CN112637853B - Networking and distribution method and related device - Google Patents

Networking and distribution method and related device Download PDF

Info

Publication number
CN112637853B
CN112637853B CN202011564906.8A CN202011564906A CN112637853B CN 112637853 B CN112637853 B CN 112637853B CN 202011564906 A CN202011564906 A CN 202011564906A CN 112637853 B CN112637853 B CN 112637853B
Authority
CN
China
Prior art keywords
private
network
authentication request
preset
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011564906.8A
Other languages
Chinese (zh)
Other versions
CN112637853A (en
Inventor
夏春江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Tuya Information Technology Co Ltd
Original Assignee
Hangzhou Tuya Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Tuya Information Technology Co Ltd filed Critical Hangzhou Tuya Information Technology Co Ltd
Priority to CN202011564906.8A priority Critical patent/CN112637853B/en
Publication of CN112637853A publication Critical patent/CN112637853A/en
Application granted granted Critical
Publication of CN112637853B publication Critical patent/CN112637853B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Abstract

The application discloses a networking and distribution method and a first closing device, wherein the method comprises the following steps: acquiring a target management frame sent by a control terminal; analyzing the target management frame to obtain a private identification; generating a networking authentication request based on the private identity; and sending the networking authentication request to gateway equipment to request connection with the gateway equipment. Through the technical scheme provided by the application, the risk in the network distribution and networking processes is reduced, and then safer network distribution for the network equipment to be distributed can be realized.

Description

Networking and distribution method and related device
Technical Field
The application relates to the technical field of intelligent security, in particular to a networking and distribution method and a related device.
Background
The existing wifi package product distribution network and networking mode mainly comprises a full-automatic distribution network and networking mode based on the wifi management frame after modification and encapsulation. But in the existing networking and distribution processes, there are two problems, firstly, the Beacon broadcasted by the router gateway is easily captured by surrounding wireless monitoring devices, and a great security risk exists. Secondly, the router gateway is connected through a wifi protocol in a standard encryption mode, pre-authentication is needed, the correctness of the wifi key is confirmed through four-way handshake, and finally encrypted data transmission can be carried out, so that the networking process is complex, the networking speed is low, networking and distribution network efficiency is low, and a technical scheme capable of solving the technical problems is needed.
Disclosure of Invention
The technical problem that this application mainly solves is to provide a networking, join in marriage net method and relevant device, has reduced the risk of joining in marriage net and networking in-process, and then can realize that it is safer to wait to join in marriage net equipment and join in marriage the net.
In order to solve the technical problems, one technical scheme adopted by the application is as follows: there is provided a networking method, the method comprising:
acquiring a target management frame sent by a control terminal;
analyzing the target management frame to obtain a private identification;
generating a networking authentication request based on the private identity;
and sending the networking authentication request to gateway equipment to request connection with the gateway equipment.
In order to solve the technical problems, another technical scheme adopted by the application is as follows: a method for distributing network is provided, the method comprises:
acquiring a networking authentication request sent by equipment to be distributed;
judging whether the networking authentication request comprises a preset private identification or not;
if yes, a response frame is sent to the network equipment to be allocated, and network bandwidth resources are configured for the network equipment to be allocated so as to finish networking authentication.
In order to solve the technical problem, another technical scheme adopted by the application is as follows: providing an electronic device comprising a processor, a memory coupled to the processor, and a communication circuit; wherein,
The communication circuit is used for communicating with other electronic equipment;
the memory is used for storing a computer program;
the processor is configured to run the computer program to perform the method as described above.
In order to solve the technical problem, a further technical scheme adopted by the application is as follows: there is provided a computer readable storage medium storing a computer program executable by a processor for implementing a method as described above.
The beneficial effects of this application are: in the technical scheme provided by the application, the control terminal is only used for networking the network equipment to be configured, namely, the gateway equipment is configured in the target management frame sent in the network configuration process, and the private identification carried in the acquired target management frame is analyzed, so that the risk of networking the network equipment to be configured and the risk of the gateway equipment in the network configuration process can be reduced well, and further safer network configuration for the network equipment to be configured can be realized.
Drawings
FIG. 1 is a flow chart of an embodiment of a networking method of the present application;
FIG. 2 is a flow chart illustrating another embodiment of a networking method according to the present application;
FIG. 3 is a flow chart illustrating a method of network configuration according to an embodiment of the present disclosure;
FIG. 4 is a schematic flow chart of another embodiment of a network distribution method according to the present application;
fig. 5 is a schematic flow chart diagram of another embodiment of a network allocation method according to the present application;
FIG. 6 is a flow chart illustrating a method for distributing a network according to another embodiment of the present disclosure;
FIG. 7 is a schematic diagram of an electronic device according to an embodiment of the present disclosure;
FIG. 8 is a schematic structural diagram of an embodiment of a computer readable storage medium according to the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. It is to be understood that the specific embodiments described herein are for purposes of illustration only and are not limiting. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
In the description of the present application, the meaning of "plurality" means at least two, for example, two, three, etc., unless specifically defined otherwise. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the present application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
Referring to fig. 1, fig. 1 is a schematic flow chart of an embodiment of a networking method of the present application. In the current embodiment, the method provided by the present application includes steps S110 to S140.
S110: and acquiring a target management frame sent by the control terminal.
In the technical scheme provided by the application, when the network equipment to be distributed needs to be connected to the gateway equipment, or when the gateway equipment is used for distributing the network for each network equipment to be distributed again, the control terminal can send the target management frame outwards, so that the private identification for networking is sent to the control terminal, and meanwhile, the private identification required by the network equipment to be distributed is sent to the gateway equipment. It should be noted that the number of the network devices to be configured may be one or more. In the technical scheme provided by the application, the number of the network equipment to be distributed is not limited, and can be set according to actual requirements.
Furthermore, the control terminal can send the target management frame outwards only when the network equipment to be distributed needs to be connected to the gateway equipment to be connected to the network or the gateway equipment is used for distributing the network again for each network equipment to be distributed, and at other times, the control terminal can not send the target management frame outwards, so that the target management frame is prevented from being monitored by other irrelevant equipment.
Further, each device to be configured is configured to monitor the signaling broadcasted by the external control terminal, so as to obtain the target management frame broadcasted by the control terminal.
Further, in another embodiment, the control terminal may also be a targeted transmission management frame. Specifically, the control terminal directly sends the target management frame to the to-be-configured device and the gateway device. During the period, the control terminal does not send the target management frame to other devices, so that other irrelevant devices are prevented from acquiring the target management frame, and the control terminal can further reduce the risk of networking of the to-be-networked devices by directionally sending the target management frame, so that the networking security of the to-be-networked devices is improved.
The network equipment to be allocated is equipment which needs to be accessed to the gateway equipment. In some embodiments, the network device to be configured may also be understood as a device connected to a gateway device, where network bandwidth resources need to be adjusted, such as: when the gateway device needs to adjust the network resources of one or more connected devices, the device that needs to adjust the bandwidth resources and is connected to the gateway device is also called a network to be configured device. Further, the network device to be configured includes: network camera, network television, intelligent sound box, cat fairy, etc. Further, when the network device to be configured includes a plurality of network devices, it is not limited herein that the plurality of network devices to be configured are the same type of devices, i.e. the plurality of network devices to be configured under the same gateway device may be different types of devices.
The control terminal is a terminal capable of sending message instructions to the equipment to be distributed and the gateway equipment. Further, the control terminal includes one or more of a smart phone, a tablet computer, a computer device, and the like. Furthermore, the control terminal is a terminal running the corresponding APP in the scheme and corresponding to the login APP account, if a plurality of control terminals exist, the currently effective control terminal is the terminal logged in the APP account, and other terminals not logged in the APP account are corresponding to the terminals without permission to send the target management frame.
After the network device to be configured acquires the target management frame sent by the control terminal through monitoring, the following step S120 is further executed.
S120: and analyzing the target management frame to obtain the private identification.
After the network equipment to be configured acquires the target management frame sent by the control terminal, the acquired target management frame is further analyzed to acquire the private identification for networking from the target management frame. The target management frame is a data frame which is sent by the control terminal and carries a private identifier, wherein the private identifier is identifier information which is set by a user through the control terminal and is used for networking authentication. The specific content of the private label is set by the user and is not listed here. As in an embodiment, the private identity may be "tuya"; in another embodiment, the private identity may also be "security"; in yet another embodiment, the private identity may also include a set symbol and/or number, such as may be "@ #", "@520".
Further, the target management frame includes: a probe request frame. It is understood that in other embodiments, the target management frame may also include other types of frames, not explicitly recited herein.
S130: a networking authentication request is generated based on the private identity.
After the network equipment to be configured acquires the private identification, a networking authentication request is further generated based on the private identification. The network authentication request is a request sent to the gateway device by the network device to be configured.
Further, the generating a networking authentication request based on the private identity further includes: the private identity is encapsulated into an association request frame as a networking authentication request.
Wherein the association request frame includes: association request frames.
Still further, when the associated request frame is association request frames, the above step is to encapsulate the private identity into reserved field of association request frames. Wherein the reserved field includes an SSID field.
Further, in an embodiment, when the private identifier includes the preset network bandwidth resource priority identifier information at the same time, the encapsulating the private identifier into the association request frame further includes: and encapsulating the network bandwidth resource priority identification information into an association request frame so as to identify the priority configuration sequence of the network bandwidth resources of different terminals to the gateway equipment. The private identification comprising the preset network bandwidth resource priority identification information is packaged into an association request frame, the network bandwidth resource priority of the network equipment to be allocated set by a user is fed back to the gateway equipment while the private identification for networking authentication is provided for the gateway equipment, and therefore the gateway equipment can allocate network bandwidth resources according to the network bandwidth resource priority without each network equipment to be allocated.
The network bandwidth resource priority identification information is preset by a user and is used for identifying the priority sequence of bandwidth resource allocation of one or more devices to be allocated. When the gateway equipment allocates network resources outwards, the gateway equipment allocates network resources for the to-be-allocated network equipment with higher network bandwidth resource priority. Further, when the network bandwidth resources are more intense in a certain period of time, the gateway device adjusts the proportion of the network bandwidth resources of each network device to be allocated (including the device with the current gateway device connected with the network device) according to the network bandwidth resource priority identification information in the received target management frame, so as to preferentially ensure the network bandwidth resources of the network device to be allocated with higher network bandwidth resource priority.
Further, in another embodiment, the network bandwidth resource priority identification information and the private identification are independent from each other, and at this time, the private identification is encapsulated into the association request frame, and at the same time, the network bandwidth resource priority identification information is also encapsulated into the association request frame. Furthermore, since the control terminal will send the target management frame to the network equipment to be configured and the gateway equipment for the network configuration, the gateway equipment can obtain the network bandwidth resource priority identification information in advance, so in an embodiment, the network equipment to be configured can only encapsulate the private identification for networking authentication into the association request frame, and does not need to encapsulate the network bandwidth resource priority identification information into the association request frame, thereby increasing security, adapting to user requirements and further improving networking rate.
S140: a networking authentication request is sent to the gateway device to request a connection with the gateway device.
After the network equipment to be distributed acquires the private identification and generates a networking authentication request based on the private identification, the generated networking authentication request is further sent to the gateway equipment, and then connection with the gateway equipment is requested.
Further, if the plurality of connected gateway devices can be selected at the same time, step S140 further includes: the networking authentication request is sent to multiple gateway devices simultaneously.
Further, if the plurality of connected gateway devices can be selected at the same time, step S140 further includes: the networking authentication request is sent to the gateway device with the best network signal.
Further, if the plurality of connected gateway devices can be selected at the same time, step S140 further includes: the networking authentication request is sent to the gateway device with the best historical quality of service.
Further, if the plurality of connected gateway devices can be selected at the same time, step S140 further includes: the networking authentication request is sent to the usual gateway device.
In an embodiment, when the to-be-configured network device is a network camera, the target management frame is a probe request frame, and the association request frame is association request frames, the technical scheme provided by the application is as follows: when the network distribution is needed, the control terminal encapsulates the private identification for networking authentication into a probe request frame, and the private identification is sent to the network equipment to be distributed and the gateway equipment by broadcasting the probe request frame. The network equipment to be distributed monitors the signaling broadcast by the external terminal equipment to acquire the target management frame. Specifically, after receiving a probe request frame broadcast by the control terminal, the network device to be configured further analyzes the probe request frame, further obtains a private identifier encapsulated in the probe request frame, encapsulates the obtained private identifier in an SSID field in a association request frame, and then sends association request frames (networking authentication request) with the private identifier encapsulated to the gateway device to request connection with the gateway device. After receiving association request frames sent by the network equipment to be allocated, the gateway equipment further analyzes association request frames to obtain private identifications, compares the private identifications obtained from association request frames with private identifications in a target management frame sent by the control terminal, and if the private identifications are identical, responds to a networking authentication request of the network equipment to be allocated and sends a response frame (association response frames) to the network equipment to be allocated, and allocates network bandwidth resources for the network equipment to be allocated; otherwise, if the two private identities obtained by comparison are inconsistent, the networking authentication request of the equipment to be distributed cannot be responded. When receiving the response frame sent by the gateway device, the network device to be configured currently can be identified to complete the networking pre-authentication. If the network device to be configured is a network camera and the gateway device is a router gateway, the network camera receives association response frames and then performs wifi pre-authentication.
According to the technical scheme provided by the application, the target management frame sent by the control terminal is acquired, the acquired target management frame is analyzed, then the private identification in the target management frame is acquired, finally, the networking authentication request is generated based on the acquired private identification, and the networking authentication request is sent to the gateway equipment to request connection with the gateway equipment.
Referring to fig. 2, fig. 2 is a schematic flow chart of another embodiment of a networking method according to the present application. In the current embodiment, the method provided by the present application includes:
s201: and acquiring a target management frame sent by the control terminal.
Step S201 in the present embodiment is the same as step S110 described above, and is not repeated here, and specific reference may be made to the description of the corresponding portions above.
Further, in an embodiment, when the network connection to be established between the network device to be configured and the gateway device is a wireless connection and the gateway device is a router gateway, after the step S201 obtains the target management frame sent by the terminal device, the method provided by the present application further includes: and switching the wireless module to a management mode. And after the network equipment to be distributed acquires the target management frame sent by the control terminal, switching the wireless module of the network equipment to be distributed to a management mode, namely switching wifi to a management mode.
In the current embodiment, to further increase the security of the distribution network, when the control terminal encapsulates the private identifier into the target management frame, the control terminal encodes the private identifier encapsulated into the target management frame first, thereby further increasing the security of the distribution network. Here, the encoding rule according to which the encoding operation is performed on the private label is preset, and is not limited herein. The step S120 of parsing the target management frame to obtain the private identity further includes steps S202 to S203.
S202: and analyzing the target management frame to obtain the preset mark.
After the target management frame is acquired, the target management frame is analyzed, and the preset mark is correspondingly acquired. The preset mark is the data obtained after the control terminal encodes the private label, and can be understood as the private label after the encoding operation is completed. In the present embodiment, after the network device to be configured acquires the target management frame, the network device to be configured correspondingly acquires the preset mark after analyzing the target management frame.
S203: decoding the preset mark to obtain the private identification.
After the preset mark is obtained, decoding operation is further carried out on the preset mark, and then the private identification for networking authentication is obtained. The decoding operation executed by the equipment end of the network to be distributed corresponds to the encoding operation at one side of the control terminal.
S204: a networking authentication request is generated based on the private identity.
S205: a networking authentication request is sent to the gateway device to request a connection with the gateway device.
Step S204 to step S205 are the same as step S130 and step S140, respectively, and specific reference may be made to the description of the corresponding parts above, and the details are not repeated here.
S206: and monitoring whether a response frame sent by the gateway equipment is received within a set time.
After the network equipment to be distributed sends the networking authentication request to the gateway equipment, the network equipment to be distributed further monitors whether a response frame sent by the gateway equipment is received within a set time. The preset time is a preset waiting time, and the length of the preset time is not limited herein, and is specifically set according to the actual situation. The response frame is a data frame that the gateway device determines that a private identifier to be checked included in a networking authentication request sent by the device to be distributed is consistent with a private identifier sent by the control terminal, and sends the data frame to the device to be distributed after responding to the networking authentication request of the device to be distributed so as to inform the device to be distributed of responding to the networking authentication request.
S207: if not, resending the networking authentication request to the gateway equipment.
If the network to be configured does not receive the response frame sent by the gateway device within the set time, the network to be configured resends the network authentication request generated in step S204 to the gateway device.
Further, if the gateway equipment is not received within the set time after the monitoring, the network authentication request is stopped from being resent, and the network authentication request cannot be connected to the gateway equipment in a feedback manner to the control terminal, so that the user can acquire the new private identification sent by the control terminal. In another embodiment, if the monitoring results in that the gateway device is not received within a set number of set times, the network authentication request is stopped from being resent, and the control terminal is fed back that the network authentication request cannot be connected to the gateway device, so as to prompt the user that the gateway device is abnormal, and check the gateway device.
In the current embodiment, the private identifier is encoded and then encapsulated into the target management frame and is sent to the to-be-distributed network device, the to-be-distributed network device correspondingly analyzes the target management frame to obtain the preset mark after obtaining the target management frame, then performs corresponding decoding operation on the preset mark to further obtain the private identifier, then generates a networking authentication request based on the private identifier, and then sends the networking authentication request to the gateway device to request connection with the gateway device. In the current embodiment, the private identifier is sent after being encoded, and corresponding decoding operations are correspondingly executed at the device end to be allocated and the gateway device end to obtain the private identifier, so that other devices cannot obtain the private identifier due to the fact that correct decoding operations cannot be executed after monitoring the target management frame, the unrelated devices are prevented from being connected to the gateway device, the security of the allocation network can be further improved, and excessive network bandwidth resources are prevented from being occupied by other devices.
Referring to fig. 3, fig. 3 is a flow chart illustrating an embodiment of a method for configuring a network according to the present application.
In the current embodiment, before the gateway device performs network provisioning for the network to be provisioned device, that is, before performing step S310, the method provided in the present application further includes: receiving a target management frame sent by a control terminal; analyzing the target management frame to obtain a preset private identification, and storing the preset private identification so as to be called in the process of responding to the networking authentication request.
As described above, in an embodiment, the control terminal may send the target management frame to the network device to be configured and the gateway device simultaneously by broadcasting, that is, the target management frame is sent by the control terminal to the network device to be configured and the gateway device by broadcasting. The target management frame is a data frame carrying a private identifier, the target management frame is a data frame only sent in a network allocation stage, and the control terminal cannot send the target management frame outwards in other time periods. Further, the target management frame includes a probe request frame.
Further, in another embodiment, the target management frame may also be sent to the network device to be configured and the gateway device by the control terminal.
After receiving the target management frame sent by the control terminal, the gateway device further analyzes the target management frame, further obtains a private identifier encapsulated in the target management frame, and stores the private identifier so as to be called in the process of responding to the networking authentication request of the network equipment to be configured, namely, after obtaining the private identifier preset in the networking authentication request sent by the network equipment to be configured, comparing the preset private identifier obtained from the networking authentication request with the private identifier obtained from the target management frame, and judging whether the network authentication request of the network equipment to be configured needs to be responded according to the comparison result.
Specifically, in the current embodiment, the method provided by the present application includes steps S310 to S330.
S310: and acquiring a networking authentication request sent by the equipment to be distributed.
As described above, after receiving the target management frame sent by the control terminal and analyzing the target management frame to obtain the private identifier, and further storing the private identifier, the gateway device updates the obtained private identifier to the latest comparison identifier of the networking authentication. After the network device to be configured generates the network authentication request and sends the network authentication request to the gateway device, the gateway device detects whether the network authentication request of the network device to be configured is received, and if the gateway device obtains the network authentication request sent by the network device to be configured, step S320 is further executed. The networking authentication request is a request instruction sent to the gateway equipment in a targeted manner by the equipment to be configured, and is specifically used for requesting connection with the gateway equipment.
Further, the networking authentication request includes: and associating the request frame. Further, the association request frame includes: association request frames.
S320: and judging whether the networking authentication request comprises a preset private identification or not.
After the network authentication request sent by the network equipment to be configured is obtained, the gateway equipment further judges whether the network authentication request comprises a preset private identification. Specifically, after receiving the networking authentication request sent by the network equipment to be configured, the gateway equipment further analyzes the networking authentication request to judge whether the networking authentication request includes a preset private identifier. The preset private identity is a private identity sent by the control terminal through the target management frame.
Further, referring to fig. 4, fig. 4 is a flow chart illustrating another embodiment of a network distribution method according to the present application. In the present embodiment, the step S320 determines whether the network authentication request includes a preset private identifier, and further includes:
s401: and analyzing the networking authentication request to obtain the private identification to be checked.
The gateway equipment analyzes the received networking authentication request, and further obtains the private identification to be checked. The private identification to be verified is a mark for networking authentication, which is obtained by analyzing the self-networking authentication request.
S402: and comparing the private identification to be checked with a preset private identification.
Comparing the obtained private identification to be checked with a preset private identification obtained from the target management frame to judge whether the private identification to be checked is consistent with the preset private identification.
S403: if the private identification to be checked is consistent with the preset private identification, judging that the networking authentication request comprises the preset private identification.
If the private identification to be checked is judged to be consistent with the preset private identification, the networking authentication request is judged to include the preset private identification.
S404: otherwise, judging that the networking authentication request does not comprise the preset private identification.
If the comparison in step S402 shows that the private identity to be verified is inconsistent with the preset private identity, it is determined that the network authentication request does not include the preset private identity.
S330: if yes, sending a response frame to the equipment to be distributed, and configuring network bandwidth resources for the equipment to be distributed to complete networking authentication.
If the gateway equipment judges that the networking authentication request comprises the preset private identification, a response frame is sent to the equipment to be distributed so as to inform the equipment to be distributed that the gateway equipment responds to the networking authentication request. After the response frame is generated to the network equipment to be allocated, the gateway equipment further configures network bandwidth resources for the network equipment to be allocated so as to complete networking authentication. The preset private identification is identification information consistent with the private identification in the target management frame sent by the control terminal.
Further, in an embodiment, the private identifier includes preset network bandwidth resource priority identifier information, that is, the private identifier sent by the control terminal includes preset network bandwidth resource priority identifier information. Further, the network bandwidth resource priority identification information is correspondingly included in the network authentication request sent by the network equipment to be configured, and the network bandwidth resource priority identification information included in the network authentication request is obtained from the target management frame. Further, in another embodiment, the target management frame sent by the control terminal includes both the private identifier and the preset network bandwidth resource priority identifier information, and the network authentication request sent by the network equipment to be configured may correspondingly include the network bandwidth resource priority identifier information or may not include the network bandwidth resource priority identifier information, which is not specifically limited herein.
The configuring network bandwidth resources for the network device to be configured in the corresponding step S330 to complete the networking authentication further includes: and configuring network bandwidth resources for the equipment to be matched according to the preset network bandwidth resource priority identification information so as to finish networking authentication.
The network bandwidth resource priority identification information may be a priority for identifying the current network device to be configured. In other embodiments, the network bandwidth resource priority identification information may also be a provisioning priority of network bandwidth resources that identify one or more network devices to be provisioned.
If the network bandwidth resource priority identification information is a configuration priority for identifying network bandwidth resources of one or more network devices to be configured, and is used for identifying a configuration sequence of network bandwidth resources with high priority, the gateway device, when configuring network bandwidth resources for each network device to be configured, will preferably configure network bandwidth resources for the network device to be configured with higher network bandwidth resource priority. If the network equipment to be configured is a network camera, a user can set the highest allocation priority of the network bandwidth resources for the network camera arranged in the direction of the gate through the control terminal in advance, and correspondingly, the gateway equipment can allocate the network bandwidth resources for the network camera arranged in the gate preferentially, so that the network camera arranged in the gate can be guaranteed to be capable of well completing the work of shooting video and uploading video.
In yet another embodiment, the method provided herein further comprises: when network bandwidth resources are allocated or provided for each network device to be allocated, and the network bandwidth resources are in a shortage period, the gateway device correspondingly adjusts the network bandwidth resources to be allocated according to the received priority identification of the network bandwidth resources, and preferentially guarantees the network bandwidth resources of the network device to be allocated with higher priority of the network bandwidth resources.
Furthermore, the user can set each network device to be allocated to have different network bandwidth resource priorities in different time periods according to the actual application requirements. If the network camera is set to have the highest priority of network bandwidth resources in a time period of no one at home; and in the time period of someone in the home, the network television is set to have higher network bandwidth resource priority.
Referring to fig. 5, fig. 5 is a schematic flow chart of another embodiment of a network allocation method according to the present application. In the present embodiment, the method provided by the present application specifically includes the steps when the control terminal encodes and transmits the private identifier.
S501: and receiving a target management frame sent by the control terminal.
S502: analyzing the target management frame to obtain a preset private identification, and storing the preset private identification so as to be called in the process of responding to the networking authentication request.
After receiving the target management frame sent by the control terminal, the gateway equipment further analyzes the target management frame to obtain a preset private identification, and then stores the obtained preset private identification, and then calls the preset private identification in a subsequent networking authentication request responding to the network equipment to be allocated.
S503: and acquiring a networking authentication request sent by the equipment to be distributed.
Step S503 is the same as step S310 described above and will not be described here. The above step S320 includes steps S504 to S508 in the current embodiment. The step S401 parses the network authentication request to obtain the private identity to be verified, and further includes steps S504 to S505.
S504: and analyzing the networking authentication request to obtain a preset mark.
After the networking authentication request sent by the equipment to be distributed is obtained, the networking authentication request is further analyzed, so that a preset mark is obtained from the networking authentication request sent by the equipment to be distributed.
Further, in an embodiment, the networking authentication request includes association request frames. Correspondingly, analyzing association request frames sent by the network equipment to be configured to acquire a preset mark from an SSID field in association request frames. The preset mark is data obtained after the private label is decoded, and the preset mark can be understood as the coded private label.
S505: and decoding the preset mark to obtain the private identification to be checked.
After the preset mark is obtained, further performing corresponding decoding operation on the preset mark, and further obtaining the private identification to be verified.
S506: comparing the private identification to be checked with the preset private identification to judge whether the private identification to be checked is consistent with the preset private identification.
S507: and judging that the networking authentication request comprises a preset private identifier.
S508: and judging that the networking authentication request does not comprise the preset private identification.
After the private identification to be checked is obtained from the self-networking authentication request, the private identification to be checked is further compared with the preset private identification, so that whether the private identification to be checked is consistent with the preset private identification or not is judged. If the private identification to be checked is judged to be consistent with the preset private identification, if the networking authentication request is judged to include the preset private identification, step S509 is correspondingly executed; otherwise, if the private identification to be checked is inconsistent with the preset private identification, the current circulation is ended, and whether a new networking authentication request or a target management frame is received is continuously monitored.
S509: and sending a response frame to the equipment to be distributed, and configuring network bandwidth resources for the equipment to be distributed to complete networking authentication.
Step S509 is the same as step S330, and the description of the corresponding parts is omitted here.
Referring to fig. 6, fig. 6 is a schematic flow chart of an embodiment of a network allocation method according to the present application. In the current embodiment, the network allocation method provided by the application is described by taking the control terminal as an execution subject.
S610: and obtaining the private identification set by the user.
After the control terminal logs in the APP account, the user sets the required private identifier in the APP, and after the control terminal obtains the private identifier set by the user, the following step S120 is further executed. Specifically, some private identities which can be selected by the user are provided in the APP in advance, and the user can directly input the private identities which are needed by the user according to the needs of the user.
S620: and packaging the private identification into a target management frame, and sending the target management frame to the network equipment to be distributed and the gateway equipment.
After the control terminal obtains the private identification set by the user, the private identification is further packaged into the target management frame. After the private identification is encapsulated into the target management frame, the control terminal further transmits the target management frame to the equipment to be distributed and the gateway equipment.
In an embodiment, the control terminal may send the target management frame to the network device to be configured and the gateway device through directional sending.
In another embodiment, the control terminal may also broadcast and send the target management frame to the network device to be configured and the gateway device in the form of an external broadcast.
Further, in an embodiment, in order to further increase security, after obtaining the private identifier set by the user, the control terminal further performs an encoding operation on the private identifier, and encapsulates the encoded private identifier into the target management frame. In the current embodiment, the private identifier is encoded and then encapsulated into the target management frame, so that after other unrelated devices acquire the target management frame, the private identifier for networking authentication still cannot be acquired because the corresponding decoding rule is not known, and the networking security of the to-be-configured network device is further improved. It should be noted that, when the encoding operation executed by the control terminal is set, both the gateway device and the network device to be configured execute the corresponding decoding operation.
Further, in order to better meet the actual application requirements of the user, in the technical scheme provided by the application, the user can set the network bandwidth resource priority identification information of one or more devices to be matched at the same time when setting the private identification, and the control terminal can package the network bandwidth resource priority identification information to the target management frame at the same time. Specifically, the user can set different network bandwidth resource priorities for one or more devices to be matched according to the application requirements of the user.
Furthermore, the network bandwidth resource priority of one or more devices to be matched can be identified to the gateway device by setting the network bandwidth resource priority identification information in the private identification.
Taking a router gateway as an example, the technical scheme provided by the application can better improve the security problem of the distribution network, the networking speed problem and the data transmission efficiency problem in the prior art.
Specifically, the technical scheme provided by the application utilizes the probe request frame which is sent by the control terminal only in the network distribution stage and encapsulates the private identifier, and stops sending the probe request frame after networking is completed, so that the time is short, other devices cannot acquire the probe request frame at high frequency, and compared with the prior art, the safety of networking and network distribution is improved.
Meanwhile, in the technical scheme provided by the application, the private identification packaged to the probe request frame is in a nonstandard wifi key format, so that the application is difficult to confirm even if other equipment monitors the private identification, and the security of networking and distribution network is further improved.
According to the technical scheme, the existing complicated encryption mode of the wifi standard is abandoned, the private identification which can be updated conveniently and dynamically is utilized, the pre-authentication process can be carried out only by the target management frame comprising the private identification, networking can be completed only by carrying out pre-authentication in the non-traditional encryption mode (under the non-encryption mode), four-way handshake is not needed, networking speed is increased, and the existing technology is improved better.
Meanwhile, in the technical scheme provided by the application, the traditional encryption process (wherein the traditional encryption process refers to encrypting data by utilizing the wifi encryption protocol) is not required to be executed, but the encrypted data content is directly transmitted, namely the transmitted data content is encrypted, so that the throughput of data transmission can be improved by about 10%, and the efficiency problem of the existing data transmission can be better improved.
Referring to fig. 7, fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application. In the present embodiment, the electronic device 700 provided in the present application includes a processor 701, and a memory 702 and a communication circuit 703 coupled to the processor 701, that is, the memory 702 and the communication circuit 703 are connected to the processor 701, respectively. The electronic device 700 may be a network device to be configured to perform the networking method described in any one of the embodiments of fig. 1 to fig. 2 and the corresponding embodiment thereof, the electronic device 700 may also be a gateway device described in any one of the embodiments of fig. 3 to fig. 5 and the corresponding embodiment thereof, and the electronic device 700 may also be a control terminal for performing the network configuration method described in any one of the embodiments of fig. 6 and the corresponding embodiment thereof.
The processor 701 is connected to the memory 702 and the communication circuit 703, respectively.
The communication circuit 703 is configured to communicate with external electronic devices (also known as other nodes in a wireless ad hoc network) under the control of the processor 701 for transmission of data frames or instructions.
The memory 702 comprises a local store and stores a computer program which, when executed by the processor 701, performs the method as described in any of the embodiments above.
The processor 701 is configured to execute a computer program stored in the memory 702, to perform the method according to any one of the embodiments shown in fig. 1 to 6 and corresponding embodiments.
Further, when the electronic device 700 is a network device to be configured, the electronic device includes a webcam, an intelligent speaker, a kitten's smart, a network television, and the like.
Further, when the electronic device 700 is a gateway device, a router device is included in the electronic device 700.
Further, when the electronic device 700 is a control terminal, the electronic device 700 includes any one of a mobile phone, a computer, a tablet computer, and the like, or other devices that can perform the login APP and send the target management frame to the outside.
Referring to fig. 8, fig. 8 is a schematic structural diagram of an embodiment of a computer readable storage medium according to the present application. The computer readable storage medium 800 stores a computer program 801 that can be run by a processor, the computer program 801 being for implementing the method as described in any of the above fig. 1 to 6 and their corresponding embodiments. Specifically, the computer readable storage medium 800 may be one of a memory, a personal computer, a server, a network device, a usb disk, etc., which is not limited in this regard.
The foregoing description is only of embodiments of the present application, and is not intended to limit the scope of the patent application, and all equivalent structures or equivalent processes using the descriptions and the contents of the present application or other related technical fields are included in the scope of the patent application.

Claims (12)

1. A method of networking, the method comprising:
acquiring a target management frame sent by a control terminal;
analyzing the target management frame to obtain a private identifier, wherein the private identifier comprises preset network bandwidth resource priority identifier information, and the identifier information is used for indicating the priority order of bandwidth resource allocation of the equipment to be allocated;
generating a networking authentication request based on the private identity;
sending the networking authentication request to gateway equipment to request connection with the gateway equipment; the gateway device can configure network bandwidth resources for the network device to be configured based on a preset private identifier and the private identifier in the network authentication request, wherein the preset private identifier is obtained by analyzing the target management frame sent by the control terminal for the gateway device.
2. The method of claim 1, wherein the parsing the target management frame to obtain a private identity further comprises:
analyzing the target management frame to obtain a preset mark;
and decoding the preset mark to obtain the private identification.
3. The method of claim 1, wherein the generating a networking authentication request based on the private identity further comprises:
and encapsulating the private identity into an association request frame to serve as the networking authentication request.
4. The method of claim 3, wherein encapsulating the private identity with an association request frame comprises: and encapsulating the network bandwidth resource priority identification information into the association request frame so as to identify the priority configuration sequence of the network bandwidth resources of different terminals to the gateway equipment.
5. The method of claim 1, wherein after the sending the networking authentication request to a gateway device, the method further comprises:
monitoring whether a response frame sent by the gateway equipment is received within a set time;
if not, resending the networking authentication request to the gateway equipment.
6. A method of distributing a network, the method comprising:
acquiring a networking authentication request sent by equipment to be distributed, wherein the networking authentication request is generated by the equipment to be distributed based on a private identifier obtained by analyzing a target management frame sent by a control terminal;
judging whether the networking authentication request comprises a preset private identifier, wherein the preset private identifier is obtained by analyzing a target management frame sent by a control terminal by gateway equipment, the preset private identifier comprises preset network bandwidth resource priority identifier information, and the identifier information is used for indicating the priority order of bandwidth resource allocation of the equipment to be allocated;
if yes, a response frame is sent to the network equipment to be allocated, and network bandwidth resources are configured for the network equipment to be allocated so as to finish networking authentication.
7. The method of claim 6, wherein the method further comprises:
and storing the preset private identification so as to be called in the process of responding to the networking authentication request.
8. The method of claim 6, wherein the determining whether the networking authentication request includes a preset private identity further comprises:
Analyzing the networking authentication request to obtain a private identification to be checked;
comparing the private identification to be checked with the preset private identification;
if the private identification to be checked is consistent with the preset private identification, judging that the networking authentication request comprises the preset private identification; otherwise, judging that the networking authentication request does not comprise the preset private identification.
9. The method of claim 8, wherein the parsing the networking authentication request obtains a private identity to be verified, further comprising:
analyzing the networking authentication request to obtain a preset mark;
and decoding the preset mark to obtain the private identification to be checked.
10. The method of claim 6, wherein configuring network bandwidth resources for the network to-be-provisioned device to complete networking authentication, further comprises:
and configuring network bandwidth resources for the network equipment to be configured according to the preset network bandwidth resource priority identification information so as to finish networking authentication.
11. An electronic device comprising a processor and a memory and communication circuit coupled to the processor; wherein,
The communication circuit is used for communicating with other electronic equipment;
the memory is used for storing a computer program;
the processor is configured to run the computer program to perform the method of any one of claims 1 to 10.
12. A computer readable storage medium, characterized in that it stores a computer program executable by a processor for implementing the method of any one of claims 1 to 10.
CN202011564906.8A 2020-12-25 2020-12-25 Networking and distribution method and related device Active CN112637853B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011564906.8A CN112637853B (en) 2020-12-25 2020-12-25 Networking and distribution method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011564906.8A CN112637853B (en) 2020-12-25 2020-12-25 Networking and distribution method and related device

Publications (2)

Publication Number Publication Date
CN112637853A CN112637853A (en) 2021-04-09
CN112637853B true CN112637853B (en) 2023-05-12

Family

ID=75325029

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011564906.8A Active CN112637853B (en) 2020-12-25 2020-12-25 Networking and distribution method and related device

Country Status (1)

Country Link
CN (1) CN112637853B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115220419B (en) * 2021-12-13 2023-11-21 广州汽车集团股份有限公司 Whole vehicle offline configuration method and device based on wireless protocol and vehicle
CN115314341A (en) * 2022-06-19 2022-11-08 湖北鑫英泰系统技术股份有限公司 Preposed storage type operation and maintenance gateway based on user behavior simulation

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101577670A (en) * 2008-05-07 2009-11-11 华为技术有限公司 Method, device and system for bandwidth allocation

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2471486A (en) * 2009-06-30 2011-01-05 Nokia Corp Apparatus and method for resolving resource contention using access priority.
US9479937B2 (en) * 2014-08-22 2016-10-25 Ebay, Inc. Using a wireless beacon to provide access credentials to a secure network
CN106535288B (en) * 2015-09-10 2020-08-28 阿里巴巴集团控股有限公司 Method for sending and acquiring wifi networking information and corresponding device
US20180359764A1 (en) * 2016-02-18 2018-12-13 Comcast Cable Communications, Llc SSID Broadcast Management to Support Priority of Broadcast
GB2557353B (en) * 2016-12-08 2019-12-04 British Telecomm Configuration of wireless-equipped devices
EP3641366B1 (en) * 2017-05-25 2023-05-17 Huawei Technologies Co., Ltd. Wireless local area network configuration method and apparatus
CN108924907A (en) * 2018-06-22 2018-11-30 四川斐讯信息技术有限公司 A kind of fast access method of wireless network, system and for net equipment
CN112020120A (en) * 2019-05-28 2020-12-01 阿里巴巴集团控股有限公司 Network configuration method, device, equipment and system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101577670A (en) * 2008-05-07 2009-11-11 华为技术有限公司 Method, device and system for bandwidth allocation

Also Published As

Publication number Publication date
CN112637853A (en) 2021-04-09

Similar Documents

Publication Publication Date Title
US10154528B2 (en) Handling of proximity services device to device related identities at radio access network level
US10560929B2 (en) Resource request method and system, device, and network side node
US11902787B2 (en) Method and apparatus for handling security policies in V2X communication system
CN112637853B (en) Networking and distribution method and related device
CN113453360B (en) Data transmission method and device
US20210194645A1 (en) Improved assisted retransmission technique for cellular communications
US11770810B2 (en) Service data transmission method, first communications node, and base station
EP3799500A1 (en) Method and device for providing vehicle communication service
EP3709686B1 (en) Data transmission control method and related product
CN113727300A (en) Sidelink communication method and equipment
KR20200077259A (en) Apparatus and method for connetcting a network
WO2022067700A1 (en) Communication method, apparatus, and system
US20170127472A1 (en) Method and wireless device for controlling disconnection of a wireless device in a wi-fi direct group of a wireless network
US20230050923A1 (en) Media packet transmission method, apparatus, and system
WO2018049655A1 (en) Device networking method, apparatus and system
CN113382454A (en) Communication method and device
WO2022033374A1 (en) Network connection method in network sharing, electronic device, and storage medium
JP2021510013A (en) Network configuration method, equipment, network elements and systems
CN107113230B (en) Method, equipment and system for determining Generic Routing Encapsulation (GRE) tunnel identifier
CN115623542A (en) Communication method, device and system
EP4142428A1 (en) Communication method, device and system
CN115052252B (en) OTA (over the air) upgrading method, system and device
CN113348715B (en) Data transmission method, device and terminal
US20230117868A1 (en) Media packet transmission method, apparatus, and system
CN112135329B (en) Parameter transmission method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant