the first sub- equipment by configuration information.And notify the first sub- equipment conversion For new main equipment.After first sub- equipment receives the notice, server is connected, realizes the connection with wide area network, opens agency And firewall etc., the configuration information of the first sub- equipment is converted to the configuration information of new main equipment.
Further, in order to ensure the networked capabilities of current main equipment are best, so that beginning in current network building Optimal control centre is kept eventually, and best web experience is brought to user.In one implementation, this programme can be; When main equipment detects that itself networked capabilities remains unchanged in predetermined period, the second identifier of the first sub- equipment is obtained Information;Then execute S104.
Specifically, it is relatively good to occur the initial networked capabilities of main equipment in order to prevent, but networked capabilities are never sent out later Changing, and the networked capabilities for thering are the networked capabilities of equipment to be already higher than main equipment in remaining sub- equipment, but due to main equipment The case where networked capabilities never change, and carry out configuration information update without method triggering main equipment, sub- equipment appearance.It is main When equipment detects that networked capabilities remain unchanged in predetermined period, the second identifier information of the first sub- equipment is actively obtained.In advance If the period is that user is arranged according to the actual situation, such as to can be set to the detection in primary, every 30 seconds of detection in every 10 seconds one inferior, right This is without limitation.After main equipment gets the second identifier information of the first sub- equipment, the first obtained mark is detected based on itself Know information and executes S104.
It further, is best based on the above-mentioned networked capabilities for ensuring current main equipment, so that current network constructs In remain optimal control centre, on the basis of best web experience is brought to user, improve internet security.Another In a kind of implementation, this programme can be main equipment and first carry out authentication with the first sub- equipment, pass through when authentication and When detecting that networked capabilities remain unchanged in predetermined period, the second identifier information of the first sub- equipment is obtained;When main equipment obtains When getting the second identifier information of the first sub- equipment, the first identifier information obtained based on itself detection executes S104.This realization The process that authentication is carried out in mode is identical as S102, and details are not described herein again.
The embodiment of the present invention sends first identifier letter to sub- equipment when main equipment detects that networked capabilities change Breath, triggering main equipment are based on the first identifier information and send authentication request information;To transmission authentication request information Sub- equipment carries out authentication;When authentication passes through, compare the networked capabilities of main equipment Yu sub- equipment;The connection of group equipment When net ability is greater than the networked capabilities of main equipment, current configuration information update is the configuration information of sub- equipment by main equipment, and Notify that sub- device configuration is new main equipment.Aforesaid way realizes the automatic conversion between main equipment and sub- equipment, reduces Configuration work amount, configuration flow are simple;And due to being automatically configured between main equipment and sub- equipment, allocative efficiency is improved, is liberated User, it is user-friendly.
Refer to Fig. 2, Fig. 2 be another embodiment of the present invention provides a kind of network-building method schematic flow diagram.This implementation The executing subject of network-building method is main equipment in example, and main equipment refers to the sub- equipment point for being connected to wide area network and into local area network The equipment for sending out configuration information, sub- equipment refer to that obtaining configuration information from main equipment is configured, provide WLAN clothes with this The equipment of business.
The present embodiment embodiment corresponding with Fig. 1 is distinguished as S205, and S201-S204 is corresponding with Fig. 1 in the present embodiment S101-S104 in embodiment is identical, referring specifically to the associated description of S101-S104 in the corresponding embodiment of Fig. 1, this Place does not repeat.
It should be noted that S205 is arranged side by side with S204, S205 is not executed after S204.Main equipment is set according to the first son The standby size with itself networked capabilities determines and executes S204 or S205 after S203.It is subject to actual conditions when specific implementation, It does not limit this.
S205: when being based on the second identifier information and the first identifier information, the described first sub- equipment is determined When networked capabilities are less than or equal to itself networked capabilities, keep current configuration information constant.
Main equipment is based on second identifier information and first identifier information, determines the networked capabilities of the first sub- equipment and itself Between power.Specifically, main equipment compares the first sub- equipment and itself according to second identifier information and first identifier information Power between the networked capabilities of equipment.For example, when first identifier information is excellent, the first son is set in when second identifier information being Standby networked capabilities are less than the networked capabilities of main equipment;When second identifier information is third, and first identifier information is first, the The networked capabilities of one sub- equipment are less than the networked capabilities of main equipment;When second identifier information is second, first identifier information is the When two, the networked capabilities of the first sub- equipment are equal to the networked capabilities of main equipment.It is merely illustrative herein, this is not limited It is fixed.
When the networked capabilities of the first sub- equipment are less than or equal to the networked capabilities of main equipment, main equipment keeps current and matches Confidence breath is not altered, i.e. main equipment or main equipment.At this point, the first sub- equipment is without the change for carrying out configuration information.It can To be interpreted as not needing to configure new main equipment at this time.
The embodiment of the present invention sends first identifier letter to sub- equipment when main equipment detects that networked capabilities change Breath, triggering main equipment are based on the first identifier information and send authentication request information;To transmission authentication request information Sub- equipment carries out authentication;When authentication passes through, compare the networked capabilities of main equipment Yu sub- equipment;The connection of group equipment When net ability is greater than the networked capabilities of main equipment, current configuration information update is the configuration information of sub- equipment by main equipment, and Notify that sub- device configuration is new main equipment.Aforesaid way realizes the automatic conversion between main equipment and sub- equipment, reduces Configuration work amount, configuration flow are simple;And due to being automatically configured between main equipment and sub- equipment, allocative efficiency is improved, is liberated User, it is user-friendly.
Fig. 3 is referred to, Fig. 3 is a kind of schematic flow diagram for network-building method that further embodiment of this invention provides.This implementation The executing subject of network-building method is main equipment in example, and main equipment refers to the sub- equipment point for being connected to wide area network and into local area network The equipment for sending out configuration information, sub- equipment refer to that obtaining configuration information from main equipment is configured, provide WLAN clothes with this The equipment of business.
The present embodiment embodiment corresponding with Fig. 2 is distinguished as S306-S307, in the present embodiment S301-S305 with Fig. 2 pairs The S201-S205 in embodiment answered is identical, retouches referring specifically to the correlation of S201-S205 in the corresponding embodiment of Fig. 2 It states, does not repeat herein.
It should be noted that S305 is arranged side by side with S304 in the present embodiment, S305 is not executed after S304.Main equipment According to the first sub- equipment and itself networked capabilities, determines and execute S304 or S305 after S303.With practical feelings when specific implementation Subject to condition, do not limit this.And S306-S307 is executed after S304, if that execute is S305, is not carried out S306-S307.It is specific as follows:
When performing S304: when determining described first based on the second identifier information and the first identifier information It is matching for the described first sub- equipment by current configuration information update when the networked capabilities of sub- equipment are greater than the networked capabilities of itself Confidence breath, and notify the described first sub- device configuration be new main equipment the step for after, execute S306-S307.
S306: the target configuration information of the new main equipment is obtained.
Main equipment (being configured with new main equipment at this time, main equipment here refers to old main equipment) obtains new master and sets Standby target configuration information.Specifically, main equipment sends target configuration information acquisition request, new main equipment to new main equipment After receiving target configuration information acquisition request, target configuration information is sent to main equipment, main equipment receives new master and sets The target configuration information that preparation is sent.Target configuration information may include IP address, firewall rule, wireless client mode, clothes Business device setting etc., does not limit this.
S307: it is configured according to the target configuration information.
Main equipment is configured according to the target configuration information got.For example, main equipment is matched according to the target received Confidence breath configuration IP address, firewall, client, server etc..
When performing S305: when determining described first based on the second identifier information and the first identifier information When the networked capabilities of sub- equipment are less than or equal to itself networked capabilities, when the step for keeping current configuration information constant, Due to not being updated to the configuration information of main equipment, so S306-S307 will not be executed.
The embodiment of the present invention sends first identifier letter to sub- equipment when main equipment detects that networked capabilities change Breath, triggering main equipment are based on the first identifier information and send authentication request information;To transmission authentication request information Sub- equipment carries out authentication;When authentication passes through, compare the networked capabilities of main equipment Yu sub- equipment;The connection of group equipment When net ability is greater than the networked capabilities of main equipment, current configuration information update is the configuration information of sub- equipment by main equipment, and Notify that sub- device configuration is new main equipment.Aforesaid way realizes the automatic conversion between main equipment and sub- equipment, reduces Configuration work amount, configuration flow are simple;And due to being automatically configured between main equipment and sub- equipment, allocative efficiency is improved, is liberated User, it is user-friendly.
Fig. 4 is referred to, Fig. 4 is a kind of schematic diagram for networking equipment that one embodiment of the invention provides.Equipment includes each Unit is used to execute each step in the corresponding embodiment of Fig. 1, Fig. 2, Fig. 3.It is corresponding referring specifically to Fig. 1, Fig. 2, Fig. 3 Associated description in embodiment.For ease of description, only the parts related to this embodiment are shown.Referring to fig. 4, equipment 4 is wrapped It includes:
Transmission unit 410, for when detecting that networked capabilities change, to sub- device broadcasts first identifier information; The first identifier information is used to identify the networked capabilities of itself;The first identifier information is based on for triggering the sub- equipment The first identifier information sends authentication request information;
Authentication unit 420, for when receiving authentication request information, to sending the authentication request information The first sub- equipment carry out authentication;
Acquiring unit 430, for when authentication result is to be verified, obtaining that the first sub- equipment sends Two identification informations;The second identifier information is used to identify the networked capabilities of the described first sub- equipment;
Updating unit 440, for determining described the when being based on the second identifier information and the first identifier information It is the described first sub- equipment by current configuration information update when the networked capabilities of one sub- equipment are greater than the networked capabilities of itself Configuration information, and notify that the described first sub- device configuration is new main equipment.
Further, authentication unit 420 is specifically used for:
Obtain the first validation value that the described first sub- equipment is sent;First validation value is raw by the described first sub- equipment At;
The second validation value, token and first validation value based on generation generate the first encryption information;
First encryption information and second validation value are sent to the described first sub- equipment;Second verifying Value is based on second validation value, the token and first validation value generation second for triggering the described first sub- equipment Encryption information, and when first encryption information is identical as second encryption information, return to second encryption information;
Obtain second encryption information that the described first sub- equipment is sent;When first encryption information and described second When encryption information is identical, determine that authentication result is to be verified;When first encryption information and second encryption are believed When ceasing different, determine that authentication result does not pass through for verifying.
Further, equipment further include:
Determination unit, for determining described first when being based on the second identifier information and the first identifier information When the networked capabilities of sub- equipment are less than or equal to itself networked capabilities, keep current configuration information constant.
Further, equipment further include:
Identification information obtaining unit, for when detecting that networked capabilities remain unchanged in predetermined period, described in acquisition The second identifier information of first sub- equipment.
Further, equipment further include:
Configuration information acquiring unit, for obtaining the target configuration information of the new main equipment;
Configuration unit, for being configured according to the target configuration information.
Refer to Fig. 5, Fig. 5 be another embodiment of the present invention provides a kind of networking equipment schematic diagram.As shown in figure 5, The equipment 5 of the embodiment includes: processor 50, memory 51 and is stored in the memory 51 and can be in the processor The computer program 52 run on 50.The processor 50 realizes above-mentioned each equipment network when executing the computer program 52 Step in embodiment of the method, such as S101 shown in FIG. 1 to S104.Alternatively, the processor 50 executes the computer journey The function of each unit in above-mentioned each Installation practice, such as the function of unit 410 to 440 shown in Fig. 4 are realized when sequence 52.
Illustratively, the computer program 52 can be divided into one or more units, one or more of Unit is stored in the memory 51, and is executed by the processor 50, to complete the present invention.One or more of lists Member can be the series of computation machine program instruction section that can complete specific function, and the instruction segment is for describing the computer journey Implementation procedure of the sequence 52 in the equipment 5.For example, the computer program 52 can be divided into transmission unit, verifying list Member, acquiring unit and updating unit, each unit concrete function are as described above.
The equipment includes but are not limited to, processor 50, memory 51.It will be understood by those skilled in the art that Fig. 5 is only It is only the example of equipment 5, does not constitute the restriction to equipment 5, may include than illustrating more or fewer components, or combination Certain components or different components, such as the equipment can also include input-output equipment, network access equipment, bus Deng.
Alleged processor 50 can be central processing unit (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng.
The memory 51 can be the internal storage unit of the equipment 5, such as the hard disk or memory of equipment 5.It is described Memory 51 is also possible to the External memory equipment of the equipment 5, such as the plug-in type hard disk being equipped in the equipment 5, intelligence Storage card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) Deng.Further, the memory 51 can also both include the internal storage unit of the equipment 5 or set including external storage It is standby.The memory 51 is for other programs and data needed for storing the computer program and the equipment.It is described to deposit Reservoir 51 can be also used for temporarily storing the data that has exported or will export.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of network-building method characterized by comprising
When detecting that networked capabilities change, to sub- device broadcasts first identifier information;The first identifier information is used for Identify the networked capabilities of itself;The first identifier information is sent for triggering the sub- equipment based on the first identifier information Authentication request information;
When receiving authentication request information, identity is carried out to the first sub- equipment for sending the authentication request information Verifying;
When authentication result is to be verified, the second identifier information that the described first sub- equipment is sent is obtained;Described second Identification information is used to identify the networked capabilities of the described first sub- equipment;
When being based on the second identifier information and the first identifier information, determine that the networked capabilities of the described first sub- equipment are big It is the configuration information of the described first sub- equipment by current configuration information update, and described in notice when the networked capabilities of itself First sub- device configuration is new main equipment.
2. network-building method as described in claim 1, which is characterized in that it is described when receiving authentication request information, it is right The the first sub- equipment for sending the authentication request information carries out authentication, comprising:
Obtain the first validation value that the described first sub- equipment is sent;First validation value is generated by the described first sub- equipment;
The second validation value, token and first validation value based on generation generate the first encryption information;
First encryption information and second validation value are sent to the described first sub- equipment;Second validation value is used The second encryption of second validation value, the token and first validation value generation is based in triggering the first sub- equipment Information, and when first encryption information is identical as second encryption information, return to second encryption information;
Obtain second encryption information that the described first sub- equipment is sent;When first encryption information and second encryption When information is identical, determine that authentication result is to be verified;When first encryption information and second encryption information not Meanwhile determining that authentication result does not pass through for verifying.
3. network-building method as described in claim 1, which is characterized in that further include:
When being based on the second identifier information and the first identifier information, determine that the networked capabilities of the described first sub- equipment are small When itself networked capabilities, keep current configuration information constant.
4. network-building method as described in claim 1, which is characterized in that described when based on the second identifier information and described Current when determining that the networked capabilities of the described first sub- equipment are greater than the networked capabilities of itself, is matched confidence by first identifier information Breath is updated to the configuration information of the described first sub- equipment, and notifies the described first sub- device configuration to go back before new main equipment Include:
When detecting that networked capabilities remain unchanged in predetermined period, the second identifier information of the first sub- equipment is obtained.
5. such as the described in any item network-building methods of Claims 1-4, which is characterized in that described to believe when based on the second identifier Breath and the first identifier information will be worked as when determining that the networked capabilities of the described first sub- equipment are greater than the networked capabilities of itself Preceding configuration information update is the configuration information of the described first sub- equipment, and notifies that the described first sub- device configuration is that new master sets After standby, further includes:
Obtain the target configuration information of the new main equipment;
It is configured according to the target configuration information.
6. a kind of networking equipment characterized by comprising
Transmission unit, for when detecting that networked capabilities change, to sub- device broadcasts first identifier information;Described first Identification information is used to identify the networked capabilities of itself;The first identifier information is based on described first for triggering the sub- equipment Identification information sends authentication request information;
Authentication unit, for when receiving authentication request information, to sending the first of the authentication request information Sub- equipment carries out authentication;
Acquiring unit, for obtaining the second identifier that the described first sub- equipment is sent when authentication result is to be verified Information;The second identifier information is used to identify the networked capabilities of the described first sub- equipment;
Updating unit, for determining that first son is set when being based on the second identifier information and the first identifier information It is the described first sub- equipment with confidence by current configuration information update when standby networked capabilities are greater than the networked capabilities of itself Breath, and notify that the described first sub- device configuration is new main equipment.
7. networking equipment as claimed in claim 6, which is characterized in that the authentication unit is specifically used for:
Obtain the first validation value that the described first sub- equipment is sent;First validation value is generated by the described first sub- equipment;
The second validation value, token and first validation value based on generation generate the first encryption information;
First encryption information and second validation value are sent to the described first sub- equipment;Second validation value is used The second encryption of second validation value, the token and first validation value generation is based in triggering the first sub- equipment Information, and when first encryption information is identical as second encryption information, return to second encryption information;
Obtain second encryption information that the described first sub- equipment is sent;When first encryption information and second encryption When information is identical, determine that authentication result is to be verified;When first encryption information and second encryption information not Meanwhile determining that authentication result does not pass through for verifying.
8. networking equipment as claimed in claim 6, which is characterized in that further include:
Identification information obtaining unit, for obtaining described first when detecting that networked capabilities remain unchanged in predetermined period The second identifier information of sub- equipment.
9. a kind of networking equipment, including memory, processor and storage are in the memory and can be on the processor The computer program of operation, which is characterized in that the processor realizes such as claim 1 to 5 when executing the computer program The step of any one the method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In when the computer program is executed by processor the step of any one of such as claim 1 to 5 of realization the method.
CN201910588594.5A 2019-07-02 2019-07-02 Networking method and equipment Active CN110266547B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910588594.5A CN110266547B (en) 2019-07-02 2019-07-02 Networking method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910588594.5A CN110266547B (en) 2019-07-02 2019-07-02 Networking method and equipment

Publications (2)

Publication Number Publication Date
CN110266547A true CN110266547A (en) 2019-09-20
CN110266547B CN110266547B (en) 2022-05-24

Family

ID=67923791

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910588594.5A Active CN110266547B (en) 2019-07-02 2019-07-02 Networking method and equipment

Country Status (1)

Country Link
CN (1) CN110266547B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040114538A1 (en) * 2000-12-27 2004-06-17 Stephane Bouet Device roles and piconet connections
CN101114901A (en) * 2006-07-26 2008-01-30 联想(北京)有限公司 Safety authentication system, apparatus and method for non-contact type wireless data transmission
CN101145895A (en) * 2007-09-20 2008-03-19 中兴通讯股份有限公司 Master/slave device switching method
CN101394306A (en) * 2008-07-08 2009-03-25 国电南瑞科技股份有限公司 Seamless switching method for dual server system
CN101777158A (en) * 2010-01-13 2010-07-14 北京飞天诚信科技有限公司 Method and system for secure transaction
CN102469093A (en) * 2010-11-19 2012-05-23 中国电信股份有限公司 System and method for controlling networking authorization on networking application
CN102647276A (en) * 2011-02-17 2012-08-22 英飞凌科技股份有限公司 Systems and methods for device and data authentication
US20160205098A1 (en) * 2014-06-09 2016-07-14 Beijing Stone Sheild Technology Co., Ltd. Identity verifying method, apparatus and system, and related devices
CN108323241A (en) * 2018-01-25 2018-07-24 深圳市为通博科技有限责任公司 Principal and subordinate's role transforming method, chip and data transmission system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040114538A1 (en) * 2000-12-27 2004-06-17 Stephane Bouet Device roles and piconet connections
CN101114901A (en) * 2006-07-26 2008-01-30 联想(北京)有限公司 Safety authentication system, apparatus and method for non-contact type wireless data transmission
CN101145895A (en) * 2007-09-20 2008-03-19 中兴通讯股份有限公司 Master/slave device switching method
CN101394306A (en) * 2008-07-08 2009-03-25 国电南瑞科技股份有限公司 Seamless switching method for dual server system
CN101777158A (en) * 2010-01-13 2010-07-14 北京飞天诚信科技有限公司 Method and system for secure transaction
CN102469093A (en) * 2010-11-19 2012-05-23 中国电信股份有限公司 System and method for controlling networking authorization on networking application
CN102647276A (en) * 2011-02-17 2012-08-22 英飞凌科技股份有限公司 Systems and methods for device and data authentication
US20160205098A1 (en) * 2014-06-09 2016-07-14 Beijing Stone Sheild Technology Co., Ltd. Identity verifying method, apparatus and system, and related devices
CN108323241A (en) * 2018-01-25 2018-07-24 深圳市为通博科技有限责任公司 Principal and subordinate's role transforming method, chip and data transmission system

Also Published As

Publication number Publication date
CN110266547B (en) 2022-05-24

Similar Documents

Publication Publication Date Title
US11706102B2 (en) Dynamically deployable self configuring distributed network management system
CN110351385B (en) Home gateway system and data forwarding method
CN110072236A (en) Equipment connection method, equipment and system
CN104348903A (en) Communication system for establishing P2P connections and the corresponding devices
CN112671763B (en) Data synchronization method and device in networking environment, computer equipment and storage medium
CN106535187A (en) Smart home equipment access method and system based on wireless router terminal
CN113595791B (en) Equipment network distribution method and device, electronic equipment and computer readable medium
CA2357444A1 (en) System and methods for automatic negotiation in distributed computing
CN113365227A (en) WI-SUN network system, and network access method, device and equipment based on WI-SUN network system
WO2019196451A1 (en) Networking method and device for wireless vrv system
CN107302428B (en) Method for negotiating cipher algorithm of data transmission service in power distribution network
JP2006261827A (en) Network apparatus, management apparatus thereof, network connection method, and network connection management method thereof
CN105099837A (en) Wired general medium networking technology networking method and apparatus for home network
CN104253702B (en) A kind of terminal management method and system
CN109600265B (en) Access circuit AC configuration information issuing method, device and server
CN110266547A (en) A kind of network-building method and equipment
WO2010124571A1 (en) Node information acquirement method, client, and server
CN108183925B (en) IoT-based narrowband communication method
CN107995125B (en) Traffic scheduling method and device
CN113098737B (en) User node admission control method and device and electronic equipment
CN115001863A (en) Network security vulnerability detection method, device, medium and electronic equipment
CN104902497B (en) A kind of method and device of managing mobile phone hot spot connection
CN104219072B (en) A kind of restoration methods and device of safety governor SC
CN112087745A (en) Network distribution method and device of household appliance, electronic device and storage medium
TWI836734B (en) Software-defined network controller-based automatic management system, method, and computer-readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant