CN113891431A - Device wireless access method, device, computer device and storage medium - Google Patents

Device wireless access method, device, computer device and storage medium Download PDF

Info

Publication number
CN113891431A
CN113891431A CN202111163025.XA CN202111163025A CN113891431A CN 113891431 A CN113891431 A CN 113891431A CN 202111163025 A CN202111163025 A CN 202111163025A CN 113891431 A CN113891431 A CN 113891431A
Authority
CN
China
Prior art keywords
wireless
frame signal
key information
identifier
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111163025.XA
Other languages
Chinese (zh)
Inventor
全绍军
洪伟
徐云飞
廖伟健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Longse Technology Co ltd
Original Assignee
Longse Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Longse Technology Co ltd filed Critical Longse Technology Co ltd
Priority to CN202111163025.XA priority Critical patent/CN113891431A/en
Publication of CN113891431A publication Critical patent/CN113891431A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/10Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application relates to the technical field of wireless, and provides a device wireless access method, a device, computer equipment and a storage medium. The method and the device can realize the quick wireless access of the equipment, and improve the wireless access efficiency of the equipment. The method comprises the following steps: the method comprises the steps that a first device obtains an identifier which is pre-agreed with a second device and key information needed for accessing the first device, the identifier and the key information needed are arranged in a wireless frame signal, the wireless frame signal is broadcasted, the second device searches the wireless frame signal according to the pre-agreed identifier and extracts the key information needed, then the second device determines the first device with the pre-agreed identifier in the broadcasted wireless frame signal in the searching stage of the wireless frame signal, the key information needed for accessing the first device and provided by the first device in the wireless frame signal is obtained according to the wireless frame signal, and then the first device responds to an access request which is sent by the second device and carries the key information needed, and establishes wireless connection with the second device.

Description

Device wireless access method, device, computer device and storage medium
Technical Field
The present application relates to the field of wireless technologies, and in particular, to a device wireless access method, apparatus, computer device, and storage medium.
Background
With the development of wireless technology, wireless connection technology has emerged. Wireless connectivity techniques enable the establishment of communication links between devices, providing a basis for data communication between devices.
In the current technology, the operation process when the slave device needs to establish a wireless connection with the master device is generally as follows: logging in a management configuration interface of the slave equipment to find wireless configuration, searching accessory wireless hotspots, selecting the wireless hotspots needing to be accessed, inputting correct user names and passwords of the wireless hotspots, and then clicking to access.
However, in the operation process of this technology, more operation steps and operation time are required, and there is a technical problem that the wireless access efficiency of the device is low.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a device wireless access method, apparatus, computer device and storage medium for solving the above technical problems.
A device wireless access method is applied to a first device, and comprises the following steps:
acquiring an identifier pre-agreed with second equipment, and acquiring key information required for accessing the first equipment;
setting the identifier and the required key information in a wireless frame signal;
broadcasting wireless frame signals for the second equipment to search the wireless frame signals according to the pre-agreed identifier and extract the required key information;
and responding to an access request which is sent by the second equipment and carries the required key information, and establishing wireless connection with the second equipment.
In one embodiment, the locating the identifier and the required key information in a radio frame signal includes:
encrypting the required key information according to a pre-agreed encryption mode to obtain encrypted information;
setting the identifier and the encryption information in a wireless frame signal;
and the number of the first and second groups,
the second device is used for decrypting the encrypted information in the wireless frame signal according to a pre-agreed decryption mode corresponding to the encryption mode to obtain the required key information.
In one embodiment, the setting the identifier and the encryption information in a wireless frame signal includes:
locating the identifier in a radio frame signal;
setting encryption information in a wireless frame signal in response to a first wireless matching instruction from a first user;
and if the duration of the encryption information in the wireless frame signal is greater than or equal to the first wireless matching time, deleting the encryption information in the wireless frame signal.
A wireless access method of a device is applied to a second device, and the method comprises the following steps:
determining a first device having a pre-agreed identifier in a broadcasted wireless frame signal during a search phase of the wireless frame signal;
obtaining key information required by the first equipment for accessing the first equipment, which is provided in the wireless frame signal, according to the wireless frame signal;
a wireless connection is established with the first device using the required key information.
In one embodiment, the obtaining, according to the radio frame signal, the required key information provided by the first device in the radio frame signal for accessing the first device includes:
extracting encryption information from a wireless frame signal; the encryption information is obtained by encrypting the required key information by the first equipment according to a pre-agreed encryption mode;
and decrypting the encrypted information according to a pre-agreed decryption mode corresponding to the encryption mode to obtain the required key information.
In one embodiment, the method further comprises:
responding to a triggered second wireless matching instruction from a second user, and entering a wireless frame signal searching stage;
and if the duration of the searching stage is greater than or equal to the second wireless matching time, ending the searching stage.
A device wireless access apparatus applied to a first device, the apparatus comprising:
the wireless acquisition module is used for acquiring an identifier pre-agreed with second equipment and acquiring key information required for accessing the first equipment;
the wireless setting module is used for setting the identifier and the required key information in a wireless frame signal;
a wireless broadcasting module, configured to broadcast the wireless frame signal, so that the second device searches for the wireless frame signal according to the pre-agreed identifier and extracts the required key information;
and the wireless response module is used for responding to the access request which is sent by the second equipment and carries the required key information, and establishing wireless connection with the second equipment.
A device wireless access apparatus applied to a second device, the apparatus comprising:
a wireless determining module, configured to determine, in a search phase of a wireless frame signal, a first device having a pre-agreed identifier in a broadcasted wireless frame signal;
a wireless obtaining module, configured to obtain, according to the wireless frame signal, key information required by the first device for accessing the first device, where the key information is provided in the wireless frame signal;
and the wireless connection module is used for establishing wireless connection with the first equipment by utilizing the required key information.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
acquiring an identifier pre-agreed with second equipment, and acquiring key information required for accessing the first equipment; setting the identifier and the required key information in a wireless frame signal; broadcasting wireless frame signals for the second equipment to search the wireless frame signals according to the pre-agreed identifier and extract the required key information; and responding to an access request which is sent by the second equipment and carries the required key information, and establishing wireless connection with the second equipment.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
determining a first device having a pre-agreed identifier in a broadcasted wireless frame signal during a search phase of the wireless frame signal; obtaining key information required by the first equipment for accessing the first equipment, which is provided in the wireless frame signal, according to the wireless frame signal; a wireless connection is established with the first device using the required key information.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
acquiring an identifier pre-agreed with second equipment, and acquiring key information required for accessing the first equipment; setting the identifier and the required key information in a wireless frame signal; broadcasting wireless frame signals for the second equipment to search the wireless frame signals according to the pre-agreed identifier and extract the required key information; and responding to an access request which is sent by the second equipment and carries the required key information, and establishing wireless connection with the second equipment.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
determining a first device having a pre-agreed identifier in a broadcasted wireless frame signal during a search phase of the wireless frame signal; obtaining key information required by the first equipment for accessing the first equipment, which is provided in the wireless frame signal, according to the wireless frame signal; a wireless connection is established with the first device using the required key information.
The first device obtains the identifier agreed in advance with the second device and the key information needed for accessing the first device, then the identifier and the key information needed are arranged in the wireless frame signal, the wireless frame signal is broadcasted, so that the second device can search the wireless frame signal according to the identifier agreed in advance and extract the key information needed, then the second device determines the first device with the identifier agreed in advance in the broadcasted wireless frame signal in the searching stage of the wireless frame signal, the key information needed for accessing the first device and provided by the first device in the wireless frame signal is obtained according to the wireless frame signal, then the first device responds to the access request which is sent by the second device and carries the key information needed, and establishes wireless connection with the second device, thereby realizing rapid wireless access of the device, and the wireless access efficiency of the equipment is improved.
Drawings
FIG. 1 is a diagram of an exemplary wireless access method for a device;
FIG. 2 is a flow diagram of a method for wireless access by a device in one embodiment;
FIG. 3 is a diagram illustrating an example of the application of wireless access by a device;
FIG. 4 is a flow chart illustrating a method for wireless access by a device according to another embodiment;
FIG. 5 is a flow chart illustrating a method for wireless access by a device according to yet another embodiment;
FIG. 6 is a block diagram of an apparatus wireless access device in one embodiment;
FIG. 7 is a block diagram of a wireless access device of another embodiment of the apparatus;
FIG. 8 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
It should be noted that, the information (including but not limited to user device information, user personal information, etc.) and data related to the user and processing thereof (including but not limited to data for presentation, analyzed data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party; correspondingly, the application also provides a corresponding user authorization entrance for the user to select authorization or to select rejection.
The device wireless access method provided by the application can be applied to the application environment shown in fig. 1. The application scenario may include: the first device 110 and the second device 120, and the first device 110 and the second device 120 may be communicatively connected. Specifically, the first device 110 obtains an identifier pre-agreed with the second device 120 and key information required for accessing the first device 110, then locates the identifier and the key information in a radio frame signal, broadcasts the radio frame signal, so that the second device 120 searches the radio frame signal according to the pre-agreed identifier and extracts the key information required, then the second device 120 determines the first device 110 having the pre-agreed identifier in the broadcasted radio frame signal in a search stage of the radio frame signal, and obtains the key information required for accessing the first device 110 and provided by the first device 110 in the radio frame signal according to the radio frame signal, then the second device 120 sends an access request carrying the key information required to the first device 110, and then the first device 110 responds to the access request carrying the key information required and sent by the second device 120, a wireless connection is established with the second device 120. The first device 110 may be, but is not limited to, various wireless hotspots, backend wireless video recorders, personal computers, laptops, smartphones, tablets, and portable wearable devices, and the second device 120 may be, but is not limited to, various front-end wireless cameras, personal computers, laptops, smartphones, tablets, and portable wearable devices.
In one embodiment, as shown in fig. 2, a device wireless access method is provided, which is described by taking the method as an example applied to the first device 110 in fig. 1, and includes the following steps:
step S201, obtaining an identifier pre-agreed with the second device, and obtaining key information required for accessing the first device.
The pre-agreed identifier refers to an identifier that is pre-agreed by the first device 110 and the second device 120 and is used for the second device 120 to determine the first device 110 according to the identifier scanning, and in practical applications, the identifier may be a fixed character string, such as "HSNVR", of a prefix portion in a user name of the first device 110; the required key information refers to key information required for wirelessly accessing the first device 110, such as a wireless access password of the first device 110.
In this step, the first device 110 and the second device 120 may agree with an identifier in advance, and the first device 110 obtains the identifier and a wireless access password for the second device 120 to access the first device 110.
Step S202, the identifier and the required key information are arranged in the wireless frame signal.
The wireless frame signal refers to a signal broadcast by the first device 110 and including the identifier and the required key information, and provided to the second device 120 to search for and extract the required key information according to a pre-agreed identifier, for example, a wireless beacon frame including the identifier, the user name of the first device 110, and the access password.
Specifically, the first device 110 enables a wireless pairing function through a configuration interface, and fills the content and the identifier of the wireless access password field in the hostapd configuration file into the wireless beacon frame through the wireless nl80211 protocol by using the open source tool hostapd.
Step S203, broadcasting the wireless frame signal for the second device to search the wireless frame signal according to the pre-agreed identifier and extract the required key information.
In this step, the first device 110 broadcasts a wireless frame signal, so that an external device can search for the wireless frame signal. The second device 120 can determine the first device 110 broadcasting the radio frame signal according to the pre-agreed identifier during the search of the radio frame signal, and then the second device 120 can obtain the required key information provided by the first device 110 in the radio frame signal according to the radio frame signal.
Step S204, responding to the access request carrying the required key information sent by the second device, and establishing wireless connection with the second device.
The access request refers to a signal which is sent by the second device 120 and carries the required key information and is used for requesting to establish a wireless connection with the first device 110.
Specifically, as shown in fig. 3, the number of the second devices 120 may be one or more, and the types of the second devices 120 may also be one or more, the first device 110 (e.g., a master device) may use a concurrent server manner to listen to the access requests of the second devices 120 (e.g., the slave device 1 and the slave device 2), the second device 120 sends the access request carrying the required key information to the first device 110, then the first device 110 performs parameter configuration on each second device 120 requesting access in response to the access request carrying the required key information sent by the second device 120, allocates the specified network parameters to the second device 120, and the first device 110 establishes a wireless connection with the second device 120.
In the device wireless access method, a first device acquires an identifier pre-agreed with a second device and key information required for accessing the first device, then setting the identifier and the required key information in a wireless frame signal, broadcasting the wireless frame signal, so that the second device can search the wireless frame signal according to the pre-agreed identifier and extract the required key information, the second device then determines in a search phase of the radio frame signal the first device having a pre-agreed identifier in the broadcast radio frame signal, and obtaining the key information required by the first device for accessing the first device, which is provided in the wireless frame signal, according to the wireless frame signal, and then the first equipment responds to an access request which is sent by the second equipment and carries the required key information, and establishes wireless connection with the second equipment, so that the quick wireless access of the equipment is realized, and the wireless access efficiency of the equipment is improved.
In an embodiment, the step S202 of setting the identifier and the required key information in the radio frame signal specifically includes: the second device is used for decrypting the encrypted information arranged in the wireless frame signal according to a pre-agreed decryption mode corresponding to the encryption mode to obtain the required key information.
In this embodiment, the encryption mode refers to a pre-agreed mode between the first device 110 and the second device 120 for the first device 110 to encrypt the required key information, and correspondingly, the decoding mode of the second device 120 is a decryption mode corresponding to the encryption mode of the first device 110; the encrypted information is information obtained by encrypting the required key information by the first device 110 according to the aforementioned pre-agreed encryption method, for example, if the required key information is the access password of the first device 110, the encrypted information is the encrypted access password of the first device 110.
Specifically, the first device 110 encrypts the access password of the first device 110 according to a symmetric encryption manner agreed with the second device 120 in advance to obtain the encrypted access password of the first device 110, then the first device 110 locates the identifier and the encrypted access password of the first device 110 in the wireless frame signal and broadcasts the wireless frame signal, and then the second device 120 may decrypt the encrypted access password of the first device 110 located in the wireless frame signal according to a symmetric decryption manner corresponding to the symmetric encryption manner agreed in advance to obtain the access password of the first device 110.
According to the technical scheme of the embodiment, the first device 110 encrypts the required key information according to the pre-agreed encryption mode and sets the identifier and the encrypted information in the wireless frame signal, so that other devices except the second device 120 are effectively prevented from accessing the first device, and a safer wireless connection between the first device 110 and the second device 120 is realized.
In an embodiment, the setting the identifier and the encryption information in the wireless frame signal specifically includes: the method comprises the steps of setting an identifier in a wireless frame signal, responding to a first wireless matching instruction from a first user, setting encryption information in the wireless frame signal, and deleting the encryption information in the wireless frame signal if the duration of the encryption information in the wireless frame signal is greater than or equal to the first wireless matching time.
In this embodiment, the first wireless matching instruction from the first user refers to an instruction triggered by the first user and used for instructing the first device 110 to locate the encrypted information in the wireless frame signal, for example, an instruction that a certain user enables the first device 110 to enter the wireless matching mode through a configuration interface; the first radio matching time is a time preset by the first device 110, so that the first device 110 deletes the encrypted information in the radio frame signal when the duration of the encrypted information in the radio frame signal is greater than or equal to the first radio matching time, for example, the first radio matching time is 120 seconds.
Specifically, the first device 110 sets the identifier in the wireless frame signal, the first user sends a triggered first wireless matching instruction to the first device 110, the first device 110 responds to the first wireless matching instruction from the first user, and fills the encrypted information field content and the identifier in the hostapd configuration file into the wireless beacon frame through the wireless nl80211 protocol by using the open source tool hostapd, when the duration of the encrypted information in the wireless frame signal is greater than or equal to the preset wireless matching time 120 seconds of the first device 110, the encrypted information in the wireless frame signal is deleted, and the open source tool hostapd stops filling the encrypted information field content into the wireless beacon frame.
According to the technical scheme of the embodiment, the time of the encrypted information in the wireless frame signal is limited, so that other devices except the second device 120 are effectively prevented from accessing the first device, and a safer wireless connection between the first device 110 and the second device 120 is established.
In one embodiment, as shown in fig. 4, a device wireless access method is provided, which is described by taking the method as an example applied to the second device 120 in fig. 1, and includes the following steps:
in step S401, a first device having a pre-agreed identifier in a broadcasted wireless frame signal is determined in a searching stage of the wireless frame signal.
The wireless frame signal searching stage refers to a stage in which the second device 120 searches the wireless frame signal to determine the first device 110 having a pre-agreed identifier in the broadcasted wireless frame signal, such as a wireless matching mode stage.
Specifically, the second device 120 starts a search of the radio frame signal through the open source tool iwlist, determines, in a search stage of the radio frame signal, a radio frame signal having a pre-agreed identifier in the broadcasted radio frame signal, and determines that the device broadcasting the radio frame signal is the first device 110.
Step S402, obtaining, according to the radio frame signal, key information required by the first device for accessing the first device, which is provided in the radio frame signal.
Specifically, the second device 120 obtains the required key information, provided by the first device 110 in the radio frame signal, for accessing the first device from the radio frame signal broadcast by the first device 110.
Step S403, establishing a wireless connection with the first device using the required key information.
In this step, the second device 120 writes the user name and the required key information of the first device 110 into the configuration file of the open source tool wpa _ supplicant, and sends an access request to the first device 110 through the open source tool wpa _ supplicant, and then the first device 110 performs parameter configuration on the second device 120 requesting access in response to the access request carrying the required key information sent by the second device 120, allocates the specified network parameters to the second device 120, and the first device 110 establishes wireless connection with the second device 120.
In the device wireless access method, a first device acquires an identifier pre-agreed with a second device and key information required for accessing the first device, then setting the identifier and the required key information in a wireless frame signal, broadcasting the wireless frame signal, so that the second device can search the wireless frame signal according to the pre-agreed identifier and extract the required key information, the second device then determines in a search phase of the radio frame signal the first device having a pre-agreed identifier in the broadcast radio frame signal, and obtaining the key information required by the first device for accessing the first device, which is provided in the wireless frame signal, according to the wireless frame signal, and then the first equipment responds to an access request which is sent by the second equipment and carries the required key information, and establishes wireless connection with the second equipment, so that the quick wireless access of the equipment is realized, and the wireless access efficiency of the equipment is improved.
In an embodiment, the obtaining, according to the radio frame signal in step S402, the key information required by the first device to access the first device, provided in the radio frame signal, specifically includes: and extracting the encrypted information from the wireless frame signal, and decrypting the encrypted information according to a pre-agreed decryption mode corresponding to the encryption mode to obtain the required key information.
In this embodiment, the encryption information is obtained by encrypting the required key information by the first device 110 according to a pre-agreed encryption manner. Specifically, the second device 120 extracts the encrypted information from the wireless beacon frame signal broadcast by the first device 110, and then decrypts the encrypted information according to a symmetric decryption method corresponding to the symmetric encryption method agreed in advance with the first device 110, so as to obtain the decrypted access password of the first device 110.
According to the technical scheme of the embodiment, the second device 120 extracts the encrypted information from the wireless frame signal and decrypts the encrypted information in a corresponding decryption manner to obtain the required key information, so that other devices except the second device 120 are effectively prevented from accessing the first device, and a safer wireless connection between the first device 110 and the second device 120 is achieved.
In an embodiment, the method may further process the search phase of the second device 120 through the following steps, specifically including: and responding to a triggered second wireless matching instruction from a second user, entering a wireless frame signal searching stage, and ending the searching stage if the duration of the searching stage is greater than or equal to the second wireless matching time.
The second wireless matching instruction triggered by the second user is an instruction triggered by the second user and used for instructing the second device 120 to enter a wireless frame signal search stage, for example, a certain user enables the second device 120 to enter a wireless pairing mode by triggering an external key; the second wireless matching time refers to a time preset by the second device 120, so that the second device 120 ends the search phase of the second device 120 when the duration of the search phase is greater than or equal to the second wireless matching time, for example, the second wireless matching time is 120 seconds.
Specifically, the second user sends a triggered second wireless matching instruction to the second device 120, the second device 120 starts the search of the radio frame signal through the sourcing tool iwist in response to the second wireless matching instruction from the second user, enters a search phase of the radio frame signal, automatically ends the search phase when the first device 110 establishes a wireless connection with the second device 120, ends the search phase when the duration of the search phase is greater than or equal to the second wireless matching time 120 seconds, and stops the sourcing tool wlist.
According to the technical solution of this embodiment, by limiting the search phase time of the wireless frame signal of the second device 120, the second device 120 is effectively prevented from establishing wireless connection with devices other than the first device 110, and the service life of the second device 120 is effectively prolonged.
In an application example, a method for quickly connecting a wireless product master device and a wireless product slave device is provided, as shown in fig. 5, the main steps include:
step 1: and starting a pairing mode in the master equipment, setting pairing timeout time, and monitoring access requests of all slave equipment in a concurrent server mode.
Step 2: the master device and the slave device agree on an identification symbol, the master device fills the identifier, the wireless user name and the password into the wireless beacon frame through encoding or encryption, and the beacon frame is exposed to the outside through the wireless nl80211 protocol.
And step 3: and the slave device presses and holds the specified number of seconds to enter the pairing mode through an external key.
And 4, step 4: the accessory is searched from the device for a wireless hotspot, and the agreed identifier analysis or lookup is performed on the searched wireless hotspot.
And 5: when a certain hotspot has an agreed identifier, the slave device analyzes the user name and the password part, the main device is accessed by the analyzed user name and password, and after the access is successful, the concurrent server of the main device sends some configuration information to the slave device.
The application example realizes the quick connection between the wireless product master device and the wireless product slave device, reduces the learning cost and time cost of a user, and reduces the hardware cost such as a configuration interface related to a wired network interface and wireless connection.
It should be understood that, although the steps in the above flowcharts are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a part of the steps in the above flowcharts may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of performing the steps or the stages is not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a part of the steps or the stages in other steps.
In one embodiment, as shown in fig. 6, there is provided a device wireless access apparatus, which is applied to a first device, and the apparatus 600 may include:
a wireless obtaining module 601, configured to obtain an identifier pre-agreed with a second device, and obtain key information required for accessing the first device;
a wireless setting module 602, configured to set the identifier and the required key information in a wireless frame signal;
a wireless broadcasting module 603, configured to broadcast the wireless frame signal, so that the second device searches for the wireless frame signal according to the pre-agreed identifier and extracts the required key information;
a wireless response module 604, configured to respond to the access request carrying the required key information sent by the second device, and establish a wireless connection with the second device.
In one embodiment, the wireless setting module 602 is configured to encrypt the required key information according to a pre-agreed encryption manner to obtain encrypted information; locating the identifier and the encryption information in a wireless frame signal; and the second equipment is used for decrypting the encrypted information in the wireless frame signal according to a pre-agreed decryption mode corresponding to the encryption mode to obtain the required key information.
In one embodiment, the wireless setting module 602 is further configured to set the identifier in a wireless frame signal; setting the encryption information in a wireless frame signal in response to a first wireless matching instruction from a first user; and if the duration time of the encryption information in the wireless frame signal is greater than or equal to the first wireless matching time, deleting the encryption information in the wireless frame signal.
In one embodiment, as shown in fig. 7, there is provided a device wireless access apparatus, applied to a second device, the apparatus 700 may include:
a radio determining module 701, configured to determine, in a search phase of a radio frame signal, a first device having a pre-agreed identifier in a broadcast radio frame signal;
a wireless obtaining module 702, configured to obtain, according to the wireless frame signal, key information required by the first device for accessing the first device, where the key information is provided in the wireless frame signal;
a wireless connection module 703, configured to establish a wireless connection with the first device using the required key information.
In one embodiment, the wireless obtaining module 702 is configured to extract encryption information from the wireless frame signal; the encryption information is obtained by encrypting the required key information by the first equipment according to a pre-agreed encryption mode; and decrypting the encrypted information according to a pre-agreed decryption mode corresponding to the encryption mode to obtain the required key information.
In one embodiment, the wireless obtaining module 702 is further configured to enter a search phase of a wireless frame signal in response to a triggered second wireless matching instruction from a second user; and if the duration of the searching stage is greater than or equal to the second wireless matching time, ending the searching stage.
For specific definition of the device wireless access apparatus, see the above definition of the device wireless access method, which is not described herein again. The modules in the wireless access device of the above-mentioned equipment can be implemented wholly or partially by software, hardware and their combination. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 8. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a device wireless access method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 8 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is further provided, which includes a memory and a processor, the memory stores a computer program, and the processor implements the steps of the above method embodiments when executing the computer program.
In an embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned method embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A wireless access method for a device, applied to a first device, the method comprising:
acquiring an identifier pre-agreed with second equipment, and acquiring key information required for accessing the first equipment;
locating the identifier and the required key information in a radio frame signal;
broadcasting the wireless frame signal to enable the second equipment to search the wireless frame signal according to the pre-agreed identifier and extract the required key information;
and responding to an access request which is sent by the second equipment and carries the required key information, and establishing wireless connection with the second equipment.
2. The method of claim 1, wherein locating the identifier and the required key information in a radio frame signal comprises:
encrypting the required key information according to a pre-agreed encryption mode to obtain encrypted information;
locating the identifier and the encryption information in a wireless frame signal;
and the number of the first and second groups,
and the second equipment is used for decrypting the encrypted information in the wireless frame signal according to a pre-agreed decryption mode corresponding to the encryption mode to obtain the required key information.
3. The method of claim 2, wherein said locating the identifier and the encryption information in a radio frame signal comprises:
setting the identifier in a wireless frame signal;
setting the encryption information in a wireless frame signal in response to a first wireless matching instruction from a first user;
and if the duration time of the encryption information in the wireless frame signal is greater than or equal to the first wireless matching time, deleting the encryption information in the wireless frame signal.
4. A wireless access method of a device is applied to a second device, and comprises the following steps:
determining a first device having a pre-agreed identifier in a broadcasted wireless frame signal during a search phase of the wireless frame signal;
obtaining key information required by the first equipment for accessing the first equipment, which is provided in the radio frame signal, according to the radio frame signal;
and establishing wireless connection with the first equipment by using the required key information.
5. The method of claim 4, wherein obtaining the required key information provided by the first device in the radio frame signal for accessing the first device according to the radio frame signal comprises:
extracting encryption information from the wireless frame signal; the encryption information is obtained by encrypting the required key information by the first equipment according to a pre-agreed encryption mode;
and decrypting the encrypted information according to a pre-agreed decryption mode corresponding to the encryption mode to obtain the required key information.
6. The method of claim 5, further comprising:
responding to a triggered second wireless matching instruction from a second user, and entering a wireless frame signal searching stage;
and if the duration of the searching stage is greater than or equal to the second wireless matching time, ending the searching stage.
7. An apparatus wireless access device, applied to a first device, the apparatus comprising:
the wireless acquisition module is used for acquiring an identifier pre-agreed with second equipment and acquiring key information required for accessing the first equipment;
the wireless setting module is used for setting the identifier and the required key information in a wireless frame signal;
a wireless broadcasting module, configured to broadcast the wireless frame signal, so that the second device searches for the wireless frame signal according to the pre-agreed identifier and extracts the required key information;
and the wireless response module is used for responding to the access request which is sent by the second equipment and carries the required key information, and establishing wireless connection with the second equipment.
8. An apparatus for wireless access of a device, applied to a second device, the apparatus comprising:
a wireless determining module, configured to determine, in a search phase of a wireless frame signal, a first device having a pre-agreed identifier in a broadcasted wireless frame signal;
a wireless obtaining module, configured to obtain, according to the wireless frame signal, key information required by the first device for accessing the first device, where the key information is provided in the wireless frame signal;
and the wireless connection module is used for establishing wireless connection with the first equipment by utilizing the required key information.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 6.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 6.
CN202111163025.XA 2021-09-30 2021-09-30 Device wireless access method, device, computer device and storage medium Pending CN113891431A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111163025.XA CN113891431A (en) 2021-09-30 2021-09-30 Device wireless access method, device, computer device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111163025.XA CN113891431A (en) 2021-09-30 2021-09-30 Device wireless access method, device, computer device and storage medium

Publications (1)

Publication Number Publication Date
CN113891431A true CN113891431A (en) 2022-01-04

Family

ID=79005127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111163025.XA Pending CN113891431A (en) 2021-09-30 2021-09-30 Device wireless access method, device, computer device and storage medium

Country Status (1)

Country Link
CN (1) CN113891431A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114422999A (en) * 2022-01-30 2022-04-29 深圳创维-Rgb电子有限公司 Automatic pairing connection method and device for equipment, equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105228153A (en) * 2014-07-01 2016-01-06 北京奇虎科技有限公司 Method for network access, system and wireless routing device
CN108055474A (en) * 2018-01-15 2018-05-18 上海小蚁科技有限公司 Polyphaser synchronous method, apparatus and system, storage medium
US20180367539A1 (en) * 2016-02-29 2018-12-20 Huawei Technologies Co., Ltd. Method for Accessing Network by Internet of Things Device, Apparatus, and System
WO2019228270A1 (en) * 2018-05-31 2019-12-05 中兴通讯股份有限公司 Method and device for accessing wireless router and computer readable storage medium
CN111465076A (en) * 2020-03-13 2020-07-28 深圳传音控股股份有限公司 Connection method and device of wireless local area network and computer storage medium
CN111770588A (en) * 2020-07-28 2020-10-13 青岛矽昌通信技术有限公司 Method and system for quickly establishing wireless connection with wireless router

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105228153A (en) * 2014-07-01 2016-01-06 北京奇虎科技有限公司 Method for network access, system and wireless routing device
US20180367539A1 (en) * 2016-02-29 2018-12-20 Huawei Technologies Co., Ltd. Method for Accessing Network by Internet of Things Device, Apparatus, and System
CN108055474A (en) * 2018-01-15 2018-05-18 上海小蚁科技有限公司 Polyphaser synchronous method, apparatus and system, storage medium
WO2019228270A1 (en) * 2018-05-31 2019-12-05 中兴通讯股份有限公司 Method and device for accessing wireless router and computer readable storage medium
CN111465076A (en) * 2020-03-13 2020-07-28 深圳传音控股股份有限公司 Connection method and device of wireless local area network and computer storage medium
CN111770588A (en) * 2020-07-28 2020-10-13 青岛矽昌通信技术有限公司 Method and system for quickly establishing wireless connection with wireless router

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114422999A (en) * 2022-01-30 2022-04-29 深圳创维-Rgb电子有限公司 Automatic pairing connection method and device for equipment, equipment and storage medium
CN114422999B (en) * 2022-01-30 2022-12-13 深圳创维-Rgb电子有限公司 Automatic pairing connection method and device for equipment, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN106412907B (en) Network access method, related equipment and system
KR101120819B1 (en) Automatic detection of wireless network type
US9992676B2 (en) Method for unlocking administration authority and device for authentication
WO2015135337A1 (en) Method and system for encrypted communications
US9730060B2 (en) Method and system for transfering profiles of authentication module
US20080060066A1 (en) Systems and methods for acquiring network credentials
US20150281229A1 (en) Method and apparatus for supporting login through user terminal
US20220295269A1 (en) Network access authentication method and device
CN103733599A (en) Apparatus and method for supporting family cloud in cloud computing system
US20160315773A1 (en) Method and apparatus for providing information
US20150304321A1 (en) An image management system and an image management method based on fingerprint authentication
US9723486B2 (en) Method and apparatus for accessing network
JP4962237B2 (en) Program and method for managing information on location of portable device and file encryption key
WO2018018781A1 (en) Sim card information transmission method and device, and computer storage medium
CN105744595A (en) Method, device and system for accessing wireless local area network
CN112883388A (en) File encryption method and device, storage medium and electronic device
Kim et al. Digital forensic analysis of intelligent and smart IoT devices
CN112399392A (en) Communication connection method, device, equipment and storage medium of home care terminal
CN113891431A (en) Device wireless access method, device, computer device and storage medium
CN112512048A (en) Mobile network access system, method, storage medium and electronic device
CN111511043A (en) Network connection method, device, electronic equipment and storage medium
CN107548058B (en) Equipment access method and intelligent terminal
CN111770488B (en) EHPLMN updating method, related equipment and storage medium
CN111224772A (en) Data processing method, device and computer readable storage medium
CN114692121A (en) Information acquisition method and related product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220104

RJ01 Rejection of invention patent application after publication