CN110602693B - Networking method and equipment of wireless network - Google Patents

Networking method and equipment of wireless network Download PDF

Info

Publication number
CN110602693B
CN110602693B CN201910857294.2A CN201910857294A CN110602693B CN 110602693 B CN110602693 B CN 110602693B CN 201910857294 A CN201910857294 A CN 201910857294A CN 110602693 B CN110602693 B CN 110602693B
Authority
CN
China
Prior art keywords
information
identification information
auxiliary
main network
networking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910857294.2A
Other languages
Chinese (zh)
Other versions
CN110602693A (en
Inventor
李游
张治梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Gongjin Electronics Co Ltd
Original Assignee
Shenzhen Gongjin Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Gongjin Electronics Co Ltd filed Critical Shenzhen Gongjin Electronics Co Ltd
Priority to CN201910857294.2A priority Critical patent/CN110602693B/en
Publication of CN110602693A publication Critical patent/CN110602693A/en
Application granted granted Critical
Publication of CN110602693B publication Critical patent/CN110602693B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The method is used for carrying out one-to-one interactive matching connection with auxiliary equipment by main network equipment through receiving identification information of the auxiliary equipment, and improving safety and uniqueness by encrypting transmission information during connection, and solves the problem that configuration of adding new downlink network equipment is complex in the networking process of network equipment at present.

Description

Networking method and equipment of wireless network
Technical Field
The present application relates to the field of network communication technologies, and in particular, to a networking method and device for a wireless network.
Background
In a conventional Wireless Local Area Network (WLAN), each client accesses a network through a wireless link connected to an Access Point (AP) to form a local Basic Service Set (BSS). Users must first access a fixed Access Point (AP) if they want to communicate with each other. In a wireless Mesh network (Mesh), any wireless device node can act as both an AP and a router, each node in the network can send and receive signals, and each node can communicate directly with one or more peer nodes. Compared with the traditional switched network, the wireless Mesh network removes the wiring requirement among nodes, still has the redundancy mechanism and the rerouting function provided by the distributed network, and has the problems that rapid expansion is not supported, and a series of complicated configuration problems need to be carried out when a downlink network device is added, for example, a series of configuration is carried out when a network page is logged in.
In summary, the problem of complicated configuration of adding new downlink network devices in network device networking exists at present.
Disclosure of Invention
The embodiment of the application provides a networking method, a networking device, networking equipment and a networking medium of a wireless network, and can solve the problem that the configuration of adding new downlink network equipment is complex in the networking of network equipment at present.
In a first aspect, an embodiment of the present application provides a networking method for a wireless network, which is applied to a master network device, and the method includes:
receiving first identification information; the first identification information is used for identifying the auxiliary equipment;
processing the first identification information according to a first preset rule to obtain first encryption information;
sending the first encrypted information to the auxiliary device; the first encryption information is used for triggering the auxiliary equipment to send feedback information when the first encryption information is verified to meet consistency check;
starting a first connection mode, and if receiving feedback information sent by the auxiliary equipment, establishing connection with the auxiliary equipment according to the feedback information.
In one embodiment, receiving first identification information includes:
receiving the first identification information acquired by a first terminal;
detecting whether the first identification information is legal information;
if the first identification information is legal information, the first identification information is accepted;
and if the first identification information is illegal information, sending first reminding information to a first terminal interface for displaying.
In an embodiment, processing the first identification information according to a first preset rule to obtain first encrypted information includes:
analyzing the first identification information to obtain first field information;
and encrypting and writing the first field information into preset transmission information to obtain the first encrypted information.
In one embodiment, the feedback information includes second identification information and matching information;
enabling a first connection mode, and if feedback information sent by the auxiliary equipment is received, adding and connecting the auxiliary equipment according to the feedback information, wherein the method comprises the following steps:
analyzing the feedback information to obtain the second identification information;
judging whether the second identification information is consistent with preset authentication information or not;
and if the second identification information is consistent with the preset authentication information, establishing connection with the auxiliary equipment according to the matching information.
In an embodiment, after determining whether the second identification information is consistent with preset authentication information, the method further includes:
if the second identification information is inconsistent with the preset authentication information, judging that the networking of the main network equipment and the auxiliary equipment fails;
and sending the second reminding information to the first terminal interface for displaying.
In an embodiment, before receiving the first identification information acquired by the first terminal from the auxiliary device, the method further includes:
carrying out initialization operation;
when the first encryption information is sent to the auxiliary equipment, the networking state is set to be matched;
setting the networking state as successfully matched after establishing connection with the auxiliary equipment according to the matching information;
setting the networking state as a matching failure after judging that the networking of the main network equipment and the auxiliary equipment fails;
and generating a state record file of the networking state.
In a second aspect, an embodiment of the present application further provides a networking device for a wireless network, where the device includes:
the first receiving module is used for receiving the first identification information; the first identification information is used for identifying the auxiliary equipment.
And the first encryption module is used for processing the first identification information according to a first preset rule to obtain first encryption information.
A first sending module, configured to send the first encrypted information to the auxiliary device; the first encryption information is used for triggering the auxiliary equipment to send feedback information when the first encryption information is verified to meet consistency check.
And the first connection module is used for starting a first connection mode, and if feedback information sent by the auxiliary equipment is received, establishing connection with the auxiliary equipment according to the feedback information.
In a third aspect, an embodiment of the present application further provides a terminal device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor, when executing the computer program, implements the method according to any one of the preceding claims.
In a third aspect, the present application further provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the method according to any one of the preceding claims.
In a fifth aspect, the present application provides a computer program product, which when executed on a mobile terminal, enables the mobile terminal to implement the steps in the networking method embodiment that can implement the wireless network.
In a sixth aspect, an embodiment of the present application provides another networking method for a wireless network, which is applied to an auxiliary device, and the method includes:
receiving first encryption information;
analyzing the first encryption information to obtain first identification information;
if the first identification information is consistent with the third identification information, starting a second preset mode, and sending feedback information to the main network equipment; the third identification information is preset identification information inside the auxiliary equipment; the feedback information is used to establish a connection with the primary network device.
In an embodiment, the feedback information includes second identification information and matching information;
if the first identification information is consistent with the third identification information, enabling a second preset mode, and sending feedback information to the main network device, wherein the feedback information comprises:
writing the second identification information and the matching information into the feedback information;
establishing connection with the main network equipment according to the matching information; and the matching information is used for triggering the auxiliary equipment, and connection is established when the second identification information is matched with preset authentication information in the main network equipment.
In a seventh aspect, the present application further provides a networking device for another wireless network, the device comprising:
and the second receiving module is used for receiving the first encrypted information.
And the analysis module is used for analyzing the first encryption information to obtain first identification information.
The second connection module is used for enabling a second preset mode and sending feedback information to the main network equipment if the first identification information is consistent with the third identification information; the third identification information is preset identification information inside the auxiliary equipment; the feedback information is used to establish a connection with the primary network device.
In an eighth aspect, an embodiment of the present application further provides a terminal device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor, when executing the computer program, implements the method according to any one of the preceding claims.
In a ninth aspect, this application further provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the method according to any one of the preceding claims.
In a tenth aspect, an embodiment of the present application provides a computer program product, which when running on a mobile terminal, enables the mobile terminal to implement the steps in the networking method embodiment that can implement the wireless network.
It is to be understood that, for the beneficial effects of the second aspect to the fifth aspect, reference may be made to the relevant description in the first aspect, and for the beneficial effects of the seventh aspect to the tenth aspect, reference may be made to the relevant description in the fourth aspect, which is not described herein again.
Compared with the prior art, the embodiment of the application has the advantages that: the main network equipment receives the identification information of the auxiliary equipment, performs one-to-one interactive matching connection with the auxiliary equipment, and transmits information by encryption during connection, so that the safety and uniqueness are improved, and the problem that the configuration of adding new downlink network equipment is complex in the networking process of the network equipment at present is solved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings required to be used in the embodiments or the prior art description will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings may be obtained according to these drawings without inventive labor.
Fig. 1 is a schematic flowchart of an implementation of a networking method of a wireless network according to an embodiment of the present application;
fig. 2 is a flowchart illustrating a specific implementation of step S101 of a networking method of a wireless network according to another embodiment of the present application;
fig. 3 is a flowchart illustrating a specific implementation of step S102 of a networking method for a wireless network according to another embodiment of the present application;
fig. 4 is a schematic structural diagram of a networking device of a wireless network according to an embodiment of the present application;
fig. 5 is a schematic diagram of a terminal device provided in an embodiment of the present application;
fig. 6 is a schematic flowchart of another implementation of a networking method of a wireless network according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of another networking device of a wireless network according to an embodiment of the present application;
fig. 8 is a schematic diagram of another terminal device provided in an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
The execution of the process of the application is a main network device, and in a specific application, the mainstream wireless Mesh network (Mesh) networking devices are sold in a set, which can be specifically considered to be sold in a mode of 1+ n. Where 1 denotes a Master network device (Master) and also denotes a management center, and N denotes a plurality of auxiliary devices (Slave devices) and also denotes downlink devices distributed in each area. In the networking method of the wireless Mesh network, the auxiliary device is a Mesh device which is not connected to the network, and the main network device is a Mesh device which is connected to the network. Fig. 1 shows a flowchart of an implementation of a networking method for a wireless network according to an embodiment of the present invention, which is detailed as follows:
s101, receiving first identification information; the first identification information is used for identifying the auxiliary device.
In an application, the first identification information is used for identifying the auxiliary device. Specifically, the first identification information may be a MAC address, a product serial number, and the like of the auxiliary device, and the first identification information is unique identification information for distinguishing the plurality of auxiliary devices. The method for receiving the first identification information may be performed by a third-party device, where the third-party device includes, but is not limited to, a communication terminal, an electronic computer, and the like, and the first identification information is transmitted to the main network device through a carrier, where the carrier includes, but is not limited to, data, language, signal, and the like, and this is not limited thereto.
In an application, the first identification information may specifically be a production serial number of the auxiliary device, and the received production serial number may be received by the primary network device in a form of a character string.
S102, processing the first identification information according to a first preset rule to obtain first encryption information.
In application, the first preset rule includes, but is not limited to, directly encrypting the first identification information to obtain the first encrypted information, and further includes, without limitation, synthesizing the first identification information with other information to obtain the first encrypted information. For example, the other information may be transmission path information through which the first encryption information is transmitted to the specified auxiliary device.
Step S103, sending the first encryption information to the auxiliary equipment; the first encryption information is used for triggering the auxiliary equipment to send feedback information when the first encryption information is verified to meet consistency check.
In application, the main network device and the auxiliary device are connected by a wireless message technology, which is a data unit exchanged and transmitted in a wireless network, that is, a data block to be sent by a station at one time. The wireless message contains the complete data information to be sent, and also contains necessary additional information (including destination IP, destination port, source address, source port, data length, protocol used, encryption, etc.), which is inconsistent in length, unlimited in length, and variable. The wireless message includes, but is not limited to, a wireless broadcast message, a wireless encrypted authentication system (WiFi Protected Setup WPS) message, and the like.
In application, the first encrypted information is a condition for the auxiliary device to send feedback information, when the auxiliary device analyzes the first encrypted information to obtain a character string of the first identification information, the auxiliary device verifies whether the character string is consistent with preset information, and if so, the auxiliary device sends the feedback information. The feedback information is information of pairing connection between the main network device and the auxiliary device, and the auxiliary device sends the feedback information to indicate that pairing connection can be performed with the main network device.
Step S104, starting a first connection mode, and if receiving feedback information sent by the auxiliary equipment, establishing connection with the auxiliary equipment according to the feedback information.
In application, the first connection mode is a wireless connection mode, specifically, a WPS connection mode, and is capable of automatically configuring a network name (SSID) WPS and a Wi-Fi network secure Access (WPA Wi-Fi Protected Access) security key for an Access point and a WPS client device in a network. When connecting the WPS device, the user does not have to know the concepts of SSID and security key, and the security key is randomly generated. The user does not need to input a pre-known password segment or a long hexadecimal character string, information and network certificates are safely exchanged in the air through an Extensible Authentication Protocol (EAP), and the steps that a setting interface is required to be logged in and a safety password is set when downlink network equipment is added at present are reduced.
In this embodiment, the primary network device performs one-to-one interactive matching connection with the auxiliary device by receiving the identification information of the auxiliary device, and transmits information by encryption during the connection, thereby improving security and uniqueness, and solving the problem that it is complicated to add new downlink network devices in the networking process of the network device at present.
Referring to fig. 2, in an embodiment, step S101 includes:
s201, receiving the first identification information acquired by the first terminal.
In application, the first identification information is acquired by the first terminal and is sent to the main network device, and the first terminal can be a terminal which is connected with the main network device, such as a mobile phone, an IPAD, a smart watch and the like. Specifically, first terminal is the cell-phone, its inside has specific APP to operate, it is corresponding, the inside corresponding APP process operation that also has of major network equipment, auxiliary assembly is when leaving the factory, carry sign auxiliary assembly's specific two-dimensional code, the user opens the APP in the cell-phone and scans this specific two-dimensional code, the inside process of APP is analyzed the two-dimensional code and is obtained first identification information, then the cell-phone sends the APP process in this first identification information to the major network equipment through the APP, promptly for receiving first identification information that first terminal acquireed.
S202, detecting whether the first identification information is legal information.
In application, whether the first identification information is legal or not, specifically, whether a specific two-dimensional code detected and scanned by the APP can be analyzed or not needs to be detected, or whether analyzed information is preset information for identifying the auxiliary device or not, that is, whether the first identification information is legal or not is detected. Whether the first identification information is legal through APP detection can be detected for an APP inside the mobile phone or can be detected for an APP process inside the main network device, and therefore limitation is not made.
S203, if the first identification information is legal information, the first identification information is accepted.
In application, the specific two-dimensional code is received by the APP inside the mobile phone in a character string form, and the main network device can receive the character string sent from the mobile phone through the APP process corresponding to the inside of the main network device and acquire the first identification information carried by the main network device.
And S204, if the first identification information is illegal information, sending first reminding information to a first terminal interface for displaying.
In application, the non-legal information is information that cannot be scanned and identified by the mobile phone APP, or that is detected as being not preset information for identifying the auxiliary device, that is, the information is non-legal information, and the first reminding information includes but is not limited to short message reminding, sound reminding or vibration reminding, which is not limited to this.
In this embodiment, the first identification information of the auxiliary device is received through a terminal such as a mobile phone, so that the configuration of the main network device can be reduced, and the effect of accurately adding the auxiliary device can be achieved by scanning the two-dimensional code of the auxiliary device through the APP.
Referring to fig. 3, in an embodiment, step S102 includes:
s301, analyzing the first identification information to obtain first field information.
In the application, after the first identification information is received by the main network device, the main network device parses the first identification information to obtain key information, such as a production serial number, a MAC address, and the like, for identifying the auxiliary device, and the main network device edits the production serial number or the MAC address in a field form to obtain first field information.
S302, encrypting and writing the first field information into preset transmission information to obtain the first encryption information.
In application, the transmission information is a wireless broadcast message transmitted in a wireless manner, specifically, the main network device opens a beacon frame extension field, and uses a preset driving command, for example, when a production serial number of the first field information is obtained by editing, the production serial number is processed by a special encryption algorithm, an encrypted production serial number is obtained, and the encrypted production serial number is written into a vendor field in a beacon (beacon) field in the wireless broadcast message, so that a new wireless broadcast message is obtained, that is, the first encryption information. The driving command is to transmit a key character string (a MAC address or a production serial number) to the WIFI driver in the main network device, encrypt the character string and add the encrypted character string to the beacon frame wireless broadcast frame.
In other applications, this field may also contain unique identification information of other auxiliary devices, such as information in the form of a character string of the MAC address of the auxiliary device, which is not limited.
In other applications, the first encryption information may also be used to initialize the auxiliary device, so as to determine that the auxiliary device needs to be connected to the main network device, in a normal case, the auxiliary device is in a standby state, and after receiving the first encryption information, the auxiliary device is initialized to be in a state to be paired, so as to be paired with the main network device. The aim is to prolong the working time of the auxiliary equipment and reduce unnecessary electric quantity loss.
In an embodiment, the feedback information includes second identification information and matching information; step S104, comprising:
and analyzing the feedback information to obtain the second identification information.
In an application, the feedback information may be a WPS message sent by the auxiliary device, where the WPS message includes the second identification information and the matching information, and for example, after receiving the first encryption information, the auxiliary device writes the second identification information and the matching information into the WPS message in the form of a special character string or field to form the feedback information, and sends the feedback information to the main network device. The second identification information is special information written in the WPS message by the auxiliary device, such as MAC address information, production serial number information, or other special character information of the auxiliary device, which is not limited.
In an application, the matching information may be a matching connection request, where the matching connection request includes a connection password, and the connection password is used for the primary network device to establish a connection with the auxiliary device when the second identification information is consistent with the preset authentication information. The method aims to save the steps that a user needs to log in a setting interface and set a security password in the process of adding the network equipment.
And judging whether the second identification information is consistent with preset authentication information.
In application, the preset authentication information is identification information preset in the main network device, and specifically, MAC address information, production serial number information, or other special character information of the auxiliary device may be stored in advance for the main network device, which is not limited herein. That is, if the second identification information written by the auxiliary device is an MAC address, the main network device needs to resolve the WPS packet to obtain an MAC address that is consistent with an address preset and stored in the main network device, or consistent with the MAC address represented by the received first identification information.
And if the second identification information is consistent with the preset authentication information, establishing connection with the auxiliary equipment according to the matching information.
In the application, the second identification information (MAC address) written by the auxiliary device exists, after the WPS message is analyzed by the main network device to obtain the MAC address, the WPS message is inconsistent with the first identification information (MAC address) obtained by the user through the mobile phone APP scanning two-dimensional code analysis, that is, the user operation is considered to be wrong, or in the process of establishing connection in a matching manner, the WPS message is sent by other auxiliary devices and is received by the main network device, so that the second identification information obtained by the main network device analyzing the feedback information is inconsistent with the information obtained by receiving the two-dimensional code scanned by the mobile phone APP. Therefore, only when the second identification information is consistent with the preset authentication information, the main network device establishes connection with the auxiliary device according to the matching information, otherwise, connection establishment is refused, and the method and the device aim to ensure that the main network device is not interfered by other auxiliary devices and improve the device connection safety.
In an embodiment, after determining whether the second identification information is consistent with preset authentication information, the method further includes:
and if the second identification information is inconsistent with the preset authentication information, judging that the networking of the main network equipment and the auxiliary equipment fails.
And sending the second reminding information to the first terminal interface for display.
The networking failure of the main network device and the auxiliary device includes, but is not limited to, a user operation error, a WPS message received in the process of establishing a connection in a matching manner is sent to other auxiliary devices, a WPS timeout occurs, and information of the main network device or the auxiliary device is abnormal. The second reminding information includes, but is not limited to, a short message reminder, a sound reminder, or a vibration reminder, which is not limited to.
In one embodiment, step S101 is preceded by: an initialization operation is performed.
And setting the networking state to be matched when the first encryption information is sent to the auxiliary equipment.
And setting the networking state as successfully matched after the connection is established with the auxiliary equipment according to the matching information.
And setting the networking state as matching failure after judging that the networking of the main network equipment and the auxiliary equipment fails.
And generating a state record file of the networking state.
In the application, the status record file is recorded after the status changes, and the status record may be stored in the main network device in a table form, where the status record file records information including, but not limited to, the matching, the corresponding time of matching success and matching failure, and is used to record all relevant information from the start of the main network device to the start of establishing connection success or failure of the auxiliary device. The purpose is that a user or a technician can know the connection duration of each stage of the main network device and the auxiliary device according to the corresponding time information, and analyze whether the overtime connection exists or not, so as to achieve the effect of further improvement aiming at the state process.
In the application, after the main network device and the auxiliary device are successfully matched, third reminding information can be sent to the user terminal (a smart phone, a smart band, or the like), and the third reminding information includes but is not limited to short message reminding, sound reminding or vibration reminding, which is not limited to this.
In one embodiment, after step S104, the method includes:
and stopping sending the first encryption information to the auxiliary equipment.
And updating the network node.
In application, after the main network device and the auxiliary device successfully establish connection, the main network device closes a beacon frame expansion field, stops using a preset driving command, writes an encrypted production serial number into a vendor field in a beacon field in a wireless broadcast message, and stops sending generated first encryption information. When the auxiliary device is connected with the main network device, the auxiliary device is one of the network nodes, the updated network node indicates that the connection of the auxiliary device is completed, and the main network device can establish connection with other auxiliary networks, so that the purpose of sequentially adding new network devices is achieved.
Compared with the prior art, the embodiment of the application has the beneficial effects that: the main network equipment receives the identification information of the auxiliary equipment, performs one-to-one interactive matching connection with the auxiliary equipment, and transmits information by encryption during connection, so that the safety and uniqueness are improved, and the problem that the configuration of adding new downlink network equipment is complex in the networking process of the network equipment at present is solved.
Referring to fig. 4, an embodiment of the present application further provides a networking device 100 for a wireless network, where the device includes:
a first receiving module 10, configured to receive first identification information; the first identification information is used for identifying the auxiliary device.
And the first encryption module 20 is configured to process the first identification information according to a first preset rule to obtain first encryption information.
A first sending module 30, configured to send the first encrypted information to the auxiliary device; the first encryption information is used for triggering the auxiliary equipment to send feedback information when the first encryption information is verified to meet consistency check.
The first connection module 40 is configured to enable a first connection mode, and if feedback information sent by the auxiliary device is received, establish a connection with the auxiliary device according to the feedback information.
In an embodiment, the first receiving module 10 is further configured to:
receiving the first identification information acquired by a first terminal;
detecting whether the first identification information is legal information;
if the first identification information is legal information, the first identification information is accepted;
and if the first identification information is illegal information, sending first reminding information to a first terminal interface for display.
In one embodiment, the first encryption module 20 is further configured to:
analyzing the first identification information to obtain first field information;
and encrypting and writing the first field information into preset transmission information to obtain the first encryption information.
In an embodiment, the feedback information includes second identification information and matching information; the first connection module 40 is further configured to:
enabling a first connection mode, and if feedback information sent by the auxiliary equipment is received, adding and connecting the auxiliary equipment according to the feedback information, wherein the method comprises the following steps:
analyzing the feedback information to obtain second identification information;
judging whether the second identification information is consistent with preset authentication information or not;
and if the second identification information is consistent with the preset authentication information, establishing connection with the auxiliary equipment according to the matching information.
In one embodiment, the first connection module 40 is further configured to:
if the second identification information is inconsistent with the preset authentication information, judging that the networking of the main network equipment and the auxiliary equipment fails;
and sending the second reminding information to the first terminal interface for displaying.
In one embodiment, the networking device 100 of the wireless network further comprises: the device comprises an initial module, a matching success module, a matching failure module and a state recording module.
The initialization module is used for carrying out initialization operation.
And the matching module is used for setting the networking state into matching when the first encryption information is sent to the auxiliary equipment.
And the matching success module is used for setting the networking state as matching success after the connection is established with the auxiliary equipment according to the matching information.
And the matching failure module is used for judging that the networking state is set as matching failure after the networking of the main network equipment and the auxiliary equipment fails.
And the state recording module is used for generating a state recording file of the networking state.
In one embodiment, the networking device 100 of the wireless network further comprises:
a first stopping module, configured to stop sending the first encrypted information to the auxiliary device.
The first updating module is used for updating the network node.
Compared with the prior art, the embodiment of the application has the advantages that: the main network equipment receives the identification information of the auxiliary equipment, performs one-to-one interactive matching connection with the auxiliary equipment, and transmits information by encryption during connection, so that the safety and uniqueness are improved, and the problem that the configuration of adding new downlink network equipment is complex in the networking process of the network equipment at present is solved.
An embodiment of the present application further provides a terminal device, where the terminal device includes: at least one processor, a memory, and a computer program stored in the memory and executable on the at least one processor, the processor implementing the steps of any of the various method embodiments described above when executing the computer program.
The embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the steps in the above-mentioned method embodiments.
The embodiments of the present application provide a computer program product, which when running on a mobile terminal, enables the mobile terminal to implement the steps in the above method embodiments when executed.
Fig. 5 is a schematic diagram of a terminal device 80 according to an embodiment of the present application. As shown in fig. 5, the terminal device 80 of this embodiment includes: a processor 803, a memory 801 and a computer program 802 stored in the memory 801 and executable on the processor 803. The processor 803 implements the steps in the various method embodiments described above, such as steps S101 to S104 shown in fig. 1, when executing the computer program 802. Alternatively, the processor 803 realizes the functions of the modules/units in the above-described device embodiments when executing the computer program 802.
Illustratively, the computer program 802 may be partitioned into one or more modules/units that are stored in the memory 801 and executed by the processor 803 to accomplish the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution process of the computer program 802 in the terminal device 80. For example, the computer program 802 may be divided into a first receiving module, a first encryption module, a first sending module and a first connection module, and each module has the following specific functions:
the first receiving module is used for receiving the first identification information; the first identification information is used for identifying the auxiliary device.
And the first encryption module is used for processing the first identification information according to a first preset rule to obtain first encryption information.
A first sending module, configured to send the first encrypted information to the auxiliary device; the first encryption information is used for triggering the auxiliary equipment to send feedback information when the first encryption information is verified to meet consistency check.
And the first connection module is used for starting a first connection mode, and if feedback information sent by the auxiliary equipment is received, establishing connection with the auxiliary equipment according to the feedback information.
The terminal device 80 may be a computing device such as a desktop computer, a notebook, a palm computer, and a cloud server. The terminal device may include, but is not limited to, a processor 803 and a memory 801. Those skilled in the art will appreciate that fig. 5 is merely an example of a terminal device 80 and does not constitute a limitation of terminal device 80 and may include more or fewer components than shown, or some components may be combined, or different components, e.g., the terminal device may also include input-output devices, network access devices, buses, etc.
The Processor 803 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 801 may be an internal storage unit of the terminal device 80, such as a hard disk or a memory of the terminal device 80. The memory 801 may also be an external storage device of the terminal device 80, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, provided on the terminal device 80. In one embodiment, the memory 801 may also include both internal and external memory units of the terminal device 80. The memory 801 is used to store the computer programs and other programs and data required by the terminal device. The memory 801 may also be used to temporarily store data that has been output or is to be output.
Referring to fig. 6, in an embodiment, the present application further provides another networking method for a wireless network, which is applied to an auxiliary device, and includes:
s701, receiving first encryption information;
s702, analyzing the first encrypted information to obtain first identification information;
s703, if the first identification information is consistent with the third identification information, starting a second preset mode, and sending feedback information to the main network device; the third identification information is preset identification information inside the auxiliary equipment; the feedback information is used to establish a connection with the primary network device.
In application, the first encryption information includes, but is not limited to, information formed by adding a special field or a character string to a wireless broadcast message for the main network device, or after establishing a connection with an APP process in the auxiliary device through an APP in the mobile phone, the mobile phone sends the information to the auxiliary device through the APP, which is not limited to this.
In application, the analyzing the first encryption information may be analyzing a character string in the wireless broadcast message to obtain information represented or carried by the character string, which is the first identification information, and the first identification information may be an MAC address or a production serial number in the auxiliary device, which is a unique identification number used for distinguishing different auxiliary devices. The first identification information can be obtained by scanning the two-dimensional code information of the auxiliary equipment through the APP by the mobile phone, and is visual information arranged outside the auxiliary equipment.
In application, the third identification information may be comparison information preset in the auxiliary device when the auxiliary device leaves a factory, that is, the first identification information is set on the auxiliary device in the form of a two-dimensional code carrier, the mobile phone scans the two-dimensional code through the APP and sends related information to the main network device, and then information obtained by analyzing the two-dimensional code is the first identification information. In order to prevent the situation that the first identification information obtained by the main network device through analysis is inconsistent with the third identification information prestored in the auxiliary device after the user scans the two-dimensional code. After the auxiliary equipment verifies that the first identification information is consistent with the third identification information, the auxiliary equipment initializes to be in a to-be-paired state, and the purpose is to prolong the working time of the auxiliary equipment and reduce unnecessary electric quantity loss. The second preset mode may specifically be a mode in which the WPS mechanism is started and the feedback information is written into the WPS packet and sent to the main network device for connection.
In the application, the feedback information includes second identification information and matching information, and the step S703 further includes:
writing the second identification information and the matching information into the feedback information;
establishing connection with the main network equipment according to the matching information; and the matching information is used for triggering the auxiliary equipment, and connection is established when the second identification information is matched with preset authentication information in the main network equipment.
In application, the second identification information may be a MAC address of the auxiliary device, a generated serial number, or other special matching information, which is not limited herein. If the second identification information is the special matching information, for example, 001, the preset authentication information prestored by the main network device is 001, that is, the second identification information is identified to be consistent with the preset authentication information, and if the second identification information is not consistent with the preset authentication information, connection establishment is refused. The method aims to ensure that the main network equipment is not interfered by other auxiliary equipment and improve the equipment connection safety.
In an embodiment, after step S703, the method includes:
stopping receiving the first encrypted information.
For updating the network node.
In application, after the main network device and the auxiliary device successfully establish connection, the auxiliary device closes the beacon frame switch, stops receiving the first encryption information sent by the auxiliary device, and stops analyzing the received first encryption information, so that the device for internal work of the auxiliary device is reduced, and the work loss is reduced. When the auxiliary device is connected with the main network device, the auxiliary device is one of the network nodes, the updated network node indicates that the connection of the auxiliary device is completed, the main network device can establish connection with other auxiliary networks to achieve the purpose of sequentially adding new network devices, and when the main network is connected with other auxiliary devices again, the auxiliary device with the updated network node does not interfere the main network device to establish other connections.
Compared with the prior art, the embodiment of the application has the advantages that: the main network equipment receives the identification information of the auxiliary equipment, performs one-to-one interactive matching connection with the auxiliary equipment, and transmits information by encryption during connection, so that the safety and uniqueness are improved, and the problem that the configuration of adding new downlink network equipment is complex in the networking process of the network equipment at present is solved.
Referring to fig. 7, in one embodiment, the present application further provides a networking apparatus 200 for another wireless network, the apparatus comprising:
and a second receiving module 50, configured to receive the first encrypted information.
And the analyzing module 60 is configured to analyze the first encrypted information to obtain first identification information.
A second connection module 70, configured to enable a second preset mode and send feedback information to the primary network device if the first identification information is consistent with the third identification information; the third identification information is preset identification information inside the auxiliary equipment; the feedback information is used to establish a connection with the primary network device.
In one embodiment, the feedback information includes second identification information and matching information; the second connection module 50 is also configured to:
writing the second identification information and the matching information into the feedback information;
establishing connection with the main network equipment according to the matching information; and the matching information is used for triggering the auxiliary equipment, and connection is established when the second identification information is matched with preset authentication information in the main network equipment.
In one embodiment, the networking device 100 of the wireless network further includes a second stop module and a second update module:
and the second stopping module is used for stopping receiving the first encryption information.
And the second updating module is used for updating the network node.
An embodiment of the present application further provides another terminal device, where the terminal device includes: at least one processor, a memory, and a computer program stored in the memory and executable on the at least one processor, the processor implementing the steps of any of the various method embodiments described above when executing the computer program.
The embodiment of the present application further provides another computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the steps in the above-mentioned method embodiments.
The present application provides another computer program product, which when running on a mobile terminal, enables the mobile terminal to implement the steps in the above method embodiments when executed.
Compared with the prior art, the embodiment of the application has the beneficial effects that: the main network equipment performs one-to-one interactive matching connection with the auxiliary equipment by receiving the identification information of the auxiliary equipment, and information is transmitted by encryption during the connection, so that the safety and the uniqueness are improved, and the problem that the configuration of adding new downlink network equipment is complex in the networking process of the network equipment at present is solved.
Fig. 8 is a schematic diagram of a terminal device 90 according to an embodiment of the present application. As shown in fig. 8, the terminal device 90 of this embodiment includes: a processor 903, a memory 901 and a computer program 902 stored in said memory 901 and executable on said processor 903. The processor 903 implements the steps in the above-described method embodiments, such as the steps S701 to S703 shown in fig. 6, when executing the computer program 902. Alternatively, the processor 903 realizes the functions of each module/unit in the above device embodiments when executing the computer program 902.
Illustratively, the computer program 902 may be partitioned into one or more modules/units, which are stored in the memory 901 and executed by the processor 903 to complete the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution process of the computer program 902 in the terminal device 90. For example, the computer program 902 may be divided into a second receiving module, an analyzing module and a second connecting module, and each module has the following specific functions:
and the second receiving module is used for receiving the first encrypted information.
And the analysis module is used for analyzing the first encryption information to obtain first identification information.
The second connection module is used for starting a second preset mode and sending feedback information to the main network equipment if the first identification information is consistent with the third identification information; the third identification information is preset identification information inside the auxiliary equipment; the feedback information is used to establish a connection with the primary network device.
The terminal device 90 may be a computing device such as a desktop computer, a notebook, a palm computer, and a cloud server. The terminal device may include, but is not limited to, a processor 903, a memory 901. Those skilled in the art will appreciate that fig. 8 is merely an example of a terminal device 90 and does not constitute a limitation of the terminal device 90 and may include more or fewer components than shown, or some components may be combined, or different components, e.g., the terminal device may also include input-output devices, network access devices, buses, etc.
The Processor 903 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 901 may be an internal storage unit of the terminal device 90, such as a hard disk or a memory of the terminal device 90. The memory 901 may also be an external storage device of the terminal device 90, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the terminal device 90. In one embodiment, the memory 901 may also include both internal storage units and external storage devices of the terminal device 90. The memory 901 is used for storing the computer program and other programs and data required by the terminal device. The memory 901 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the embodiments of the present application, and they should be construed as being included in the present application.

Claims (9)

1. A networking method of a wireless network is applied to a main network device, and the method comprises the following steps:
receiving first identification information; the first identification information is used for identifying the auxiliary equipment;
processing the first identification information according to a first preset rule to obtain first encryption information;
sending the first encrypted information to the auxiliary device; the first encryption information is used for triggering the auxiliary equipment to send feedback information when the first encryption information is verified to meet consistency check;
starting a first connection mode, if feedback information sent by the auxiliary equipment is received, establishing connection with the auxiliary equipment according to matching information in the feedback information, wherein the feedback information comprises second identification information and matching information;
wherein the receiving the first identification information includes:
receiving the first identification information acquired by a first terminal, wherein the first terminal is a terminal connected with the main network equipment;
detecting whether the first identification information is legal information;
if the first identification information is legal information, the first identification information is accepted;
and if the first identification information is illegal information, sending first reminding information to a first terminal interface for display.
2. The networking method of claim 1, wherein processing the first identification information according to a first predetermined rule to obtain first encryption information comprises:
analyzing the first identification information to obtain first field information;
and encrypting and writing the first field information into preset transmission information to obtain the first encryption information.
3. The networking method of claim 1, wherein the enabling of the first connection mode and the adding of the connection to the auxiliary device according to the feedback information if the feedback information sent by the auxiliary device is received, comprises:
analyzing the feedback information to obtain the second identification information;
judging whether the second identification information is consistent with preset authentication information or not;
and if the second identification information is consistent with the preset authentication information, establishing connection with the auxiliary equipment according to the matching information.
4. The networking method of claim 3, wherein after determining whether the second identification information is consistent with the preset authentication information, the method further comprises:
if the second identification information is inconsistent with the preset authentication information, judging that the networking of the main network equipment and the auxiliary equipment fails;
and sending the second reminding information to the first terminal interface for displaying.
5. The networking method of claim 4, wherein before receiving the first identification information obtained by the first terminal from the auxiliary device, the method further comprises:
carrying out initialization operation;
when the first encryption information is sent to the auxiliary equipment, the networking state is set to be matched;
setting the networking state as successfully matched after establishing connection with the auxiliary equipment according to the matching information;
setting the networking state as a matching failure after judging that the networking of the main network equipment and the auxiliary equipment fails;
and generating a state record file of the networking state.
6. A networking method of a wireless network is applied to an auxiliary device and comprises the following steps:
receiving first encryption information;
analyzing the first encryption information to obtain first identification information;
if the first identification information is consistent with the third identification information, starting a second preset mode, and sending feedback information to the main network equipment; the third identification information is preset identification information inside the auxiliary equipment; matching information in the feedback information is used for establishing connection with the main network device, and the feedback information comprises second identification information and matching information;
the first identification information is first identification information, which is received by the main network device and acquired by a first terminal, and the first terminal is a terminal connected with the main network device; the main network device detects whether the first identification information is legal information; if the first identification information is legal information, the main network equipment receives the first identification information; and if the first identification information is illegal information, the main network equipment sends first reminding information to a first terminal interface for displaying.
7. The networking method of claim 6, wherein if the first identification information is consistent with the third identification information, enabling a second preset mode, and sending feedback information to the host network device, comprises:
writing the second identification information and the matching information into the feedback information;
establishing connection with the main network equipment according to the matching information; and the matching information is used for triggering the auxiliary equipment, and connection is established when the second identification information is matched with preset authentication information in the main network equipment.
8. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1 to 5 when executing the computer program.
9. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 6 to 7 when executing the computer program.
CN201910857294.2A 2019-09-11 2019-09-11 Networking method and equipment of wireless network Active CN110602693B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910857294.2A CN110602693B (en) 2019-09-11 2019-09-11 Networking method and equipment of wireless network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910857294.2A CN110602693B (en) 2019-09-11 2019-09-11 Networking method and equipment of wireless network

Publications (2)

Publication Number Publication Date
CN110602693A CN110602693A (en) 2019-12-20
CN110602693B true CN110602693B (en) 2023-04-07

Family

ID=68858761

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910857294.2A Active CN110602693B (en) 2019-09-11 2019-09-11 Networking method and equipment of wireless network

Country Status (1)

Country Link
CN (1) CN110602693B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111065090A (en) * 2019-12-25 2020-04-24 普联技术有限公司 Method for establishing network connection and wireless routing equipment
CN116156501B (en) * 2023-04-19 2023-06-27 深圳市华曦达科技股份有限公司 Wireless grid network networking method, device and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106550362A (en) * 2015-09-18 2017-03-29 大唐半导体设计有限公司 The method and system of smart machine secure accessing WLAN
CN109862605A (en) * 2019-01-22 2019-06-07 上海连尚网络科技有限公司 A kind of networking methods and equipment for terminal device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105282829B (en) * 2015-11-04 2018-12-11 广东欧珀移动通信有限公司 A kind of method and wireless sound box connecting network
CN105307143B (en) * 2015-11-04 2019-02-05 Oppo广东移动通信有限公司 A kind of method for connecting network and wireless sound box

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106550362A (en) * 2015-09-18 2017-03-29 大唐半导体设计有限公司 The method and system of smart machine secure accessing WLAN
CN109862605A (en) * 2019-01-22 2019-06-07 上海连尚网络科技有限公司 A kind of networking methods and equipment for terminal device

Also Published As

Publication number Publication date
CN110602693A (en) 2019-12-20

Similar Documents

Publication Publication Date Title
US11064353B2 (en) Infrastructure coordinated media access control address assignment
US7809354B2 (en) Detecting address spoofing in wireless network environments
US8150372B2 (en) Method and system for distributing data within a group of mobile units
CN108881308B (en) User terminal and authentication method, system and medium thereof
US10470102B2 (en) MAC address-bound WLAN password
US11665536B2 (en) System and method for providing a seamless and secure access to management and monitoring systems
EP2219412A2 (en) System and method for automatic wireless connection between a portable terminal and a digital device
US10983783B2 (en) Firmware update method and related apparatus
US20200359349A1 (en) Establishing simultaneous mesh node connections
CN102428675A (en) Portable secure computing network
US20170238236A1 (en) Mac address-bound wlan password
EP3794852B1 (en) Secure methods and systems for identifying bluetooth connected devices with installed application
US11638149B2 (en) Instant secure wireless network setup
CN111182546B (en) Method, equipment and system for accessing wireless network
US9007957B2 (en) Wireless network setup and configuration distribution system
WO2018113113A1 (en) Double-system terminal wifi sharing method and device
CN110602693B (en) Networking method and equipment of wireless network
CN112512048B (en) Mobile network access system, method, storage medium and electronic device
JP4856700B2 (en) Establishing a wireless universal serial bus (WUSB) connection via a trusted medium
KR101060688B1 (en) Wireless instant messenger system and service security methods
US20220174490A1 (en) System, method, storage medium and equipment for mobile network access
CN113039766B (en) Optimized equivalent Simultaneous Authentication (SAE) authentication in wireless networks
TWI641271B (en) Access authentication method, UE and access equipment
CN113242060B (en) Network access method and device, storage medium and electronic device
US20230403561A1 (en) Access point capable of mirroring wired and wireless data traffic

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant