CN111988778B - Device, multi-protocol authentication method of WIFI module and computer readable storage medium - Google Patents

Device, multi-protocol authentication method of WIFI module and computer readable storage medium Download PDF

Info

Publication number
CN111988778B
CN111988778B CN201910431792.0A CN201910431792A CN111988778B CN 111988778 B CN111988778 B CN 111988778B CN 201910431792 A CN201910431792 A CN 201910431792A CN 111988778 B CN111988778 B CN 111988778B
Authority
CN
China
Prior art keywords
authenticated
protocol
wifi module
authentication
protocols
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910431792.0A
Other languages
Chinese (zh)
Other versions
CN111988778A (en
Inventor
陈奕荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Midea Group Co Ltd
GD Midea Air Conditioning Equipment Co Ltd
Original Assignee
Midea Group Co Ltd
GD Midea Air Conditioning Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Midea Group Co Ltd, GD Midea Air Conditioning Equipment Co Ltd filed Critical Midea Group Co Ltd
Priority to CN201910431792.0A priority Critical patent/CN111988778B/en
Publication of CN111988778A publication Critical patent/CN111988778A/en
Application granted granted Critical
Publication of CN111988778B publication Critical patent/CN111988778B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The application discloses a multi-protocol authentication method of a WIFI module, which comprises the following steps: after the WIFI module is connected with the network, determining a protocol to be authenticated of the WIFI module; when the number of protocols to be authenticated of the WIFI module is multiple and the security authentication cannot be performed at the same time, staggering part of the protocols to be authenticated and the rest of the protocols to be authenticated to perform the security authentication, wherein after the part of the protocols to be authenticated completes the security authentication, releasing the operation memory occupied by the part of the protocols to be authenticated to be used for the rest of the protocols to be authenticated to perform the security authentication. The application also discloses a device and a computer readable storage medium. The application enables the low-cost WIFI module to finish the security authentication of a plurality of protocols.

Description

Device, multi-protocol authentication method of WIFI module and computer readable storage medium
Technical Field
The present application relates to the field of communication protocol authentication technologies, and in particular, to a device, a method for authenticating multiple protocols of a WIFI module, and a computer readable storage medium.
Background
Along with the maturity of the ecology of the internet of things, the cloud service flowers are put together. For the technical requirements of the WIFI module, the support of single protocols is changed to the support of multiple protocols.
The WIFI module generally authenticates a plurality of protocols at the same time, and for safety, when the WIFI module authenticates a plurality of protocols at the same time, each authenticated protocol needs to be encrypted, and the performance of the WIFI module is required by the encryption authentication of a plurality of protocols at the same time. If the WIFI module is a low-cost module, the performance of the WIFI module is insufficient to support encryption and authentication of multiple protocols, that is, in the prior art, there is a problem that the low-cost WIFI module cannot support multiple protocols.
Disclosure of Invention
The application mainly aims to provide equipment, a multi-protocol authentication method of a WIFI module and a computer readable storage medium, and aims to solve the problem that a low-cost WIFI module cannot support multi-protocols.
In order to achieve the above object, the present application provides a multi-protocol authentication method for a WIFI module, the multi-protocol authentication method for a WIFI module includes the following steps:
after the WIFI module is connected with the network, determining a protocol to be authenticated of the WIFI module;
when the number of protocols to be authenticated of the WIFI module is multiple and the security authentication cannot be performed at the same time, staggering part of the protocols to be authenticated and the rest of the protocols to be authenticated to perform the security authentication, wherein after the part of the protocols to be authenticated completes the security authentication, releasing the operation memory occupied by the part of the protocols to be authenticated to be used for the rest of the protocols to be authenticated to perform the security authentication.
In an embodiment, the failure of the protocol to be authenticated of the WIFI module to perform security authentication simultaneously includes at least one of:
the sum of the operation memories of the WIFI modules occupied by each protocol to be authenticated for security authentication is larger than the operation memory of the WIFI modules;
the number of the protocols to be authenticated is multiple, and the main frequency of the controller of the equipment where the WIFI module is located is lower than a preset frequency;
the number of the protocols to be authenticated is multiple, and the difference between the number of the protocols to be authenticated and the number of cores of the controller of the device of the WIFI module is larger than a preset difference.
In an embodiment, the step of staggering a part of the protocol to be authenticated from the rest of the protocols to be authenticated to perform security authentication includes:
determining a part of first threads corresponding to the protocol to be authenticated from threads corresponding to the protocol to be authenticated, and determining a second thread corresponding to the first threads, wherein the second threads correspond to the rest of the protocol to be authenticated;
and after the second thread monitors that the protocol to be authenticated corresponding to the first thread completes security authentication, releasing an operation memory occupied by the protocol to be authenticated corresponding to the first thread so as to perform security authentication on the protocol to be authenticated corresponding to the second thread.
In an embodiment, the running memory occupied by the protocol to be authenticated corresponding to the first thread is greater than or equal to the running memory occupied by the protocol to be authenticated corresponding to the second thread.
In an embodiment, the step of staggering a part of the protocol to be authenticated from the rest of the protocols to be authenticated to perform security authentication includes:
dividing each protocol to be authenticated into different authentication batches, wherein part of the protocols to be authenticated are each protocol to be authenticated in the authentication batch authenticated first;
and sequentially authenticating the protocols to be authenticated of each authentication batch, wherein the WIFI module authenticates each protocol to be authenticated in each authentication batch at the same time.
In an embodiment, the authentication priority of each of the protocols to be authenticated is higher than the authentication priority of each of the remaining protocols to be authenticated.
In an embodiment, the authentication priority of the protocol to be authenticated is determined according to a connection duration between the WIFI module and a server corresponding to the protocol to be authenticated, where the smaller the connection duration is, the higher the authentication priority of the protocol to be authenticated corresponding to the connection duration is.
In an embodiment, the multi-protocol authentication method of the WIFI module further includes:
after the WIFI module is networked, acquiring a network address corresponding to the WIFI module;
and determining a protocol to be authenticated of the WIFI module according to the network address.
In order to achieve the above object, the present application further provides an apparatus, where the apparatus includes a WIFI module, a memory, a processor, and a multi-protocol authentication program of the WIFI module stored in the memory and capable of running on the processor, where the WIFI module is connected to the processor, and the multi-protocol authentication program of the WIFI module implements each step of the multi-protocol authentication method of the WIFI module as described above when executed by the processor.
In an embodiment, the device is a home device.
To achieve the above object, the present application further provides a computer readable storage medium storing a multi-protocol authentication program of a WIFI module, which when executed by a processor, implements the steps of the multi-protocol authentication method of a WIFI module as described above.
One or more technical solutions provided in the embodiments of the present application at least have the following technical effects or advantages:
when the number of the protocols to be authenticated of the WIFI module is multiple and the security authentication cannot be performed at the same time, staggering part of the protocols to be authenticated and the rest of the protocols to be authenticated to perform the security authentication, and releasing the running memory of the WIFI module for the rest of the protocols to be authenticated to perform the security authentication after the part of the protocols to be authenticated finish the security authentication; because the WIFI module staggers a plurality of protocols to be authenticated for safety authentication, the low-cost WIFI module does not need to simultaneously carry out safety authentication on the protocols to be authenticated, the performance requirement on the WIFI module is low, and the low-cost WIFI module can complete safety authentication of the protocols.
Drawings
FIG. 1 is a schematic diagram of a hardware structure of a device according to an embodiment of the present application;
fig. 2 is a flow chart of a first embodiment of a multi-protocol authentication method of the WIFI module of the present application;
fig. 3 is a flow chart of a second embodiment of a multi-protocol authentication method of the WIFI module of the present application;
fig. 4 is a flowchart of a third embodiment of a multi-protocol authentication method of the WIFI module according to the present application.
The achievement of the objects, functional features and advantages of the present application will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The main solutions of the embodiments of the present application are: after the WIFI module is connected with the network, determining a protocol to be authenticated of the WIFI module; when the number of protocols to be authenticated of the WIFI module is multiple and the security authentication cannot be performed at the same time, staggering part of the protocols to be authenticated and the rest of the protocols to be authenticated to perform the security authentication, wherein after the part of the protocols to be authenticated completes the security authentication, releasing the operation memory occupied by the part of the protocols to be authenticated to be used for the rest of the protocols to be authenticated to perform the security authentication.
Because the WIFI module staggers a plurality of protocols to be authenticated for safety authentication, the low-cost WIFI module does not need to simultaneously carry out safety authentication on the protocols to be authenticated, the performance requirement on the WIFI module is low, and the low-cost WIFI module can complete safety authentication of the protocols.
As an implementation, the device may be as shown in fig. 1.
The embodiment of the application relates to equipment, which can be household electrical appliances and comprises: a processor 101, such as a CPU, a memory 102, a communication bus 103, and a WIFI module 104. The communication bus 103 is used for realizing connection communication between the components, and the WIFI module 104 is connected with the processor 101.
The memory 102 may be a high-speed RAM memory or a stable memory (non-volatile memory), such as a disk memory. As shown in fig. 1, a memory 102, which is a computer storage medium, may include therein a multi-protocol authentication program of a WIFI module; and processor 101 may be configured to invoke the multi-protocol authentication procedure of the WIFI module stored in memory 102 and perform the following operations:
after the WIFI module is connected with the network, determining a protocol to be authenticated of the WIFI module;
when the number of protocols to be authenticated of the WIFI module is multiple and the security authentication cannot be performed at the same time, staggering part of the protocols to be authenticated and the rest of the protocols to be authenticated to perform the security authentication, wherein after the part of the protocols to be authenticated completes the security authentication, releasing the operation memory occupied by the part of the protocols to be authenticated to be used for the rest of the protocols to be authenticated to perform the security authentication.
In one embodiment, the processor 101 may be configured to invoke a time synchronization program of a device stored in the memory 102 and perform the following operations:
the sum of the operation memories of the WIFI modules occupied by each protocol to be authenticated for security authentication is larger than the operation memory of the WIFI modules;
the number of the protocols to be authenticated is multiple, and the main frequency of the controller of the equipment where the WIFI module is located is lower than a preset frequency;
the number of the protocols to be authenticated is multiple, and the difference between the number of the protocols to be authenticated and the number of cores of the controller of the device of the WIFI module is larger than a preset difference.
In one embodiment, the processor 101 may be configured to invoke a time synchronization program of a device stored in the memory 102 and perform the following operations:
determining a part of first threads corresponding to the protocol to be authenticated from threads corresponding to the protocol to be authenticated, and determining a second thread corresponding to the first threads, wherein the second threads correspond to the rest of the protocol to be authenticated;
and after the second thread monitors that the protocol to be authenticated corresponding to the first thread completes security authentication, releasing an operation memory occupied by the protocol to be authenticated corresponding to the first thread so as to perform security authentication on the protocol to be authenticated corresponding to the second thread.
In one embodiment, the processor 101 may be configured to invoke a time synchronization program of a device stored in the memory 102 and perform the following operations:
and the running memory occupied by the protocol to be authenticated corresponding to the first thread is larger than or equal to the running memory occupied by the protocol to be authenticated corresponding to the second thread.
In one embodiment, the processor 101 may be configured to invoke a time synchronization program of a device stored in the memory 102 and perform the following operations:
dividing each protocol to be authenticated into different authentication batches, wherein part of the protocols to be authenticated are each protocol to be authenticated in the authentication batch authenticated first;
and sequentially authenticating the protocols to be authenticated of each authentication batch, wherein the WIFI module authenticates each protocol to be authenticated in each authentication batch at the same time.
In one embodiment, the processor 101 may be configured to invoke a time synchronization program of a device stored in the memory 102 and perform the following operations:
the authentication priority of each of the protocols to be authenticated is higher than the authentication priority of the rest of the protocols to be authenticated.
In one embodiment, the processor 101 may be configured to invoke a time synchronization program of a device stored in the memory 102 and perform the following operations:
the authentication priority of the protocol to be authenticated is determined according to the connection duration between the WIFI module and the server corresponding to the protocol to be authenticated, and the authentication priority of the protocol to be authenticated corresponding to the connection duration is higher as the connection duration is smaller.
In one embodiment, the processor 101 may be configured to invoke a time synchronization program of a device stored in the memory 102 and perform the following operations:
after the WIFI module is networked, acquiring a network address corresponding to the WIFI module;
and determining a protocol to be authenticated of the WIFI module according to the network address.
According to the scheme, when the number of the protocols to be authenticated of the WIFI module is multiple and the security authentication cannot be performed at the same time, the partial protocols to be authenticated and the rest of the protocols to be authenticated are staggered to perform the security authentication, and after the partial protocols to be authenticated complete the security authentication, the running memory of the WIFI module is released for the rest of the protocols to be authenticated to perform the security authentication; because the WIFI module staggers a plurality of protocols to be authenticated for safety authentication, the low-cost WIFI module does not need to simultaneously carry out safety authentication on the protocols to be authenticated, the performance requirement on the WIFI module is low, and the low-cost WIFI module can complete safety authentication of the protocols.
Based on the hardware architecture of the device, the embodiment of the multi-protocol authentication method of the WIFI module is provided.
Referring to fig. 2, fig. 2 is a first embodiment of a multi-protocol authentication method of a WIFI module according to the present application, where the multi-protocol authentication method of the WIFI module includes the following steps:
step S10, after the WIFI module is networked, determining a protocol to be authenticated of the WIFI module;
in the application, the execution main body is equipment, the equipment is provided with a WIFI module, and the equipment can be home appliances with communication functions such as an air conditioner and a television.
When the device is connected with the network through the WIFI module, the device obtains a network address corresponding to the WIFI module, and the device can determine a protocol to be authenticated of the WIFI module. Taking the equipment as an air conditioner for example, the air conditioner can be controlled by the Jingdong control APP, and also can be controlled by the Ali control APP, namely the WIFI module needs to support the protocol of the Jingdong control server and the protocol of the Ali control server.
And step S20, when the number of protocols to be authenticated of the WIFI module is multiple and the security authentication cannot be performed at the same time, staggering part of the protocols to be authenticated and the rest of the protocols to be authenticated to perform the security authentication, wherein after the part of the protocols to be authenticated completes the security authentication, releasing the operation memory occupied by the part of the protocols to be authenticated to allow the rest of the protocols to be authenticated to perform the security authentication.
After determining the protocols to be authenticated of the WIFI module, the device determines the number of the protocols to be authenticated, and if the protocols to be authenticated are a plurality of, further judges whether the WIFI module can authenticate the protocols to be authenticated simultaneously. Specifically, the device determines the hardware parameters of its own controller, where the hardware parameters are the number of cores and the dominant frequency of the controller, for example, the controller is an 8-core controller, and then the number of cores of the controller is 8. When the device performs security authentication of the WIFI module, the WIFI module needs to perform key negotiation with a server corresponding to the protocol, the key negotiation needs to occupy an operation memory of the WIFI module, the more bits of the key are, the larger the operation memory is occupied, for example, the key protocols of some protocols need to occupy an operation memory of 6M, the key protocols of some protocols need to occupy an operation memory of 12M, and it can be understood that the larger the operation memory occupied by the key negotiation is, the higher the security of encrypted communication corresponding to the protocol is. When the main frequency of the controller is lower than the preset frequency, the authentication speed of the protocol to be authenticated of the WIFI module is low, and the WIFI module cannot authenticate a plurality of protocols at the same time; in addition, when the difference between the protocol to be authenticated and the core number of the WIFI module is larger than the preset difference, the controller cannot control the WIFI module to simultaneously authenticate all protocols. In addition, the device determines that the operating memory of the WIFI module is occupied when each protocol to be authenticated performs security authentication, and if the sum of the operating memories is greater than the operating memory of the WIFI module, the WIFI module cannot perform authentication on each protocol to be authenticated at the same time.
It can be understood that when the sum of the operation memories of the WIFI modules occupied when each protocol to be authenticated performs security authentication is greater than the operation memory of the WIFI module, the number of protocols to be authenticated is multiple, the main frequency of the controller of the device where the WIFI module is located is lower than the preset frequency, and the number of protocols to be authenticated is multiple, and the difference between the number of protocols to be authenticated and the number of cores of the controller of the device is greater than the preset difference, the WIFI module can determine that the WIFI module cannot perform security authentication on the multiple protocols to be authenticated simultaneously, and the three conditions can embody that the performance of the WIFI module is lower, that is, the WIFI module is a low-cost WIFI module.
The device can divide each protocol to be authenticated into a part of protocols to be authenticated and the rest protocols to be authenticated in a staggered way to perform security authentication, the number of the part of protocols to be authenticated is one or more, and the WIFI module performs authentication on the part of protocols to be authenticated at the same time. It should be noted that, the device needs to determine the number of the to-be-authenticated protocols of the part according to the number of cores of the controller, the main frequency of the controller and the running memory of the WIFI module, for example, the number of to-be-authenticated protocols is 6, the number of cores of the controller defines that the WIFI module can simultaneously perform security authentication of 4 to-be-authenticated protocols, the main frequency of the controller defines that the WIFI module can simultaneously perform security authentication of 5 to-be-authenticated protocols, then the device primarily determines the number of the to-be-authenticated protocols of the part to be 4, and the running memory of the WIFI module is 16M, then the device determines the sum of the running memories of the to-be-authenticated protocols, and selects each to-be-authenticated protocol, of which the sum of the running memories occupied when performing security authentication is less than 16M, as part of the to-be-authenticated protocols, and the rest is the remaining to-be-authenticated protocol. Further, if some of the protocols to be authenticated are authenticated, the remaining protocols to be authenticated can be authenticated, and the current part of the protocols to be authenticated needs to be determined in the last remaining protocols to be authenticated, and the remaining protocols to be authenticated are the current remaining protocols to be authenticated until all the protocols to be authenticated are authenticated to complete security authentication. After the security authentication is completed by a part of the protocol to be authenticated, the operation content of the WIFI module occupied by the protocol to be authenticated during the security authentication is released for the rest of the protocol to be authenticated to perform the security authentication.
The WIFI module performs security authentication of a protocol to be authenticated, and the method comprises the following steps:
1. applying for occupying an operation memory of the WIFI module in a security authentication process of a protocol to be authenticated;
2. initiating a connection request by a server corresponding to a protocol to be authenticated;
3. after the WIFI module is connected with the server, the WIFI module sends a certificate to the server, so that the server checks the certificate;
4. after the certificate is successfully checked, the WIFI module performs key negotiation with the server;
5. after the key agreement is completed, the WIFI module performs handshake with the server;
6. and after the handshake is finished, releasing the running memory of the WIFI module, and starting the encrypted communication between the WIFI module and the server.
In the technical scheme provided by the embodiment, when the number of protocols to be authenticated of the WIFI module is multiple and the security authentication cannot be performed at the same time, part of the protocols to be authenticated and the rest of the protocols to be authenticated are staggered to perform the security authentication, and after the part of the protocols to be authenticated complete the security authentication, the running memory of the WIFI module is released for the rest of the protocols to be authenticated to perform the security authentication; because the WIFI module staggers a plurality of protocols to be authenticated for safety authentication, the low-cost WIFI module does not need to simultaneously carry out safety authentication on the protocols to be authenticated, the performance requirement on the WIFI module is low, and the low-cost WIFI module can complete safety authentication of the protocols.
Referring to fig. 3, fig. 3 is a second embodiment of a multi-protocol authentication method of a WIFI module according to the present application, based on the first embodiment, the step S20 includes:
step S21, determining a part of first threads corresponding to the protocol to be authenticated from threads corresponding to the protocol to be authenticated, and determining second threads corresponding to the first threads, wherein the second threads correspond to the rest of the protocol to be authenticated;
step S22, after the second thread monitors that the security authentication is completed by the protocol to be authenticated corresponding to the first thread, releasing the running memory occupied by the protocol to be authenticated corresponding to the first thread, so as to perform security authentication on the protocol to be authenticated corresponding to the second thread.
In this embodiment, the security authentication of the WIFI module in multiple protocols is used as a process. The process comprises a plurality of threads, corresponding threads can be set for each protocol to be authenticated, partial threads corresponding to each protocol to be authenticated are defined as first threads, and the rest threads corresponding to each protocol to be authenticated are defined as second threads. The device sets a corresponding second thread for each first thread through thread control and monitoring safety authentication of a protocol to be authenticated. It will be appreciated that the number of first threads is less than or equal to the number of second threads, each first thread setting a corresponding second thread, and when the number of first threads is greater than the number of second threads, then part of the first threads set a corresponding second thread.
When authentication of a part of protocols to be authenticated is carried out, a first thread corresponding to the part of protocols to be authenticated and a second thread corresponding to the first thread are started, the first thread is connected with a server of the protocols to be authenticated corresponding to the first thread, so that the WIFI module carries out safety authentication on the protocols to be authenticated corresponding to the first thread, and when the second thread monitors that the protocols to be authenticated of the part corresponding to the first thread are finished safety authentication, the second thread is connected with the server of the protocols to be authenticated corresponding to the second thread to carry out safety authentication. It can be understood that, when the to-be-authenticated protocol of the first thread control part performs security authentication, the second thread plays a role of monitoring whether the to-be-authenticated protocol corresponding to the first thread completes security authentication.
It should be noted that, the security authentication is performed on each of the to-be-authenticated protocols of the portion at the same time, and after the authentication is completed on one of the to-be-authenticated protocols of the portion, the remaining to-be-authenticated protocols of the second thread corresponding to the to-be-authenticated protocols of the completed authentication can be authenticated, but the device needs to confirm whether the remaining operation memory of the WIFI module is greater than the operation memory to be occupied by the to-be-authenticated protocol corresponding to the second thread, if so, the security authentication is directly performed on the to-be-authenticated protocol corresponding to the second thread; if the operation memory is smaller than the operation memory occupied by the to-be-authenticated protocol corresponding to the second thread, the to-be-authenticated protocol corresponding to the second thread needs to be subjected to security authentication to release the operation memory of the WIFI module after one or more parts of to-be-authenticated protocols are required to finish security authentication.
According to the technical scheme provided by the embodiment, the device sets the first thread for part of the protocol to be authenticated, sets the second thread for the rest of the protocol to be authenticated, and sets the second thread for the first thread Cheng Shezhi, and if the second thread monitors that the protocol to be authenticated corresponding to the first thread completes the security authentication, the security authentication is performed for the protocol to be authenticated corresponding to the second thread, so that the WIFI module realizes seamless security authentication of the part of the protocol to be authenticated and the rest of the protocol to be authenticated, and the total duration of protocol authentication of the WIFI module is shortened.
In an embodiment, after the security authentication is completed by the portion of the protocol to be authenticated corresponding to the first thread, it needs to determine whether the remaining operation memory of the WIFI module is greater than the operation memory of the WIFI module occupied by the security authentication of the protocol to be authenticated of the second thread corresponding to the first thread, and when the number of protocols to be authenticated is greater, the device needs to consume a large amount of resources to calculate and interpret the remaining operation memory of the WIFI module. In this embodiment, the device determines the running memory that needs to be occupied by the protocol to be authenticated corresponding to the first thread, and uses the thread corresponding to the remaining protocols to be authenticated smaller than the running memory as the second thread corresponding to the first thread, so that after the protocol to be authenticated corresponding to the first thread completes the security authentication, the WIFI module can immediately perform the security authentication of the protocol to be authenticated of the second thread corresponding to the first thread, thereby saving the resources of the device.
Referring to fig. 4, fig. 4 is a third embodiment of a multi-protocol authentication method of a WIFI module according to the present application, based on the first embodiment, the step S20 includes:
step S23, dividing each protocol to be authenticated into different authentication batches, wherein part of the protocols to be authenticated are each protocol to be authenticated in the authentication batch authenticated first;
step S24, sequentially authenticating the protocols to be authenticated of each authentication batch, where the WIFI module simultaneously authenticates each protocol to be authenticated in the authentication batch.
In this embodiment, the device divides each protocol to be authenticated into different authentication batches, and part of the protocols to be authenticated are divided into the same authentication batch, and part of the protocols to be authenticated are the first authenticated protocols, while the rest of the protocols to be authenticated may be divided into one or more authentication batches. Each protocol to be authenticated is divided by the hardware parameters of the controller of the device and the running memory of the WIFI module, and specific dividing flow refers to the foregoing, which is not described in detail herein.
It should be noted that, the WIFI module performs simultaneous authentication on each protocol to be authenticated in the same authentication batch, and releases the running memory after completing the security authentication of each protocol to be authenticated in one authentication batch, and then performs the security authentication of each protocol to be authenticated in the next authentication batch, thereby completing the security authentication of each protocol to be authenticated.
In the technical scheme provided by the embodiment, the equipment divides each protocol to be authenticated into different authentication batches, so that the protocol to be authenticated of each authentication batch is sequentially subjected to security authentication, the equipment realizes foolproof security authentication, and the equipment does not need to consume excessive resources to perform protocol authentication of the WIFI module.
In one embodiment, authentication priority determination may be performed for each protocol to be authenticated. The device can determine the authentication priority according to the connection time between the WIFI module and the server corresponding to the protocol to be authenticated, and the authentication priority of the protocol to be authenticated is higher as the connection time is smaller, and the protocol to be authenticated is authenticated earlier. The equipment takes the protocol to be authenticated with higher authentication priority as part of the protocols to be authenticated, the rest is the rest of the protocols to be authenticated, and the authentication priority of the rest of protocols to be authenticated is higher than that of the rest of protocols to be authenticated.
In the technical scheme provided by the embodiment, the device uses the protocol to be authenticated with higher authentication priority as the protocol for preferential authentication, and the WIFI module can complete the authentication of the protocol to be authenticated faster because the connection time between the server corresponding to the protocol to be authenticated with higher authentication priority and the WIFI module is shorter, so that the user can control the device in a short time by controlling the APP.
The application also provides equipment, which comprises a WIFI module, a memory, a processor and a multi-protocol authentication program of the WIFI module, wherein the multi-protocol authentication program of the WIFI module is stored in the memory and can run on the processor, the WIFI module is connected with the processor, and when the multi-protocol authentication program of the WIFI module is executed by the processor, the steps of the multi-protocol authentication method of the WIFI module described in the embodiment above are realized.
The application also provides a computer readable storage medium, wherein the computer readable storage medium stores a multi-protocol authentication program of the WIFI module, and the steps of the multi-protocol authentication method of the WIFI module are realized when the multi-protocol authentication program of the WIFI module is executed by a processor.
The foregoing embodiment numbers of the present application are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as described above, comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present application.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the application, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (10)

1. The multi-protocol authentication method of the WIFI module is characterized by comprising the following steps of:
after the WIFI module is connected with the network, determining a protocol to be authenticated of the WIFI module;
when a plurality of protocols to be authenticated of the WIFI module are provided and the security authentication cannot be performed at the same time, staggering part of the protocols to be authenticated and the rest of protocols to be authenticated to perform the security authentication;
the step of staggering part of the protocol to be authenticated and the rest of the protocols to be authenticated to carry out security authentication comprises the following steps:
setting corresponding threads for each protocol to be authenticated respectively, taking part of threads corresponding to the protocol to be authenticated as first threads, taking the rest of threads corresponding to the protocol to be authenticated as second threads, and setting the corresponding second threads for each first thread;
performing security authentication through the protocol to be authenticated corresponding to the first thread control, and monitoring whether the protocol to be authenticated of the corresponding first thread is authenticated or not through the second thread;
for any second thread, after the second thread monitors that the security authentication of the protocol to be authenticated corresponding to the first thread is completed, determining whether the remaining operation memory of the WIFI module is larger than the operation memory required to be occupied by the security authentication of the protocol to be authenticated corresponding to the second thread;
if the security authentication request is larger than the first thread, releasing the operation memory occupied by the first thread corresponding to the protocol to be authenticated after the security authentication is completed, so as to perform security authentication on the protocol to be authenticated corresponding to the second thread;
if the security authentication request is smaller than the first security authentication request, waiting for one or more first threads to finish security authentication so as to release the running memory of the WIFI module, and performing security authentication of the protocol to be authenticated corresponding to the second thread until the remaining running memory of the WIFI module is larger than the running memory required by the protocol to be authenticated corresponding to the second thread for security authentication.
2. The multi-protocol authentication method of a WIFI module according to claim 1, wherein the to-be-authenticated protocol of the WIFI module cannot perform security authentication simultaneously, including at least one of:
the sum of the operation memories of the WIFI modules occupied by each protocol to be authenticated for security authentication is larger than the operation memory of the WIFI modules;
the number of the protocols to be authenticated is multiple, and the main frequency of the controller of the equipment where the WIFI module is located is lower than a preset frequency;
the number of the protocols to be authenticated is multiple, and the difference between the number of the protocols to be authenticated and the number of cores of the controller of the device of the WIFI module is larger than a preset difference.
3. The multi-protocol authentication method of the WIFI module of claim 1, wherein an operating memory occupied by the protocol to be authenticated corresponding to the first thread is greater than or equal to an operating memory occupied by the protocol to be authenticated corresponding to the second thread.
4. The multi-protocol authentication method of the WIFI module according to claim 1 or 2, wherein the step of staggering part of the protocol to be authenticated from the rest of the protocols to be authenticated for security authentication includes:
dividing each protocol to be authenticated into different authentication batches, wherein part of the protocols to be authenticated are each protocol to be authenticated in the authentication batch authenticated first;
and sequentially authenticating the protocols to be authenticated of each authentication batch, wherein the WIFI module authenticates each protocol to be authenticated in each authentication batch at the same time.
5. The WIFI module multiprotocol authentication method of claim 1, wherein authentication priority of each of the protocols to be authenticated is higher for part than authentication priority of each of the remaining protocols to be authenticated.
6. The multi-protocol authentication method of the WIFI module according to claim 5, wherein the authentication priority of the protocol to be authenticated is determined according to a connection duration between the WIFI module and a server corresponding to the protocol to be authenticated, the smaller the connection duration, the higher the authentication priority of the protocol to be authenticated corresponding to the connection duration.
7. The multi-protocol authentication method of a WIFI module according to claim 1, 2, 3, or 6, wherein the multi-protocol authentication method of a WIFI module further comprises:
after the WIFI module is networked, acquiring a network address corresponding to the WIFI module;
and determining a protocol to be authenticated of the WIFI module according to the network address.
8. A device comprising a WIFI module, a memory, a processor, and a multi-protocol authentication program of the WIFI module stored in the memory and executable on the processor, the WIFI module being connected to the processor, the multi-protocol authentication program of the WIFI module, when executed by the processor, implementing the steps of the multi-protocol authentication method of the WIFI module according to any one of claims 1-7.
9. The device of claim 8, wherein the device is a home appliance.
10. A computer readable storage medium, characterized in that the computer readable storage medium stores a multi-protocol authentication procedure of a WIFI module, which when executed by a processor, implements the steps of the multi-protocol authentication method of a WIFI module according to any of claims 1-7.
CN201910431792.0A 2019-05-21 2019-05-21 Device, multi-protocol authentication method of WIFI module and computer readable storage medium Active CN111988778B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910431792.0A CN111988778B (en) 2019-05-21 2019-05-21 Device, multi-protocol authentication method of WIFI module and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910431792.0A CN111988778B (en) 2019-05-21 2019-05-21 Device, multi-protocol authentication method of WIFI module and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN111988778A CN111988778A (en) 2020-11-24
CN111988778B true CN111988778B (en) 2023-09-26

Family

ID=73436407

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910431792.0A Active CN111988778B (en) 2019-05-21 2019-05-21 Device, multi-protocol authentication method of WIFI module and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111988778B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107222376A (en) * 2017-05-12 2017-09-29 广东美的制冷设备有限公司 Multiple protocols of operation control device and method
CN107608785A (en) * 2017-08-15 2018-01-19 深圳天珑无线科技有限公司 Process management method, mobile terminal and readable storage medium
CN107807857A (en) * 2017-11-29 2018-03-16 努比亚技术有限公司 Method, equipment and the computer for clearing up running memory can storage mediums
WO2018196587A1 (en) * 2017-04-25 2018-11-01 华为技术有限公司 User authentication method and apparatus in converged network
CN109213539A (en) * 2016-09-27 2019-01-15 华为技术有限公司 A kind of method for recovering internal storage and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109213539A (en) * 2016-09-27 2019-01-15 华为技术有限公司 A kind of method for recovering internal storage and device
WO2018196587A1 (en) * 2017-04-25 2018-11-01 华为技术有限公司 User authentication method and apparatus in converged network
CN107222376A (en) * 2017-05-12 2017-09-29 广东美的制冷设备有限公司 Multiple protocols of operation control device and method
CN107608785A (en) * 2017-08-15 2018-01-19 深圳天珑无线科技有限公司 Process management method, mobile terminal and readable storage medium
CN107807857A (en) * 2017-11-29 2018-03-16 努比亚技术有限公司 Method, equipment and the computer for clearing up running memory can storage mediums

Also Published As

Publication number Publication date
CN111988778A (en) 2020-11-24

Similar Documents

Publication Publication Date Title
CN105099985B (en) Multiple utility program logs in implementation method and device
CN110855536B (en) Operation control method and device, household appliance and storage medium
EP3276917A1 (en) Terminal remote assistance method, device and system
CN108881228B (en) Cloud registration activation method, device, equipment and storage medium
US20170141932A1 (en) Internet Access Traffic Sharing Method, Device and Terminal
CN105306320B (en) A kind of method and device for binding client for smart machine
CN110831245B (en) Network connection method, device and router
WO2017219701A1 (en) Method and device for updating system message
CN105516960A (en) Non-perceptual authentication method system, management method and system based on the method system
CN103813481A (en) Intelligent terminal device and business processing method thereof
CN110830336A (en) WiFi equipment management method and device for smart home
CN106464556B (en) Node network access method, device and system
US20150106529A1 (en) Terminal apparatus and method for connecting to virtual server in virtual desktop infrastructure
CN113438314B (en) Equipment control method and device, storage medium and electronic device
WO2021103619A1 (en) Network configuration terminal, network configuration method for household appliance, and computer-readable storage medium
CN109219028B (en) Equivalent device Bluetooth communication method and device based on cloud
CN115603968A (en) Access control method, device, equipment and medium
CN111988778B (en) Device, multi-protocol authentication method of WIFI module and computer readable storage medium
CN104253702B (en) A kind of terminal management method and system
CN110602024B (en) Secondary authentication method and system for user terminal, access and mobility management device
CN104901920B (en) A kind of data transfer control method, device and electronic equipment
CN113779516A (en) Equipment control method and device, storage medium and electronic device
CN109089250B (en) Bluetooth communication method and device based on gateway scheduling
CN108900602B (en) Virtual link establishing method and related device
CN108674218B (en) Intelligent charging system and working method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant