CN111698766B - Intelligent networking method and device and readable storage medium - Google Patents

Intelligent networking method and device and readable storage medium Download PDF

Info

Publication number
CN111698766B
CN111698766B CN202010561873.5A CN202010561873A CN111698766B CN 111698766 B CN111698766 B CN 111698766B CN 202010561873 A CN202010561873 A CN 202010561873A CN 111698766 B CN111698766 B CN 111698766B
Authority
CN
China
Prior art keywords
wireless access
access point
network
wireless
legal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010561873.5A
Other languages
Chinese (zh)
Other versions
CN111698766A (en
Inventor
高华辰
左子垚
王心刚
周泳
张志青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yichen Shenzhen Technology Co ltd
Original Assignee
Yichen Shenzhen Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yichen Shenzhen Technology Co ltd filed Critical Yichen Shenzhen Technology Co ltd
Priority to CN202010561873.5A priority Critical patent/CN111698766B/en
Publication of CN111698766A publication Critical patent/CN111698766A/en
Application granted granted Critical
Publication of CN111698766B publication Critical patent/CN111698766B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery

Abstract

The invention discloses an intelligent networking method, an intelligent networking device and a readable storage medium, and relates to the technical field of wireless. The intelligent networking method comprises the following steps: acquiring a first wireless access point, and controlling the first wireless access point to send out a detection broadcast packet to a network where the first wireless access point is located; judging whether the first wireless access point receives a return response generated by the second wireless access point based on the detection broadcast packet within a preset detection window period; if yes, determining the first wireless access point as a slave wireless access point; if not, the first wireless access point is judged as a main wireless access point, and the detection broadcast packets sent by other wireless access points of the network where the first wireless access point is located are received until the main wireless configuration network point and all the slave wireless configuration network points are determined, so that the configuration of the wireless access points can be reliably carried out.

Description

Intelligent networking method and device and readable storage medium
Technical Field
The invention relates to the technical field of wireless networks, in particular to an intelligent networking method, an intelligent networking device and a readable storage medium.
Background
At present, with the development of Wireless network technology, in a home application scenario, a single Wireless network device cannot meet daily requirements, and therefore, a plurality of APs (Wireless Access points, referred to as Wireless Access points for short) are configured for use in a matching manner. In the using process of a plurality of APs, one master AP is necessarily determined to be used for regulating and controlling other remaining slave APs. For home users, not only a plurality of APs cannot be rapidly and skillfully configured, but also if a failure occurs, the pre-configured main AP cannot be used, the whole network is broken down, and the existing networking scheme is not reliable.
In view of the above, how to provide a reliable networking scheme is a problem to be solved by those skilled in the art.
Disclosure of Invention
The invention provides an intelligent networking method, an intelligent networking device and a readable storage medium.
In a first aspect, an embodiment of the present invention provides an intelligent networking method, which is applied to a computer device, where the computer device is in communication connection with a plurality of wireless access points;
the method comprises the following steps:
the method comprises the steps that a first wireless access point is obtained, the first wireless access point is controlled to send out a detection broadcast packet to a network where the first wireless access point is located, the detection broadcast packet is used for detecting whether a second wireless access point with higher control priority than the first wireless access point exists or not, the first wireless access point is one of a plurality of wireless access points which passes legal verification and is successfully networked, and the second wireless access point is any one of the plurality of wireless access points except the first wireless access point which passes legal verification and is successfully networked;
judging whether the first wireless access point receives a return response generated by the second wireless access point based on the detection broadcast packet within a preset detection window period;
if yes, the first wireless access point is judged to be a slave wireless access point, and the second wireless access point is controlled to send out a detection broadcast packet to a network where the first wireless access point is located until a master wireless configuration network point and all slave wireless configuration network points are determined;
if not, the first wireless access point is judged as a master wireless access point, and the detection broadcast packet sent by other wireless access points of the network where the first wireless access point is located is received until a master wireless configuration network point and all slave wireless configuration network points are determined, wherein the other wireless access points are any wireless network configuration nodes which pass legal verification and are successfully networked in the plurality of wireless access points except the first wireless access point and the second wireless access point.
Optionally, the determining, by the first wireless access point, a slave wireless access point, and controlling the second wireless access point to send out a detection broadcast packet to a network where the first wireless access point is located until a master wireless configuration network point is determined includes:
determining the first wireless access point as a slave wireless access point;
controlling the second wireless access point to send out a detection broadcast packet to a network where the first wireless access point is located;
judging whether the second wireless access point receives a return response generated by the other wireless access points based on the detection broadcast packet within a preset detection window period;
if yes, the second wireless access point is judged to be a slave wireless access point, the other wireless access points are used as the second wireless access point, and the steps are repeated until a master wireless configuration network point is determined;
and if not, determining the second wireless access point as a main wireless access point.
Optionally, the step of determining the first wireless access point as a master wireless access point, and receiving the detection broadcast packet sent by other wireless access points in the network where the first wireless access point is located until determining a master wireless configuration network point and all slave wireless configuration network points includes:
determining the first wireless access point as a master wireless access point;
when receiving the detection broadcast packet sent by other wireless access points of the network where the first wireless access point is located, comparing the local area network address of the detection network access point sending the detection broadcast packet with the local area network address of the first wireless access point;
when the preset bytes of the local area network address of the detection network access point are larger than the preset bytes of the local area network address of the first wireless access point, the detection network access point is judged to be a main wireless configuration network node, the first wireless access point is judged to be a slave wireless configuration network node, the detection network access point is used as the first wireless access point, and the steps are repeated until the main wireless configuration network node and all the slave wireless configuration network nodes are determined.
Optionally, the method further includes a step of determining whether the first wireless access point passes the legal authentication, where the step includes:
selecting a first wireless access point, and extracting a first security verification identifier of the first wireless access point in a network, wherein the first security verification identifier represents historical access requests and/or local network addresses of the first wireless access point;
determining at least one network security verification code corresponding to the first wireless access point in a verification list of the first wireless access point according to the historical identity of the first wireless access point in the network, and a verification confidence value of each network security verification code and the corresponding first wireless access point;
calculating matching coefficients of preset detection address bytes of the first wireless access point and address bytes to be detected corresponding to the first wireless access point;
taking a verification confidence value of each network security verification code and the corresponding first wireless access point and a matching coefficient of a preset detection address byte of the first wireless access point and a to-be-detected address byte corresponding to the first wireless access point as a second security verification identifier, wherein a historical access request of the first wireless access point comprises a historical identity identifier of the first wireless access point in the network, the local network address comprises the to-be-detected address byte corresponding to the first wireless access point, the preset comparison object comprises the preset detection address byte of the first wireless access point and at least one network security verification code corresponding to the first wireless access point, and the second security verification identifier represents an association relationship between the preset comparison object and the first security verification identifier;
inputting the first security verification identifier and the second security verification identifier into the detection model, and calculating the matching degree of the first security verification identifier and the second security verification identifier with a target security verification identifier;
determining whether the first wireless access point is a legal wireless access point of the network according to the matching degree of the first security verification identifier, the second security verification identifier and the target security verification identifier, wherein the legal wireless access point is a wireless access point which passes legal verification and is successfully networked, and the target security verification identifier is a security verification identifier which represents whether the first wireless access point is a legal wireless access point, and the method comprises the following steps: and the trained detection model learns the security verification identification of the characterization set when the first wireless access point is a legal wireless access point and the security verification identification of the characterization set when the first wireless access point is not a legal wireless access point.
Optionally, the target security verification identifier is obtained by:
acquiring a preset virtual network for training the detection model, and dividing the acquired preset virtual network into network detection areas, wherein the preset virtual network comprises at least one legal identifier for representing whether the first wireless access point is a legal wireless access point or not, and the legal identifier is an identifier for representing whether the first wireless access point is a legal wireless access point or not in the network detection area to which the preset virtual network belongs;
extracting a first wireless access point carrying the legal identifier and a third security verification identifier of the first wireless access point from the preset virtual network;
processing the third security verification identifier of the first wireless access point by using the preset comparison object of the first wireless access point carrying the legal identifier to obtain a fourth security verification identifier of the first wireless access point;
classifying the third security verification identification and the fourth security verification identification of the first wireless access point carrying the legal identification, and respectively recording a first classification processing result corresponding to the first wireless access point of which the legal identification represents a legal result and a second classification processing result corresponding to the first wireless access point of which the legal identification represents an illegal result;
and taking the first classification processing result and the second classification processing result as the target security verification identification.
Optionally, the determining, according to the matching degree between the first security verification identifier and the target security verification identifier, whether the first wireless access point is a valid wireless access point of the network includes:
and when the matching degree of the first security verification identification and the second security verification identification with the first classification processing result is greater than or equal to the matching degree of the first security verification identification and the second security verification identification with the second classification processing result, determining that the first wireless access point is a legal wireless access point of the network.
Optionally, the method further comprises:
monitoring a heartbeat state between a master wireless access point and a slave wireless access point after determining the master wireless access point and the slave wireless access point in a network where the first wireless access point is located;
and when the heartbeat state is abnormal, re-authenticating the master wireless access point and the slave wireless access points for all the wireless access points in the network where the first wireless access point is located.
A second aspect of the present invention provides an intelligent networking apparatus, which is applied to a computer device, where the computer device is in communication connection with a plurality of wireless access points;
the device comprises:
an obtaining module, configured to obtain a first wireless access point, and control the first wireless access point to send a detection broadcast packet to a network where the first wireless access point is located, where the detection broadcast packet is used to detect whether a second wireless access point with a higher control priority than the first wireless access point exists, where the first wireless access point is a wireless access point that passes legal verification and is successfully networked among the multiple wireless access points, and the second wireless access point is any wireless network configuration node that passes legal verification and is successfully networked except the first wireless access point among the multiple wireless access points;
a determining module, configured to determine whether the first wireless access point receives a return response generated by the second wireless access point based on the detection broadcast packet within a preset detection window period; if yes, the first wireless access point is judged to be a slave wireless access point, and the second wireless access point is controlled to send out a detection broadcast packet to a network where the first wireless access point is located until a master wireless configuration network point and all slave wireless configuration network points are determined; if not, the first wireless access point is judged as a master wireless access point, and the detection broadcast packet sent by other wireless access points of the network where the first wireless access point is located is received until a master wireless configuration network point and all slave wireless configuration network points are determined, wherein the other wireless access points are any wireless network configuration nodes which pass legal verification and are successfully networked in the plurality of wireless access points except the first wireless access point and the second wireless access point.
In a third aspect, an embodiment of the present invention provides a computer device, where the computer device includes a processor and a non-volatile memory storing computer instructions, and when the computer instructions are executed by the processor, the computer device executes the intelligent networking method according to the first aspect.
In a fourth aspect, an embodiment of the present invention provides a readable storage medium, where the readable storage medium includes a computer program, and the computer program controls, when running, a computer device in which the readable storage medium is located to execute the intelligent networking method according to the first aspect.
Compared with the prior art, the beneficial effects provided by the invention comprise: the embodiment of the invention provides an intelligent networking method, an intelligent networking device and a readable storage medium, wherein the intelligent networking method is applied to computer equipment, and the computer equipment is in communication connection with a plurality of wireless access points; the intelligent networking method comprises the following steps: firstly, a first wireless access point is obtained, the first wireless access point is controlled to send out a detection broadcast packet to a network where the first wireless access point is located, the detection broadcast packet is used for detecting whether a second wireless access point with higher control priority than the first wireless access point exists, the first wireless access point is one of the wireless access points which passes legal verification and is successfully networked, and the second wireless access point is any one of the wireless access points except the first wireless access point which passes legal verification and is successfully networked; then judging whether the first wireless access point receives a return response generated by the second wireless access point based on the detection broadcast packet within a preset detection window period; if yes, the first wireless access point is judged to be a slave wireless access point, and the second wireless access point is controlled to send out a detection broadcast packet to a network where the first wireless access point is located until a master wireless configuration network point and all slave wireless configuration network points are determined; if not, the first wireless access point is judged as a master wireless access point, the detection broadcast packet sent by other wireless access points of the network where the first wireless access point is located is received until the master wireless configuration network point and all slave wireless configuration network points are determined, and the other wireless access points are any wireless network configuration nodes which pass legal verification and are successfully networked in the plurality of wireless access points except the first wireless access point and the second wireless access point, so that the configuration of the wireless access points can be reliably carried out.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the embodiments will be briefly described below. It is appreciated that the following drawings depict only certain embodiments of the invention and are therefore not to be considered limiting of its scope. For a person skilled in the art, it is possible to derive other relevant figures from these figures without inventive effort.
Fig. 1 is an interaction diagram of an intelligent networking system according to an embodiment of the present invention;
fig. 2 is a schematic flowchart illustrating steps of an intelligent networking method according to an embodiment of the present invention;
fig. 3 is a block diagram illustrating a structure of an intelligent networking device according to an embodiment of the present invention;
fig. 4 is a block diagram schematically illustrating a structure of a computer device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
Furthermore, the terms "first," "second," and the like are used merely to distinguish one description from another, and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it is also to be noted that, unless otherwise explicitly stated or limited, the terms "disposed" and "connected" are to be interpreted broadly, and for example, "connected" may be a fixed connection, a detachable connection, or an integral connection; can be mechanically or electrically connected; the connection may be direct or indirect via an intermediate medium, and may be a communication between the two elements. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
The following detailed description of embodiments of the invention refers to the accompanying drawings.
Fig. 1 is an interaction diagram of an intelligent networking system according to an embodiment of the present invention. The intelligent networking system may include a computer device and a wireless access point 200 communicatively coupled to the computer device 100. The intelligent networking system shown in fig. 1 is only one possible example, and in other possible embodiments, the intelligent networking system may include only one of the components shown in fig. 1 or may also include other components.
The computer device 100 may include a mobile device, a tablet computer, a laptop computer, etc., or any combination thereof. In some embodiments, the mobile device may include a smart home device, a wearable device, a smart mobile device, a virtual reality device, an augmented reality device, or the like, or any combination thereof. In some embodiments, the smart home devices may include control devices of smart electrical devices, smart monitoring devices, smart televisions, smart cameras, and the like, or any combination thereof. In some embodiments, the wearable device may include a smart bracelet, a smart lace, smart glass, a smart helmet, a smart watch, a smart garment, a smart backpack, a smart accessory, or the like, or any combination thereof. In some embodiments, the smart mobile device may include a smartphone, a personal digital assistant, a gaming device, and the like, or any combination thereof. In some embodiments, the virtual reality device and/or the augmented reality device may include a virtual reality helmet, virtual reality glass, a virtual reality patch, an augmented reality helmet, augmented reality glass, an augmented reality patch, or the like, or any combination thereof. For example, the virtual reality device and/or augmented reality device may include various virtual reality products and the like.
In this embodiment, the computer device 100 and the wireless access point 200 in the intelligent networking system may perform the intelligent networking method described in the following method embodiments in cooperation, and the detailed description of the method embodiments may be referred to in the following steps for executing the computer device 100 and the wireless access point 200.
To solve the technical problem in the foregoing background, fig. 2 is a flowchart illustrating an intelligent networking method according to an embodiment of the present invention, where the intelligent networking method provided in this embodiment may be executed by the computer device 100 shown in fig. 1, and the intelligent networking method is described in detail below.
Step 201, acquiring a first wireless access point, and controlling the first wireless access point to send out a detection broadcast packet to a network where the first wireless access point is located.
The detection broadcast packet is used for detecting whether a second wireless access point with higher control priority than the first wireless access point exists, the first wireless access point is a wireless access point 200 which passes legal verification and is successfully networked in the plurality of wireless access points, and the second wireless access point is any wireless network configuration node which passes legal verification and is successfully networked except the first wireless access point in the plurality of wireless access points;
step 202, it is determined whether the first ap receives a report response generated by the second ap based on the detection broadcast packet within a preset detection window period.
If yes, go to step 203.
Step 203, determining the first wireless access point as a slave wireless access point, and controlling the second wireless access point to send out a detection broadcast packet to the network where the first wireless access point is located until the master wireless configuration network point and all slave wireless configuration network points are determined;
if not, go to step 204.
Step 204, determining the first wireless access point as a master wireless access point, and receiving detection broadcast packets sent by other wireless access points of the network where the first wireless access point is located until the master wireless configuration network point and all slave wireless configuration network points are determined.
And the other wireless access points are any wireless network configuration nodes which pass legal verification and are successfully networked except the first wireless access point and the second wireless access point in the plurality of wireless access points.
In the embodiment of the present invention, the plurality of wireless access points 200 may be connected by a multi-port network switch, and the plurality of wireless access points 200 may be connected by a wireless mesh (wireless mesh network) method. After the first wireless access point is started and successfully networked, when the first wireless access point does not receive any return response generated by the wireless access point 200 based on the detection broadcast packet within a preset detection window period, it may be considered that there is no wireless access point 200 with the same property as itself, a server based on a TCP Protocol (Transmission Control Protocol for short) may be generated, and the self management authority is set as a master (i.e., as a current master AP). Then, the rest of the wireless access points 200 in the network are sequentially activated, for example, after the second wireless access point is activated, the second wireless access point also performs the operation as the first wireless access point, and since the first wireless access point does not receive any report response generated by the wireless access point 200 based on the detection broadcast packet before, the second wireless access point temporarily serves as the master AP, the second wireless access point judges that the current network exists in the wireless access point 200 with the same property at this time, and can determine the second wireless access point as the slave AP.
In contrast, if the network where the first wireless access point is located has other wireless access points as the master AP, the first wireless access point may receive the report response generated based on the detection broadcast packet within the preset detection window period, that is, the current network has the wireless access point 200 with the same property, and may determine the first wireless access point as the slave AP.
Through the steps, all the wireless access points 200 in the whole network can be reliably configured with the master/slave APs without manual intervention.
As an alternative embodiment, the aforementioned step 203 may be embodied in the following manner.
Substep 203-1 determines the first wireless access point as the slave wireless access point.
And a substep 203-2 of controlling the second wireless access point to send out a detection broadcast packet to the network where the first wireless access point is located.
Substep 203-3, judging whether the second wireless access point receives a return response generated by other wireless access points based on the detection broadcast packet in a preset detection window period;
if so, then sub-step 203-4 is performed.
Substep 203-4, determining the second wireless access point as the slave wireless access point, taking other wireless access points as the second wireless access points, and repeating the steps until the master wireless configuration network point is determined.
If not, then sub-step 203-5 is performed.
Substep 203-5, the second wireless access point is determined to be the primary wireless access point.
Specifically, if the first wireless access point is determined as a slave AP, the second wireless access point is temporarily used as a master AP, and performs the operation of the first wireless access point to send out a detection broadcast packet to the network, if the second wireless access point receives a return response generated by other wireless access points based on the detection broadcast packet within a preset detection window period, it indicates that the wireless access point 200 with the same property exists, the second wireless access point may be determined as a slave AP, and the other wireless access points sending the return response are used as second wireless access points, and substeps 203-2 and 203-3 are repeated until all the master APs and the slave APs are determined.
Through the steps, all the main/auxiliary APs can be reliably judged, and the whole process is self-adaptive and does not need excessive manual operation.
As an alternative embodiment, the aforementioned step 204 may be implemented by the following steps.
Substep 204-1, the first wireless access point is determined to be the primary wireless access point.
And a substep 204-2 of comparing the local area network address of the detection network access point sending the detection broadcast packet with the local area network address of the first wireless access point when receiving the detection broadcast packets sent by other wireless access points of the network where the first wireless access point is located.
And a substep 204-3, when the preset byte of the local area network address of the detection network access point is larger than the preset byte of the local area network address of the first wireless access point, determining the detection network access point as a master wireless configuration network node, determining the first wireless access point as a slave wireless configuration network node, taking the detection network access point as the first wireless access point, and repeating the steps until the master wireless configuration network node and all slave wireless configuration network nodes are determined.
When the first wireless Access point is temporarily used as a master AP, when there is a detection broadcast packet sent by other wireless Access points in the network, the other wireless Access points may also be used as a master AP to be selected, at this time, preset bytes of the local area network addresses of the first wireless Access point and the detection network Access point may be compared, specifically, six bits after comparing respective Media Access Control addresses (lan addresses for short), one having a larger Address may be determined as a slave AP, and the other having a smaller Address may be determined as a master AP.
To describe in more detail how the first radio access point is legally verified in the aforementioned step 201, reference may be made to the following steps.
Substep 201-1, selecting a first wireless access point, extracting a first security authentication identification of the first wireless access point in the network.
Wherein the first security authentication identification characterizes historical access requests and/or local network addresses of the first wireless access point.
Substep 201-2, determining at least one network security verification code corresponding to the first wireless access point existing in the verification list of the first wireless access point according to the historical identity of the first wireless access point in the network, and a verification confidence value of each network security verification code and the corresponding first wireless access point.
Substep 201-3, calculating a matching coefficient between a preset detection address byte of the first wireless access point and an address byte to be detected corresponding to the first wireless access point.
And a substep 201-4, taking the verification confidence value of each network security verification code and the corresponding first wireless access point and the matching coefficient of the preset detection address byte of the first wireless access point and the address byte to be detected corresponding to the first wireless access point as a second security verification identifier.
The historical access request of the first wireless access point comprises a historical identity identifier of the first wireless access point in a network, the local network address comprises address bytes to be detected corresponding to the first wireless access point, the preset comparison object comprises preset detection address bytes of the first wireless access point and at least one network security verification code corresponding to the first wireless access point, and the second security verification identifier represents an association relation between the preset comparison object and the first security verification identifier.
And a substep 201-5 of inputting the first security verification identifier and the second security verification identifier into the detection model, and calculating the matching degree of the first security verification identifier and the second security verification identifier with the target security verification identifier.
And a substep 201-6, determining whether the first wireless access point is a legal wireless access point of the network according to the matching degree of the first security verification identifier, the second security verification identifier and the target security verification identifier.
The method includes that a legal wireless access point is a wireless access point 200 which passes legal verification and is successfully networked, and a target security verification identifier is a security verification identifier which represents whether a first wireless access point is a legal wireless access point, and includes: and the trained detection model learns the security verification identification of the characterization set when the first wireless access point is a legal wireless access point and the security verification identification of the characterization set when the first wireless access point is not the legal wireless access point.
Through the detection model trained in advance and the first safety verification identifier and the second safety verification identifier determined in advance, whether the first wireless access point is a legal wireless access point or not can be accurately known based on the matching degree output by the detection model, if so, the first wireless access point passes the legal verification and is successfully networked, and other wireless access points of the network can also be judged to be legal through the method, which is not repeated herein. Through the steps, the network safety can be ensured in the using process of the user.
The foregoing sub-step 201-1 may specifically include the following steps.
(1) And acquiring a network identification rule.
(2) And analyzing the preset detection address bytes according to the network identification rule to obtain the preset detection address bytes of the first wireless access point.
(3) And analyzing the network security verification code of the network identification rule to obtain at least one network security verification code corresponding to the first wireless access point.
Through the steps, the network security verification code can be determined according to the preset identification rule.
For the target security verification identification in the aforementioned sub-step 201-5, in order to more clearly describe how to get, reference is made to the following steps.
(1) And acquiring a preset virtual network for training a detection model, and dividing the acquired preset virtual network into network detection areas.
The preset virtual network comprises at least one legal identifier for representing whether the first wireless access point is a legal wireless access point or not, and the legal identifier is an identifier for representing whether the first wireless access point is a legal wireless access point or not in a network detection area to which the preset virtual network belongs.
(2) And extracting a first wireless access point carrying a legal identifier and a third security verification identifier of the first wireless access point from a preset virtual network.
(3) And processing the third security verification identifier of the first wireless access point by using a preset comparison object of the first wireless access point carrying the legal identifier to obtain a fourth security verification identifier of the first wireless access point.
(4) And classifying the third security verification identification and the fourth security verification identification of the first wireless access point carrying the legal identification, and respectively recording a first classification processing result corresponding to the first wireless access point of which the legal identification represents the legal result and a second classification processing result corresponding to the first wireless access point of which the legal identification represents the illegal result.
(5) And taking the first classification processing result and the second classification processing result as target security verification identifiers.
In the embodiment of the present invention, in order to obtain the detection model, a preset virtual network may be set, the obtained preset virtual network may be processed to divide a network detection area, and then a first classification processing result corresponding to the first wireless access point, where the obtained legal identifier represents a legal result, and a second classification processing result corresponding to the first wireless access point, where the legal identifier represents an illegal result, may be used as a training set to perform training. Through the steps, the detection model capable of accurately detecting the legality can be obtained.
After the part (4) of the foregoing substeps 201-5, the following steps may be specifically performed: taking the network detection area of the first wireless access point as a target network detection area; for the first wireless access point of which the matching degree of the first safety verification identifier and the second safety verification identifier with the first classification processing result is greater than or equal to the matching degree of the first safety verification identifier and the second safety verification identifier with the second classification processing result, carrying out anti-misjudgment processing to avoid misjudgment; and performing cluster analysis on the first wireless access point subjected to the misjudgment prevention processing, taking a cluster analysis result of the first wireless access point as a cluster analysis result of the legal wireless access point, and obtaining the legal wireless access point of the target network detection area from the cluster analysis result. The first wireless access point is provided with a network detection area legal identifier used for representing a network detection area to which the first wireless access point belongs.
As an alternative embodiment, for the foregoing sub-steps 201-6, the embodiment of the present invention provides a specific implementation manner, which can be implemented by the following steps.
(1) And when the matching degree of the first security verification identification and the second security verification identification with the first classification processing result is greater than or equal to the matching degree of the first security verification identification and the second security verification identification with the second classification processing result, determining that the first wireless access point is a legal wireless access point of the network.
In addition to the above steps, after determining the master wireless access point and the slave wireless access point in the network, the network may be maintained by the following steps.
In step 205, after determining the master wireless access point and the slave wireless access point in the network where the first wireless access point is located, monitoring the heartbeat state between the master wireless access point and the slave wireless access point.
Step 206, when the heartbeat state is abnormal, the master wireless access point and the slave wireless access points are authenticated again for all the wireless access points 200 in the network where the first wireless access point is located.
In the embodiment of the present invention, during the master AP and the slave AP being in the networking period, a valid heartbeat packet may be maintained, and if the heartbeat packet is abnormal (i.e. the heartbeat state is abnormal), for example, timeout or maximum failure number is reached, the authentication of the master wireless access point and the slave wireless access point is performed again, that is, the foregoing process from step 201 to step 204 is repeated. It should be noted that, on the basis, if the heartbeat of the slave AP is abnormal, it may be considered that the slave AP is abnormal in networking with the master AP, and the slave AP may be switched to the master AP, and then, the master AP performs contention on the original master AP, so as to ensure that only one master AP exists in the entire network.
In addition to the above steps, the embodiment of the present invention also provides an example that can visually determine the master-slave status of the wireless access point 200, and the method can be implemented as follows.
When the first wireless access point is determined to be the main wireless access point, a first trigger signal is sent to light a first indicator lamp.
And when the first wireless access point is judged to be the slave wireless access point, sending a second trigger signal to light a second indicator lamp.
In the embodiment of the invention, the first indicator light and the second indicator light are respectively used for indicating the master AP and the slave AP, so that the master AP and the slave AP can be distinguished more intuitively and rapidly by using the indicator lights.
The embodiment of the invention provides an intelligent networking device 110, which is applied to a computer device 100, wherein the computer device 100 is in communication connection with a plurality of wireless access points 200;
the device comprises:
an obtaining module 1101, configured to obtain a first wireless access point, control the first wireless access point to send a detection broadcast packet to a network where the first wireless access point is located, where the detection broadcast packet is used to detect whether there is a second wireless access point with a higher control priority than the first wireless access point, where the first wireless access point is a wireless access point 200 that passes legal verification and is successfully networked among a plurality of wireless access points, and the second wireless access point is any wireless network configuration node that passes legal verification and is successfully networked except the first wireless access point among the plurality of wireless access points 200;
a determining module 1102, configured to determine whether the first wireless access point receives a return response generated by the second wireless access point based on the detection broadcast packet within a preset detection window period; if so, determining the first wireless access point as a slave wireless access point, and controlling the second wireless access point to send out a detection broadcast packet to a network where the first wireless access point is located until a master wireless configuration network point and all slave wireless configuration network points are determined; if not, the first wireless access point is judged as a main wireless access point, and detection broadcast packets sent by other wireless access points of the network where the first wireless access point is located are received until the main wireless configuration network point and all the slave wireless configuration network points are determined, wherein the other wireless access points are any wireless network configuration nodes which pass legal verification and are successfully networked in the plurality of wireless access points except the first wireless access point and the second wireless access point.
Further, the determining module 1102 is specifically configured to:
determining the first wireless access point as a slave wireless access point; controlling the second wireless access point to send out a detection broadcast packet to the network where the first wireless access point is located; judging whether a second wireless access point receives a return response generated by other wireless access points based on the detection broadcast packet within a preset detection window period; if so, determining the second wireless access point as a slave wireless access point, taking other wireless access points as second wireless access points, and repeating the steps until the master wireless configuration network point is determined; and if not, determining the second wireless access point as the main wireless access point.
Further, the determining module 1102 is specifically configured to:
determining the first wireless access point as a master wireless access point; when receiving detection broadcast packets sent by other wireless access points in the network where the first wireless access point is located, comparing the local area network address of the detection network access point sending the detection broadcast packet with the local area network address of the first wireless access point; when the preset bytes of the local area network address of the detection network access point are larger than the preset bytes of the local area network address of the first wireless access point, the detection network access point is judged to be a master wireless configuration network node, the first wireless access point is judged to be a slave wireless configuration network node, the detection network access point is used as the first wireless access point, and the steps are repeated until the master wireless configuration network node and all the slave wireless configuration network nodes are determined.
Further, the determining module 1102 is specifically further configured to:
selecting a first wireless access point, and extracting a first security verification identifier of the first wireless access point in a network, wherein the first security verification identifier represents a historical access request and/or a local network address of the first wireless access point; determining at least one network security verification code corresponding to the first wireless access point in a verification list of the first wireless access point according to the historical identity of the first wireless access point in the network, and a verification confidence value of each network security verification code and the corresponding first wireless access point; calculating a matching coefficient between a preset detection address byte of the first wireless access point and a to-be-detected address byte corresponding to the first wireless access point; taking a verification confidence value of each network security verification code and a corresponding first wireless access point and a matching coefficient of a preset detection address byte of the first wireless access point and a to-be-detected address byte corresponding to the first wireless access point as a second security verification identifier, wherein a historical access request of the first wireless access point comprises a historical identity identifier of the first wireless access point in a network, a local network address comprises the to-be-detected address byte corresponding to the first wireless access point, a preset comparison object comprises the preset detection address byte of the first wireless access point and at least one network security verification code corresponding to the first wireless access point, and the second security verification identifier represents an association relation between the preset comparison object and the first security verification identifier; inputting the first safety verification identifier and the second safety verification identifier into the detection model, and calculating the matching degree of the first safety verification identifier and the second safety verification identifier with the target safety verification identifier; according to the matching degree of the first security verification identification, the second security verification identification and the target security verification identification, whether the first wireless access point is a legal wireless access point of the network or not is determined, the legal wireless access point is a wireless access point which passes legal verification and is successfully networked, and the target security verification identification is a security verification identification which represents whether the first wireless access point is a legal wireless access point or not, and the method comprises the following steps: and the trained detection model learns the security verification identification of the characterization set when the first wireless access point is a legal wireless access point and the security verification identification of the characterization set when the first wireless access point is not the legal wireless access point.
Further, the determining module 1102 is further specifically configured to:
acquiring a preset virtual network for training a detection model, and dividing the acquired preset virtual network into network detection areas, wherein the preset virtual network comprises at least one legal identifier for representing whether a first wireless access point is a legal wireless access point or not, and the legal identifier is an identifier for representing whether the first wireless access point is a legal wireless access point or not in a network detection area to which the preset virtual network belongs; extracting a first wireless access point carrying a legal identifier and a third security verification identifier of the first wireless access point from a preset virtual network; processing the third security verification identifier of the first wireless access point by using a preset comparison object of the first wireless access point carrying the legal identifier to obtain a fourth security verification identifier of the first wireless access point; classifying a third safety verification identifier and a fourth safety verification identifier of a first wireless access point carrying a legal identifier, and respectively recording a first classification processing result corresponding to the first wireless access point of which the legal identifier represents a legal result and a second classification processing result corresponding to the first wireless access point of which the legal identifier represents an illegal result; and taking the first classification processing result and the second classification processing result as target security verification identifiers.
Further, the determining module 1102 is further specifically configured to:
and when the matching degree of the first security verification identification and the second security verification identification with the first classification processing result is greater than or equal to the matching degree of the first security verification identification and the second security verification identification with the second classification processing result, determining that the first wireless access point is a legal wireless access point of the network.
Further, the determining module 1102 is specifically configured to:
monitoring the heartbeat state between the master wireless access point and the slave wireless access point after determining the master wireless access point and the slave wireless access point in the network where the first wireless access point is located; and when the heartbeat state is abnormal, the authentication of the master wireless access point and the slave wireless access points is carried out again on all the wireless access points in the network where the first wireless access point is positioned.
It should be noted that, the implementation principle of the intelligent networking device 110 may refer to the implementation principle of the bridge device management method, which is not described herein again, and it should be understood that the division of each module of the above device is only a division of a logic function, and all or part of the division may be integrated into one physical entity or may be physically separated during actual implementation. And these modules can be realized in the form of software called by processing element; or may be implemented entirely in hardware; and part of the modules can be realized in the form of calling software by the processing element, and part of the modules can be realized in the form of hardware. For example, the obtaining module 1101 may be a processing element separately set up, or may be implemented by being integrated into a chip of the apparatus, or may be stored in a memory of the apparatus in the form of program code, and the processing element of the apparatus calls and executes the functions of the obtaining module 1101. Other modules are implemented similarly. In addition, all or part of the modules can be integrated together or can be independently realized. The processing element described herein may be an integrated circuit having signal processing capabilities. In implementation, each step of the above method or each module above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in the form of software.
For example, the above modules may be one or more integrated circuits configured to implement the above methods, such as: one or more Application Specific Integrated Circuits (ASICs), or one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), among others. For another example, when some of the above modules are implemented in the form of a processing element scheduler code, the processing element may be a general-purpose processor, such as a Central Processing Unit (CPU) or other processor that can call program code. As another example, these modules may be integrated together, implemented in the form of a system-on-a-chip (SOC).
The embodiment of the present invention provides a computer device 100, where the computer device 100 includes a processor and a non-volatile memory storing computer instructions, and when the computer instructions are executed by the processor, the computer device 100 executes the foregoing intelligent networking method. As shown in fig. 4, fig. 4 is a block diagram of a computer device 100 according to an embodiment of the present invention. Computer device 100 includes an intelligent networking apparatus 110, a memory 111, a processor 112, and a communication unit 113.
To facilitate the transfer or interaction of data, the elements of the memory 111, the processor 112 and the communication unit 113 are electrically connected to each other, directly or indirectly. For example, the components may be electrically connected to each other via one or more communication buses or signal lines. The intelligent networking device 110 includes at least one software function module which may be stored in a memory 111 in the form of software or firmware (firmware) or solidified in an Operating System (OS) of the computer apparatus 100. Processor 112 is used to execute executable modules stored in memory 111, such as software functional modules and computer programs included in intelligent networking device 110.
The embodiment of the present invention provides a readable storage medium, where the readable storage medium includes a computer program, and when the computer program runs, the computer device 100 in which the readable storage medium is located is controlled to execute the foregoing intelligent networking method.
In summary, the intelligent networking method, apparatus and readable storage medium provided by the embodiments of the present invention can reliably implement master/slave AP configuration and handover of all wireless access points in a network, and the whole process is autonomous without human intervention.
The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the disclosure to the precise forms disclosed. Many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the disclosure and its practical applications, to thereby enable others skilled in the art to best utilize the disclosure and various embodiments with various modifications as are suited to the particular use contemplated. The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the disclosure to the precise forms disclosed. Many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the disclosure and its practical applications, to thereby enable others skilled in the art to best utilize the disclosure and various embodiments with various modifications as are suited to the particular use contemplated.

Claims (9)

1. The intelligent networking method is applied to computer equipment, and the computer equipment is in communication connection with a plurality of wireless access points;
the method comprises the following steps:
the method comprises the steps that a first wireless access point is obtained, the first wireless access point is controlled to send out a detection broadcast packet to a network where the first wireless access point is located, the detection broadcast packet is used for detecting whether a second wireless access point with higher control priority than the first wireless access point exists or not, the first wireless access point is one of a plurality of wireless access points which passes legal verification and is successfully networked, and the second wireless access point is any one of the plurality of wireless access points except the first wireless access point which passes legal verification and is successfully networked;
judging whether the first wireless access point receives a return response generated by the second wireless access point based on the detection broadcast packet within a preset detection window period;
if yes, the first wireless access point is judged to be a slave wireless access point, and the second wireless access point is controlled to send out a detection broadcast packet to a network where the first wireless access point is located until a master wireless configuration network point and all slave wireless configuration network points are determined;
if not, the first wireless access point is judged as a master wireless access point, and the detection broadcast packet sent by other wireless access points of the network where the first wireless access point is located is received until a master wireless configuration network point and all slave wireless configuration network points are determined, wherein the other wireless access points are any wireless network configuration nodes which pass legal verification and are successfully networked in the plurality of wireless access points except the first wireless access point and the second wireless access point;
the method further comprises a step of judging whether the first wireless access point passes legal verification, and the step comprises the following steps:
selecting a first wireless access point, and extracting a first security verification identifier of the first wireless access point in a network, wherein the first security verification identifier represents a historical access request and a local area network address of the first wireless access point;
determining at least one network security verification code corresponding to the first wireless access point in a verification list of the first wireless access point according to the historical identity of the first wireless access point in the network, and a verification confidence value of each network security verification code and the corresponding first wireless access point;
calculating matching coefficients of preset detection address bytes of the first wireless access point and address bytes to be detected corresponding to the first wireless access point;
taking a verification confidence value of each network security verification code and the corresponding first wireless access point and a matching coefficient of a preset detection address byte of the first wireless access point and a to-be-detected address byte corresponding to the first wireless access point as a second security verification identifier, wherein a historical access request of the first wireless access point comprises a historical identity identifier of the first wireless access point in the network, the local network address comprises the to-be-detected address byte corresponding to the first wireless access point, a preset comparison object comprises the preset detection address byte of the first wireless access point and at least one network security verification code corresponding to the first wireless access point, and the second security verification identifier represents an association relationship between the preset comparison object and the first security verification identifier;
inputting the first safety verification identification and the second safety verification identification into a detection model, and calculating the matching degree of the first safety verification identification and the second safety verification identification with a target safety verification identification;
determining whether the first wireless access point is a legal wireless access point of the network according to the matching degree of the first security verification identifier, the second security verification identifier and the target security verification identifier, wherein the legal wireless access point is a wireless access point which passes legal verification and is successfully networked, and the target security verification identifier is a security verification identifier which represents whether the first wireless access point is a legal wireless access point, and the method comprises the following steps: and the trained detection model learns the security verification identification of the characterization set when the first wireless access point is a legal wireless access point and the security verification identification of the characterization set when the first wireless access point is not a legal wireless access point.
2. The method according to claim 1, wherein the determining the first wireless access point as a slave wireless access point and controlling the second wireless access point to send out a detection broadcast packet to a network where the first wireless access point is located until determining a master wireless configuration network point comprises:
determining the first wireless access point as a slave wireless access point;
controlling the second wireless access point to send out a detection broadcast packet to a network where the first wireless access point is located;
judging whether the second wireless access point receives a return response generated by the other wireless access points based on the detection broadcast packet within a preset detection window period;
if yes, the second wireless access point is judged to be a slave wireless access point, the other wireless access points are used as the second wireless access point, and the steps are repeated until a master wireless configuration network point is determined;
and if not, determining the second wireless access point as a main wireless access point.
3. The method according to claim 1, wherein the step of determining the first wireless access point as a master wireless access point and receiving the detection broadcast packets sent by other wireless access points in the network where the first wireless access point is located until determining a master wireless configuration network point and all slave wireless configuration network points comprises:
determining the first wireless access point as a master wireless access point;
when receiving the detection broadcast packet sent by other wireless access points of the network where the first wireless access point is located, comparing the local area network address of the detection network access point sending the detection broadcast packet with the local area network address of the first wireless access point;
when the preset bytes of the local area network address of the detection network access point are larger than the preset bytes of the local area network address of the first wireless access point, the detection network access point is judged to be a main wireless configuration network node, the first wireless access point is judged to be a slave wireless configuration network node, the detection network access point is used as the first wireless access point, and the steps are repeated until the main wireless configuration network node and all the slave wireless configuration network nodes are determined.
4. The method of claim 1, wherein the target security authentication identifier is obtained by:
acquiring a preset virtual network for training the detection model, and dividing the acquired preset virtual network into network detection areas, wherein the preset virtual network comprises at least one legal identifier for representing whether the first wireless access point is a legal wireless access point or not, and the legal identifier is an identifier for representing whether the first wireless access point is a legal wireless access point or not in the network detection area to which the preset virtual network belongs;
extracting a first wireless access point carrying the legal identifier and a third security verification identifier of the first wireless access point from the preset virtual network;
processing the third security verification identifier of the first wireless access point by using the preset comparison object of the first wireless access point carrying the legal identifier to obtain a fourth security verification identifier of the first wireless access point;
classifying the third security verification identification and the fourth security verification identification of the first wireless access point carrying the legal identification, and respectively recording a first classification processing result corresponding to the first wireless access point of which the legal identification represents a legal result and a second classification processing result corresponding to the first wireless access point of which the legal identification represents an illegal result;
and taking the first classification processing result and the second classification processing result as the target security verification identification.
5. The method of claim 4, wherein the determining whether the first wireless access point is a valid wireless access point of the network according to the matching degree of the first security authentication identifier and the second security authentication identifier with the target security authentication identifier comprises:
and when the matching degree of the first security verification identification and the second security verification identification with the first classification processing result is greater than or equal to the matching degree of the first security verification identification and the second security verification identification with the second classification processing result, determining that the first wireless access point is a legal wireless access point of the network.
6. The method of claim 1, further comprising:
monitoring a heartbeat state between a master wireless access point and a slave wireless access point after determining the master wireless access point and the slave wireless access point in a network where the first wireless access point is located;
and when the heartbeat state is abnormal, re-authenticating the master wireless access point and the slave wireless access points for all the wireless access points in the network where the first wireless access point is located.
7. The intelligent networking device is applied to computer equipment, and the computer equipment is in communication connection with a plurality of wireless access points;
the device comprises:
an obtaining module, configured to obtain a first wireless access point, and control the first wireless access point to send a detection broadcast packet to a network where the first wireless access point is located, where the detection broadcast packet is used to detect whether a second wireless access point with a higher control priority than the first wireless access point exists, where the first wireless access point is a wireless access point that passes legal verification and is successfully networked among the multiple wireless access points, and the second wireless access point is any wireless network configuration node that passes legal verification and is successfully networked except the first wireless access point among the multiple wireless access points;
a determining module, configured to determine whether the first wireless access point receives a return response generated by the second wireless access point based on the detection broadcast packet within a preset detection window period; if yes, the first wireless access point is judged to be a slave wireless access point, and the second wireless access point is controlled to send out a detection broadcast packet to a network where the first wireless access point is located until a master wireless configuration network point and all slave wireless configuration network points are determined; if not, the first wireless access point is judged as a master wireless access point, and the detection broadcast packet sent by other wireless access points of the network where the first wireless access point is located is received until a master wireless configuration network point and all slave wireless configuration network points are determined, wherein the other wireless access points are any wireless network configuration nodes which pass legal verification and are successfully networked in the plurality of wireless access points except the first wireless access point and the second wireless access point;
the judging module is further configured to select a first wireless access point, extract a first security verification identifier of the first wireless access point in a network, where the first security verification identifier represents a historical access request and a local area network address of the first wireless access point; determining at least one network security verification code corresponding to the first wireless access point in a verification list of the first wireless access point according to the historical identity of the first wireless access point in the network, and a verification confidence value of each network security verification code and the corresponding first wireless access point; calculating matching coefficients of preset detection address bytes of the first wireless access point and address bytes to be detected corresponding to the first wireless access point; taking a verification confidence value of each network security verification code and the corresponding first wireless access point and a matching coefficient of a preset detection address byte of the first wireless access point and a to-be-detected address byte corresponding to the first wireless access point as a second security verification identifier, wherein a historical access request of the first wireless access point comprises a historical identity identifier of the first wireless access point in the network, the local network address comprises the to-be-detected address byte corresponding to the first wireless access point, a preset comparison object comprises the preset detection address byte of the first wireless access point and at least one network security verification code corresponding to the first wireless access point, and the second security verification identifier represents an association relationship between the preset comparison object and the first security verification identifier; inputting the first safety verification identification and the second safety verification identification into a detection model, and calculating the matching degree of the first safety verification identification and the second safety verification identification with a target safety verification identification; determining whether the first wireless access point is a legal wireless access point of the network according to the matching degree of the first security verification identifier, the second security verification identifier and the target security verification identifier, wherein the legal wireless access point is a wireless access point which passes legal verification and is successfully networked, and the target security verification identifier is a security verification identifier which represents whether the first wireless access point is a legal wireless access point, and the method comprises the following steps: and the trained detection model learns the security verification identification of the characterization set when the first wireless access point is a legal wireless access point and the security verification identification of the characterization set when the first wireless access point is not a legal wireless access point.
8. A computer device comprising a processor and a non-volatile memory storing computer instructions that, when executed by the processor, perform the intelligent networking method of any of claims 1-6.
9. A readable storage medium, characterized in that the readable storage medium stores a computer program, which when executed by a computer device controls the readable storage medium to execute the intelligent networking method of any one of claims 1 to 6 on the computer device.
CN202010561873.5A 2020-06-18 2020-06-18 Intelligent networking method and device and readable storage medium Active CN111698766B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010561873.5A CN111698766B (en) 2020-06-18 2020-06-18 Intelligent networking method and device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010561873.5A CN111698766B (en) 2020-06-18 2020-06-18 Intelligent networking method and device and readable storage medium

Publications (2)

Publication Number Publication Date
CN111698766A CN111698766A (en) 2020-09-22
CN111698766B true CN111698766B (en) 2020-12-04

Family

ID=72481843

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010561873.5A Active CN111698766B (en) 2020-06-18 2020-06-18 Intelligent networking method and device and readable storage medium

Country Status (1)

Country Link
CN (1) CN111698766B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112235811B (en) * 2020-09-28 2022-04-01 深圳市微网力合信息技术有限公司 Method for networking multiple routers, router, electronic device and storage medium

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079741A (en) * 2007-06-29 2007-11-28 杭州华三通信技术有限公司 Access point, access controller and method for monitoring illegal access
CN102098269A (en) * 2009-12-15 2011-06-15 中兴通讯股份有限公司 Method for filtering MAC (Media Access Control) addresses in broadband access system
US8688601B2 (en) * 2011-05-23 2014-04-01 Symantec Corporation Systems and methods for generating machine learning-based classifiers for detecting specific categories of sensitive information
CN105430651A (en) * 2015-11-02 2016-03-23 上海斐讯数据通信技术有限公司 Method and system used for detecting illegal wireless access points
CN106792704B (en) * 2015-11-24 2020-10-09 中国移动通信集团公司 Method and device for detecting phishing access point
US10257036B2 (en) * 2016-12-27 2019-04-09 Neutrino8, Inc. Secure plug and play configuration of wireless distribution system (WDS) Wi-Fi range extenders
CN106961683B (en) * 2017-03-21 2021-07-02 金华市智甄通信设备有限公司 Method and system for detecting illegal AP and discoverer AP
CN110233746B (en) * 2019-06-19 2021-05-14 烽火通信科技股份有限公司 Home networking method and home networking AP

Also Published As

Publication number Publication date
CN111698766A (en) 2020-09-22

Similar Documents

Publication Publication Date Title
CN111132120B (en) Method, system and equipment for identifying camera device in room local area network
US8631464B2 (en) Method of detecting anomalous behaviour in a computer network
CN107302527B (en) Equipment anomaly detection method and device
US20190273749A1 (en) Unauthorized Communication Detection Apparatus and Recording Medium
CN111641733B (en) Network bridge equipment management method and device and readable storage medium
US11489832B2 (en) Communication control apparatus, communication control method, and communication control program
CN111680312B (en) Information processing method based on big data and block chain and network security cloud server
US10305879B2 (en) Restricting fake multicast service announcements
US11075915B2 (en) System and method for securing communication between devices on a network
CN111698766B (en) Intelligent networking method and device and readable storage medium
US11381459B2 (en) Service providing system and method for preventing hidden camera, service providing apparatus therefor, and non-transitory computer readable medium having computer program recorded thereon
BR102019020060A2 (en) method for detecting access point characteristics using machine learning
Goutam et al. Hestia: simple least privilege network policies for smart homes
CN111385180A (en) Communication tunnel construction method, device, equipment and medium
CN110611831B (en) Video transmission method and device
CN115484047A (en) Method, device, equipment and storage medium for identifying flooding attack in cloud platform
CN111340016A (en) Image exposure method and apparatus, storage medium, and electronic apparatus
EP3522487B1 (en) Determining a device property
KR102408247B1 (en) Method and Apparatus for Medical Device Network Security
US20210136034A1 (en) Communication control method, storage medium for communication control program, and communication apparatus
US20220141185A1 (en) Communication terminal device, communication control method, and communication control program
CN109788435B (en) Wireless hotspot control method and device, electronic equipment and storage medium
CN111629422B (en) Wireless equipment setting method and device and readable storage medium
US11558376B1 (en) Identifying internet of things devices
CN111932759B (en) Smart park Internet of things data processing platform and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant