CN110601886B - Method and device for configuring master and slave ends of network bridge based on terminal and readable storage medium - Google Patents

Method and device for configuring master and slave ends of network bridge based on terminal and readable storage medium Download PDF

Info

Publication number
CN110601886B
CN110601886B CN201910840721.6A CN201910840721A CN110601886B CN 110601886 B CN110601886 B CN 110601886B CN 201910840721 A CN201910840721 A CN 201910840721A CN 110601886 B CN110601886 B CN 110601886B
Authority
CN
China
Prior art keywords
configuration
slave
master
terminal
page
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910840721.6A
Other languages
Chinese (zh)
Other versions
CN110601886A (en
Inventor
冯伟
李文聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Fengrunda Technology Co ltd
Original Assignee
Shenzhen Fengrunda Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Fengrunda Technology Co ltd filed Critical Shenzhen Fengrunda Technology Co ltd
Priority to CN201910840721.6A priority Critical patent/CN110601886B/en
Publication of CN110601886A publication Critical patent/CN110601886A/en
Application granted granted Critical
Publication of CN110601886B publication Critical patent/CN110601886B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4604LAN interconnection over a backbone network, e.g. Internet, Frame Relay
    • H04L12/462LAN interconnection over a bridge based backbone

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a method for configuring a master-slave end of a network bridge based on a terminal, which comprises the following steps: when a login request is detected, user information corresponding to the login request is obtained; confirming the configuration authority of the user information, and displaying a corresponding configuration page according to the configuration authority, wherein the configuration page is divided into a master mode page and a slave mode page according to the configuration authority; and acquiring configuration information filled based on the configuration page, and creating corresponding configuration content according to the configuration information. The invention also discloses a device for configuring the master and slave ends of the network bridge based on the terminal and a readable storage medium. The invention is connected to the configuration page through the special user account, so as to submit the configuration information of the master-slave end corresponding to the content to be configured by the configuration page, and the beneficial effect of improving the safety of the network bridge configuration is realized by applying the special user account and the configuration to realize the network bridge configuration.

Description

Method and device for configuring master and slave ends of network bridge based on terminal and readable storage medium
Technical Field
The present invention relates to the field of network bridge configuration, and in particular, to a method and an apparatus for configuring a master/slave end of a network bridge based on a terminal, and a readable storage medium.
Background
In the bridge configuration step in the prior art, the two-dimensional code sent by the bridge is generally scanned and then enters the configuration page to perform the bridge configuration operation, so that the security is not very high, the two-dimensional code can be scanned for configuration as long as the configuration two-dimensional code is known, and the configuration mode causes semi-public operation of bridge configuration application, and the security problem of the bridge configuration is easily influenced.
The above is only for the purpose of assisting understanding of the technical aspects of the present invention, and does not represent an admission that the above is prior art.
Disclosure of Invention
The invention mainly aims to provide a terminal-based bridge master-slave configuration method, a terminal-based bridge master-slave configuration device and a readable storage medium, and aims to solve the technical problem that the operation of a two-dimension code scanning configuration bridge in the prior art causes semi-public operation of bridge configuration application and affects the safety of bridge configuration.
In order to achieve the above object, the present invention provides a method for configuring a master/slave end of a network bridge based on a terminal, which comprises the following steps:
when a login request is detected, user information corresponding to the login request is obtained;
confirming the configuration authority of the user information, and displaying a corresponding configuration page according to the configuration authority, wherein the configuration page is divided into a master mode page and a slave mode page according to the configuration authority;
and acquiring configuration information filled based on the configuration page, and creating corresponding configuration content according to the configuration information.
Optionally, before the step of acquiring the user information corresponding to the login request when the login request is detected, the method further includes:
receiving a connection request initiated by a configuration terminal;
and creating a configuration management connection according to the connection request so that the configuration terminal initiates a login request according to the configuration management connection.
Optionally, the step of confirming the configuration authority of the user information and displaying a corresponding configuration page according to the configuration authority further includes:
acquiring a configured bridge channel;
and displaying a corresponding configuration page according to the network bridge channel and the configuration authority of the user information.
Optionally, the step of acquiring the configuration information filled based on the configuration page and creating corresponding configuration content according to the configuration information further includes:
confirming whether the acquired configuration information meets preset configuration conditions;
and when the configuration information is confirmed to meet the preset configuration condition, creating corresponding configuration content according to the configuration information.
Optionally, the step of determining whether the acquired configuration information meets a preset configuration condition includes:
reading the IP address in the configuration information and confirming whether the IP address conflicts or not;
and sending out prompt information of IP address conflict when the IP address conflict is confirmed.
Optionally, the method for configuring a master-slave end of a terminal-based network bridge further includes:
creating a configuration management page based on a master-slave end of a network bridge;
and setting corresponding preset configuration conditions according to the master-slave end configuration management page.
Optionally, the method for configuring a master-slave end of a terminal-based network bridge further includes:
and establishing a configuration management connection gateway based on the network bridge master-slave end configuration management page.
In addition, in order to achieve the above object, the present invention further provides a terminal-based bridge master-slave configuration apparatus, where the terminal-based bridge master-slave configuration apparatus includes: a memory, a processor, said memory having stored thereon a computer program capable of being invoked by the processor, said computer program, when executed by said processor, implementing the steps of the method for master-slave configuration of a terminal-based network bridge as described above.
The invention also provides a readable storage medium, wherein the readable storage medium stores a terminal-based bridge master-slave configuration program, and the terminal-based bridge master-slave configuration program realizes the steps of the terminal-based bridge master-slave configuration method when being executed by a processor.
The embodiment of the invention provides a network bridge master-slave terminal configuration method based on a terminal, which comprises the steps of obtaining user information corresponding to a login request when the login request is detected; confirming the configuration authority of the user information, and displaying a corresponding configuration page according to the configuration authority, wherein the configuration page is divided into a master mode page and a slave mode page according to the configuration authority; and acquiring configuration information filled based on the configuration page, and creating corresponding configuration content according to the configuration information. The invention is connected to the configuration page through the special user account, so as to submit the configuration information of the master-slave end corresponding to the content to be configured by the configuration page, and the beneficial effect of improving the safety of the network bridge configuration is realized by applying the special user account and the configuration to realize the network bridge configuration.
Drawings
FIG. 1 is a schematic diagram of a terminal \ device structure of a hardware operating environment according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a first embodiment of a method for configuring a master/slave end of a terminal-based network bridge according to the present invention;
FIG. 3 is a flowchart illustrating a second embodiment of a method for configuring a master/slave end of a terminal-based bridge according to the present invention;
FIG. 4 is a configuration page for the master mode;
FIG. 5 is a configuration page for the slave mode.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The main solution of the embodiment of the invention is as follows: when a login request is detected, user information corresponding to the login request is obtained; confirming the configuration authority of the user information, and displaying a corresponding configuration page according to the configuration authority, wherein the configuration page is divided into a master mode page and a slave mode page according to the configuration authority; and acquiring configuration information filled based on the configuration page, and creating corresponding configuration content according to the configuration information.
The operation of the two-dimension code scanning configuration bridge in the prior art causes semi-public operation of bridge configuration application, and the technical problem of influencing the safety problem of bridge configuration is solved.
The invention provides a solution, which is characterized in that a special user account is connected to a configuration page to submit the configuration information of a master end and a slave end corresponding to the content to be configured by the configuration page, and the special user account and the configuration are applied to realize the network bridge configuration, thereby realizing the beneficial effect of improving the security of the network bridge configuration.
As shown in fig. 1, fig. 1 is a schematic terminal structure diagram of a hardware operating environment according to an embodiment of the present invention.
The terminal of the embodiment of the invention can be a PC terminal, and can also be a mobile/non-mobile terminal device such as a smart phone, a tablet computer, an electronic book reader, a portable computer and the like.
As shown in fig. 1, the terminal may include: a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, a communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the terminal structure shown in fig. 1 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, memory 1005, which is one type of computer storage medium, may include an operating system, a network communication module, a user interface module, and a terminal-based bridge master-slave configuration program.
In the terminal shown in fig. 1, the network interface 1004 is mainly used for connecting to a backend server and performing data communication with the backend server; the user interface 1003 is mainly used for connecting a client (user side) and performing data communication with the client; and processor 1001 may be configured to invoke a terminal-based bridge master-slave configuration program stored in memory 1005 and perform the following operations:
when a login request is detected, user information corresponding to the login request is obtained;
confirming the configuration authority of the user information, and displaying a corresponding configuration page according to the configuration authority, wherein the configuration page is divided into a master mode page and a slave mode page according to the configuration authority;
and acquiring configuration information filled based on the configuration page, and creating corresponding configuration content according to the configuration information.
Further, processor 1001 may invoke a terminal-based bridge master-slave configuration program stored in memory 1005 to also perform the following operations:
receiving a connection request initiated by a configuration terminal;
and creating a configuration management connection according to the connection request so that the configuration terminal initiates a login request according to the configuration management connection.
Further, processor 1001 may invoke a terminal-based bridge master-slave configuration program stored in memory 1005 to also perform the following operations:
acquiring a configured bridge channel;
and displaying a corresponding configuration page according to the network bridge channel and the configuration authority of the user information.
Further, processor 1001 may invoke a terminal-based bridge master-slave configuration program stored in memory 1005 to also perform the following operations:
confirming whether the acquired configuration information meets preset configuration conditions;
and when the configuration information is confirmed to meet the preset configuration condition, creating corresponding configuration content according to the configuration information.
Further, processor 1001 may invoke a terminal-based bridge master-slave configuration program stored in memory 1005 to also perform the following operations:
reading the IP address in the configuration information and confirming whether the IP address conflicts or not;
and sending out prompt information of IP address conflict when the IP address conflict is confirmed.
Further, processor 1001 may invoke a terminal-based bridge master-slave configuration program stored in memory 1005 to also perform the following operations:
creating a configuration management page based on a master-slave end of a network bridge;
and setting corresponding preset configuration conditions according to the master-slave end configuration management page.
Further, processor 1001 may invoke a terminal-based bridge master-slave configuration program stored in memory 1005 to also perform the following operations:
and newly building a configuration management connection gateway based on the network bridge master-slave end configuration management page.
Referring to fig. 2, fig. 2 is a schematic flowchart of a first embodiment of a terminal-based bridge master-slave configuration method according to the present invention, where the terminal-based bridge master-slave configuration method includes:
step S10, when a login request is detected, user information corresponding to the login request is obtained;
a configuration terminal user initiates a configuration login request based on current network bridge configuration requirements, wherein the configuration terminal comprises but is not limited to functional application equipment such as a smart phone and a notebook computer. In this way, when the login request is detected, the user information corresponding to the login request is obtained, wherein the user information is the configuration authority for verifying the user, and therefore, the user information corresponding to the login request is obtained based on the current login request.
As described above, the method for configuring a network bridge by a configuration terminal user initiating a configuration login request based on a current network bridge configuration requirement to implement a network bridge configuration operation, that is, before the step of acquiring user information corresponding to the login request when the login request is detected, further includes:
receiving a connection request initiated by a configuration terminal;
and creating a configuration management connection according to the connection request so that the configuration terminal initiates a login request according to the configuration management connection.
The method comprises the steps of receiving a connection request initiated by a configuration terminal, wherein the configuration terminal is an intelligent terminal with a network connection function, and initiating the connection request to a configuration server based on the current user configuration requirement. In this way, according to the received connection request initiated by the configuration terminal, the configuration management connection relationship with the configuration terminal is created, so that the configuration terminal initiates a login request based on the configuration connection relationship so as to log in the related configuration page to perform the bridge configuration operation. In the embodiment of the present invention, the configuration management connection is a private network connection with security, only an intelligent device with configuration requirements initiates the connection request, and creates a configuration management connection with the configuration terminal when verifying that the configuration terminal has configuration authority, so that the configuration terminal performs a bridge configuration operation according to the configuration management connection login configuration page.
Step S20, confirming the configuration authority of the user information, and displaying a corresponding configuration page according to the configuration authority, wherein the configuration page is divided into a master mode page and a slave mode page according to the configuration authority;
and confirming user information corresponding to the login request according to the currently detected login request. And confirming the configuration authority of the user information, wherein the configuration authority of the user information needs to be verified by reading the information content of the user information, and when the information content of the user information is read, the configuration authority of the user information needs to be searched in a preset user authority registration area. And displaying a configuration page corresponding to the user information configuration authority for the user based on the login request according to the configuration authority of the user information. In practical application, when the current configuration pages are distinguished by the configuration authority, the configuration pages are divided into a master mode page and a slave mode page. In addition, after a user initiates a login request and establishes a configuration management connection based on the login request, a currently configured bridge channel needs to be selected. The step of displaying the corresponding configuration page based on the bridge channel, namely the step of confirming the configuration authority of the user information, and displaying the corresponding configuration page according to the configuration authority, further comprises:
acquiring a configured bridge channel;
and displaying a corresponding configuration page according to the network bridge channel and the configuration authority of the user information.
Based on the current login operation, the content of the network bridge channel selected by the user is obtained after the user logs in, and in practical application, the network bridge channel is a gateway application of a channel based on the current user configuration network bridge active end operation, so that the network application in the configuration process is enhanced, and the influence of signal interference caused by other channels on the current network bridge configuration operation is avoided. And displaying a configuration page corresponding to the configuration authority based on the user information by the network bridge channel according to the acquired configured network bridge channel.
Step S30, obtaining the configuration information filled based on the configuration page, and creating corresponding configuration content according to the configuration information.
And displaying a corresponding configuration page for the login user according to the login operation of the current user. And acquiring configuration information filled by the user based on the configuration page. The configuration information is set based on the page content of the configuration page, and in practical application, the configuration page is divided into a master mode page and a slave mode page according to the configuration authority, so that the acquired configuration information also comprises the master mode configuration information and the slave mode configuration information. In the embodiment of the present invention, the configuration parameters of the master mode configuration information may be referred to in fig. 4, where fig. 4 is a configuration page of the master mode; from the configuration parameters of the mode configuration information, see fig. 5, fig. 5 is a configuration page of the slave mode. According to the configuration information filled in the current configuration page, configuration content corresponding to the configuration information is created, in practical application, the corresponding configuration content created based on the configuration information is a private network space based on the current WiFi network, the information includes but is not limited to SSID, wireless password and the like, and the information content is configuration parameters provided based on the current configuration authority. As shown in fig. 4 and fig. 5, the configuration parameters of the main mode page include SSID, wireless password, maximum number of users, IP address, distance setting, and contents of the bridge mode, that is, in the main mode page, the user is allowed to freely set private network parameters such as SSID and wireless password; the existing SSID is required to be searched from the mode page for parameter configuration of the private network, and related network parameters are configured in the searched private network. Thus, when the current configuration page is determined to be the main configuration page based on the current configuration page, it is required to verify whether the configuration information submitted by the main configuration page meets the preset configuration condition, that is, the step of acquiring the configuration information filled based on the configuration page and creating the corresponding configuration content according to the configuration information further includes:
confirming whether the acquired configuration information meets preset configuration conditions;
and when the configuration information is confirmed to meet the preset configuration condition, creating corresponding configuration content according to the configuration information.
The method comprises the steps of obtaining configuration information filled in a current configuration page, and confirming whether the configuration information meets a preset configuration condition, wherein the preset configuration condition is a preset configuration content filling standard based on the current configuration page. The preset configuration conditions may be classified as master mode configuration conditions or slave mode configuration conditions, and specifically, the configuration conditions are related to configuration parameters of the configuration page, including but not limited to highest user restrictions, and the most important of which is that it is also necessary to verify whether an IP address filled in the master mode configuration page is remapped, that is, the step of confirming whether the acquired configuration information meets the preset configuration conditions includes:
reading the IP address in the configuration information and confirming whether the IP address conflicts or not;
and sending out prompt information of IP address conflict when the IP address conflict is confirmed.
And reading an IP address based on the configuration information according to the currently acquired configuration information, wherein the IP address is based on a currently set private network application terminal address, and the registered IP addresses cannot conflict in order to avoid network application errors. Therefore, when the IP address is confirmed to exist in the configuration information, whether the IP address conflicts or not is confirmed. The confirmation method for confirming whether the IP address conflicts is an IP address verification method based on the prior art, which is not described herein, and when confirming that the IP address conflicts, prompt information of the IP address conflicts is output in a preset format, so that a current configuration user modifies a registered IP address according to the prompt information.
In this embodiment, the special user account is connected to the configuration page to submit the configuration information of the master client and the slave client corresponding to the content to be configured through the configuration page, and the bridge configuration is realized by applying the special user account and the configuration, so that the beneficial effect of improving the security of the bridge configuration is realized.
Referring to fig. 3, fig. 3 is a flowchart illustrating a second embodiment of the terminal-based bridge master-slave configuration method according to the present invention, and based on the first embodiment shown in fig. 2, the terminal-based bridge master-slave configuration method further includes:
step S40, creating a configuration management page based on the master-slave end of the network bridge;
and step S50, setting corresponding preset configuration conditions according to the master-slave configuration management page.
And step S60, creating a configuration management connection gateway based on the bridge master-slave side configuration management page.
In this embodiment, a bridge master-slave configuration management page based on the current bridge master-slave configuration requirement is created, and in addition, based on the created bridge master-slave configuration management page, configuration parameters are set for the bridge master-slave configuration management page respectively according to configuration permissions of a master mode and a slave mode, and further, corresponding preset configuration conditions are set based on the configuration parameters for verifying the configuration parameters. And according to the created configuration management page of the master and slave ends of the network bridge, creating a configuration management connection gateway based on the configuration page of the master and slave ends of the network bridge. In practical application, in order to improve the security and privacy of the bridge master-slave end configuration management, the configuration management connection gateway is a private gateway, and therefore, the network connection of the configuration management connection gateway is the configuration management connection established based on the login private bridge configuration page. Therefore, a corresponding private configuration page and configuration connection are created based on the current configuration requirement of the master and slave ends of the network bridge, and the beneficial effect of improving the configuration security of the master and slave ends of the network bridge is achieved.
In addition, an embodiment of the present invention further provides a readable storage medium, where a terminal-based bridge master-slave configuration program is stored on the readable storage medium, and when executed by a processor, the terminal-based bridge master-slave configuration program implements the following operations:
when a login request is detected, user information corresponding to the login request is obtained;
confirming the configuration authority of the user information, and displaying a corresponding configuration page according to the configuration authority, wherein the configuration page is divided into a master mode page and a slave mode page according to the configuration authority;
and acquiring configuration information filled based on the configuration page, and creating corresponding configuration content according to the configuration information.
Further, the terminal-based bridge master-slave configuration program when executed by the processor further performs the following operations:
receiving a connection request initiated by a configuration terminal;
and creating a configuration management connection according to the connection request so that the configuration terminal initiates a login request according to the configuration management connection.
Further, the terminal-based bridge master-slave configuration program when executed by the processor further performs the following operations:
acquiring a configured bridge channel;
and displaying a corresponding configuration page according to the network bridge channel and the configuration authority of the user information.
Further, the terminal-based bridge master-slave configuration program when executed by the processor further performs the following operations:
confirming whether the acquired configuration information meets preset configuration conditions;
and when the configuration information is confirmed to meet the preset configuration condition, creating corresponding configuration content according to the configuration information.
Further, the terminal-based bridge master-slave configuration program when executed by the processor further performs the following operations:
reading the IP address in the configuration information and confirming whether the IP address conflicts or not;
and sending out prompt information of IP address conflict when the IP address conflict is confirmed.
Further, the terminal-based bridge master-slave configuration program when executed by the processor further performs the following operations:
creating a configuration management page based on a network bridge master-slave end;
and setting corresponding preset configuration conditions according to the master-slave end configuration management page.
Further, the terminal-based bridge master-slave configuration program when executed by the processor further performs the following operations:
and newly building a configuration management connection gateway based on the network bridge master-slave end configuration management page.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (8)

1. A terminal-based bridge master-slave configuration method is characterized in that the terminal-based bridge master-slave configuration method comprises the following steps:
when a login request is detected, user information corresponding to the login request is obtained;
confirming the configuration authority of the user information, and displaying a corresponding configuration page according to the configuration authority, wherein the configuration page is divided into a master mode page and a slave mode page according to the configuration authority, the master page can set private network parameters by self, and the slave page carries out configuration network parameter modification operation by searching the set private network parameters;
acquiring configuration information filled based on the configuration page, and confirming whether the acquired configuration information meets preset configuration conditions or not;
and when the configuration information is confirmed to meet the preset configuration condition, creating corresponding configuration content according to the configuration information, wherein the configuration condition comprises a master mode configuration condition and a slave mode configuration condition, and the configuration condition is related to the configuration parameters of the configuration page.
2. The method for configuring a master-slave end of a terminal-based network bridge according to claim 1, wherein before the step of obtaining the user information corresponding to the login request when the login request is detected, the method further comprises:
receiving a connection request initiated by a configuration terminal;
and creating a configuration management connection according to the connection request so that the configuration terminal initiates a login request according to the configuration management connection.
3. The terminal-based bridge master-slave configuration method of claim 1, wherein the step of confirming the configuration authority of the user information and displaying the corresponding configuration page according to the configuration authority further comprises:
acquiring a configured bridge channel;
and displaying a corresponding configuration page according to the network bridge channel and the configuration authority of the user information.
4. The terminal-based bridge master-slave configuration method of claim 1, wherein the step of confirming whether the acquired configuration information satisfies a preset configuration condition comprises:
reading the IP address in the configuration information and confirming whether the IP address conflicts or not;
and sending out prompt information of IP address conflict when the IP address conflict is confirmed.
5. The method for terminal-based bridge master-slave configuration according to any of claims 1 to 4, wherein said method for terminal-based bridge master-slave configuration further comprises:
creating a configuration management page based on a master-slave end of a network bridge;
and setting corresponding preset configuration conditions according to the master-slave end configuration management page.
6. The terminal-based bridge master-slave configuration method of claim 5, wherein said terminal-based bridge master-slave configuration method further comprises:
and newly building a configuration management connection gateway based on the network bridge master-slave end configuration management page.
7. A terminal-based bridge master-slave configuration device, the terminal-based bridge master-slave configuration device comprising: memory, processor, said memory having stored thereon a computer program capable of being invoked by the processor, said computer program, when executed by the processor, implementing the steps of the terminal-based bridge master-slave configuration method according to any of claims 1 to 6.
8. A readable storage medium having stored thereon a terminal-based bridge master-slave configuration program, which when executed by a processor implements the steps of the terminal-based bridge master-slave configuration method of any one of claims 1 to 6.
CN201910840721.6A 2019-09-02 2019-09-02 Method and device for configuring master and slave ends of network bridge based on terminal and readable storage medium Active CN110601886B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910840721.6A CN110601886B (en) 2019-09-02 2019-09-02 Method and device for configuring master and slave ends of network bridge based on terminal and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910840721.6A CN110601886B (en) 2019-09-02 2019-09-02 Method and device for configuring master and slave ends of network bridge based on terminal and readable storage medium

Publications (2)

Publication Number Publication Date
CN110601886A CN110601886A (en) 2019-12-20
CN110601886B true CN110601886B (en) 2022-06-21

Family

ID=68857867

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910840721.6A Active CN110601886B (en) 2019-09-02 2019-09-02 Method and device for configuring master and slave ends of network bridge based on terminal and readable storage medium

Country Status (1)

Country Link
CN (1) CN110601886B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111064747B (en) * 2019-12-30 2022-07-08 奇安信科技集团股份有限公司 Information processing method and system, server, electronic device, medium, and product

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102427610A (en) * 2011-12-29 2012-04-25 陈佳阳 Wireless router with built-in user management function, system and networking method thereof
CN102930226A (en) * 2012-10-25 2013-02-13 无锡中科泛在信息技术研发中心有限公司 Method for controlling use permission of fine-grained client
US9380264B1 (en) * 2015-02-16 2016-06-28 Siva Prasad Vakalapudi System and method for video communication
CN107466056A (en) * 2017-07-14 2017-12-12 武汉集客科技有限公司 Wireless bridge and its matching method
CN107729097A (en) * 2017-09-20 2018-02-23 五八有限公司 Displayed page collocation method and relevant device
CN109784033A (en) * 2018-12-13 2019-05-21 平安科技(深圳)有限公司 Operating right Dynamic Configuration and relevant device based on page menus

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102427610A (en) * 2011-12-29 2012-04-25 陈佳阳 Wireless router with built-in user management function, system and networking method thereof
CN102930226A (en) * 2012-10-25 2013-02-13 无锡中科泛在信息技术研发中心有限公司 Method for controlling use permission of fine-grained client
US9380264B1 (en) * 2015-02-16 2016-06-28 Siva Prasad Vakalapudi System and method for video communication
CN107466056A (en) * 2017-07-14 2017-12-12 武汉集客科技有限公司 Wireless bridge and its matching method
CN107729097A (en) * 2017-09-20 2018-02-23 五八有限公司 Displayed page collocation method and relevant device
CN109784033A (en) * 2018-12-13 2019-05-21 平安科技(深圳)有限公司 Operating right Dynamic Configuration and relevant device based on page menus

Also Published As

Publication number Publication date
CN110601886A (en) 2019-12-20

Similar Documents

Publication Publication Date Title
US10623954B2 (en) AP connection method, terminal, and server
US10652405B2 (en) Electronic apparatus, information processing apparatus, and communication system
EP3203709B1 (en) Cloud service server and method for managing cloud service server
US9794252B2 (en) Information processing system and device control method
US10764304B2 (en) User location check method, controlled device access method, controlled device, and user terminal
CN104468531A (en) Authorization method, device and system for sensitive data
CN110784450A (en) Single sign-on method and device based on browser
CN104123108A (en) Communication apparatus and communication apparatus control method
CN108810896B (en) Connection authentication method and device of wireless access point
WO2016025756A1 (en) Form filling method and related terminal
US10103948B1 (en) Computing devices for sending and receiving configuration information
CN104363226A (en) Method, device and system for logging in operating system
CN103607290A (en) Method and device for setting network connection parameters
CN103747000A (en) Authentication method and authentication device for accessing wireless network
US9690921B2 (en) Processing apparatus and storage medium
US9858400B2 (en) Information processing system, terminal, and authentication method
CN103888408A (en) Method for uploading data to social networking platform and device thereof
CN110909330A (en) Vehicle networking platform authorization method, device, equipment and storage medium
CN110601886B (en) Method and device for configuring master and slave ends of network bridge based on terminal and readable storage medium
CN104079527A (en) Information processing method and electronic equipment
CN107534859B (en) Network authentication method, client, terminal equipment and platform
US9766872B2 (en) Information processing device executing communication processing with external device, and method and system for the same
CN113243097A (en) Device binding method, cloud server and first device
CN110071921B (en) Internet of things platform access method, device, computer readable storage medium and system
CN112702328B (en) Network access method, system and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant