CN114554462A - Networking method, networking device, electronic device and storage medium - Google Patents

Networking method, networking device, electronic device and storage medium Download PDF

Info

Publication number
CN114554462A
CN114554462A CN202011245325.8A CN202011245325A CN114554462A CN 114554462 A CN114554462 A CN 114554462A CN 202011245325 A CN202011245325 A CN 202011245325A CN 114554462 A CN114554462 A CN 114554462A
Authority
CN
China
Prior art keywords
networking
accessed
equipment
host
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011245325.8A
Other languages
Chinese (zh)
Inventor
于宏全
孙权
廖亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN202011245325.8A priority Critical patent/CN114554462A/en
Priority to PCT/CN2021/129443 priority patent/WO2022100559A1/en
Publication of CN114554462A publication Critical patent/CN114554462A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The present disclosure provides a networking method, comprising: judging whether the equipment to be accessed has networking authority or not according to a networking request sent by the equipment to be accessed through a first Near Field Communication (NFC) module, wherein the networking request carries identity information of the equipment to be accessed; when the equipment to be accessed has the networking right, accessing the equipment to be accessed to a host and networking; and when the equipment to be accessed does not have the networking right, sending a networking authentication request to the host, wherein the networking authentication request carries the identity information of the equipment to be accessed. The present disclosure also provides another networking method, a networking device, an electronic device, and a computer-readable storage medium.

Description

Networking method, networking device, electronic device and storage medium
Technical Field
The present application relates to the field of internet of things, and in particular, to a networking method, a networking device, an electronic device, and a computer-readable storage medium.
Background
With the popularization of wireless networks, many public places as well as private places are covered with WIFI signals. When a device wants to access a wireless network, the device information and the password are generally required to be input, which reduces the user experience.
Disclosure of Invention
The application provides a networking method, a networking device, an electronic device and a computer readable storage medium.
As a first aspect of the present disclosure, there is provided a networking method including:
judging whether the equipment to be accessed has networking authority or not according to a networking request sent by the equipment to be accessed through a first Near Field Communication (NFC) module, wherein the networking request carries identity information of the equipment to be accessed;
when the equipment to be accessed has the networking right, accessing the equipment to be accessed to a host and networking;
and when the equipment to be accessed does not have the networking right, sending a networking authentication request to the host, wherein the networking authentication request carries the identity information of the equipment to be accessed.
Optionally, the determining whether the device to be accessed has the networking right includes: judging whether the equipment to be accessed is in a networking white list or not according to the identity information of the equipment to be accessed, wherein,
when the device to be accessed is in the networking white list, judging that the device to be accessed has the networking authority;
when the device to be accessed is not in the networking white list, the device to be accessed is judged not to have the networking authority.
Optionally, the identity information of the device to be accessed includes an international mobile equipment identification number IMEI of the device to be accessed.
Optionally, before the step of determining whether the device to be accessed has the networking right according to a networking request sent by the device to be accessed through the first near field communication NFC module, the networking method further includes:
receiving the networking request;
and responding to the networking request, and sending a power supply signal to a power supply management module so that the power supply management module supplies power to the current main control module to end the dormant state of the current main control module.
Optionally, the step of sending a networking authentication request to the host comprises:
judging whether the host is in a local area network or not;
when the host is in the local area network, sending the networking authentication request to the host through the local area network;
and when the host is not in the local area network, sending the networking authentication request to the host through a WIFI network.
Optionally, the networking method further comprises:
and responding to the networking allowing instruction returned by the host, and accessing the equipment to be accessed to the host and networking.
Optionally, in the step of sending a networking authentication request to the host, the networking authentication request is sent to the host through a local narrowband NB communication module, and the networking method further includes, after the step of accessing and networking the device to be accessed to the host:
and sending a sleep instruction to a battery management module so that the battery management module controls the NB communication module and the current main control module to enter a sleep state.
As a second aspect of the present disclosure, there is provided a networking method including:
when the first NFC module is activated by an electromagnetic field, sending a networking request through the first NFC module, wherein the networking request carries identity information of a current device to be accessed.
As a third aspect of the present disclosure, there is provided a networking device including:
a first storage module having a first executable program stored thereon;
a first master module capable of executing the first executable program to implement the networking method provided in accordance with the first aspect of the present disclosure;
a second NFC module to provide an electromagnetic field;
an NB communication module to communicate with a host.
As a fourth aspect of the present disclosure, there is provided an electronic apparatus comprising:
a second storage module having a second executable program stored thereon;
a second master module capable of executing the second executable program to implement the networking method provided in accordance with the second aspect of the disclosure;
a first NFC module capable of sending a networking request carrying identity information of a current electronic device when activated by an electromagnetic field.
As a fifth aspect of the present disclosure, a computer-readable storage medium is provided, storing a computer program which, when executed by a processor, implements the networking method according to the first aspect of the present disclosure, or the networking method according to the second aspect of the present disclosure.
The method for internet of things provided by the first aspect of the present disclosure is performed by a master module of a networking device (e.g., a networking device such as a smart router, a Customer Premise Equipment (CPE), etc.), and the networking device has a second NFC module. The second NFC module may generate an electromagnetic field. When the first NFC module of the device to be accessed enters the electromagnetic field, the first NFC module is activated, and the networking request may be sent to the networking device through near field communication. And after receiving the networking request, the networking equipment firstly judges whether the equipment to be accessed has networking authority. And when the equipment to be accessed has the networking right, directly accessing the equipment to be accessed to the host to realize non-inductive networking. When the equipment to be accessed does not have the networking right, the networking authentication is directly carried out according to the identity information carried in the networking request, and an operator of the equipment to be accessed does not need to input the identity information, so that the operation steps of the operator are simplified, and the user experience is improved.
Drawings
FIG. 1 is a flow chart of one embodiment of a networking method provided by a first aspect of the present disclosure;
FIG. 2 is a flow chart of another embodiment of a networking method provided by the first aspect of the present disclosure;
FIG. 3 is a flow chart of one embodiment of a networking method provided by a second aspect of the present disclosure;
FIG. 4 is a block schematic diagram of a networked device provided by a third aspect of the present disclosure;
fig. 5 is a block schematic diagram of an electronic device provided in a fourth aspect of the present disclosure.
Detailed Description
In order to make those skilled in the art better understand the technical solutions of the present disclosure, the networking method, the networking device, the electronic device, and the computer-readable storage medium provided by the present disclosure are described in detail below with reference to the accompanying drawings.
Example embodiments will be described more fully hereinafter with reference to the accompanying drawings, but which may be embodied in different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Embodiments of the present disclosure and features of embodiments may be combined with each other without conflict.
As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising … …, when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and the present disclosure, and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
As an aspect of the present disclosure, there is provided a networking method, as shown in fig. 1, the networking method including:
in step S110, determining whether the device to be accessed has a networking right according to a networking request sent by the device to be accessed through a first near field communication NFC module, where the networking request carries identity information of the device to be accessed;
in step S120, when the device to be accessed has the networking right, accessing the device to be accessed to the host and networking;
in step S130, when the device to be accessed does not have the networking right, a networking authentication request is sent to the host, where the networking authentication request carries identity information of the device to be accessed.
It is noted that the method of the internet of things provided by the first aspect of the present disclosure is performed by a master module of a networking device (e.g., a networking device such as an intelligent router, a CPE, etc.), the networking device having a second NFC module. The second NFC module may generate an electromagnetic field. When the first NFC module of the device to be accessed enters the electromagnetic field, the first NFC module is activated, and the networking request may be sent to the networking device through near field communication. And after receiving the networking request, the networking equipment firstly judges whether the equipment to be accessed has networking authority. And when the equipment to be accessed has the networking right, directly accessing the equipment to be accessed to the host to realize non-inductive networking. When the equipment to be accessed does not have the networking right, the networking authentication is directly carried out according to the identity information carried in the networking request, and an operator of the equipment to be accessed does not need to input the identity information, so that the operation steps of the operator are simplified, and the user experience is improved.
In the disclosure, how to determine whether the device to be accessed has the networking right is not particularly limited. For example, whether the device to be accessed has the networking right may be determined according to a networking white list or a networking black list.
When the networking blacklist is used for judging whether the equipment to be accessed has the networking right, the identity information of the equipment refusing networking can be set in the networking blacklist. And when the networking request is received, comparing the identity information of the equipment to be accessed carried in the networking request with the networking blacklist. And when the identity information of the equipment to be accessed exists in the networking blacklist, judging that the equipment to be accessed does not have networking authority. And when the identity information of the equipment to be accessed does not exist in the networking blacklist, judging that the equipment to be accessed has networking authority.
When the networking white list is used for judging whether the equipment to be accessed has the networking right, the identity information of the equipment allowed to be networked can be set in the networking white list. When the networking request is received, judging whether the equipment to be accessed has the networking authority or not comprises the following steps: and judging whether the equipment to be accessed is in a networking white list or not according to the identity information of the equipment to be accessed.
And when the equipment to be accessed is in the networking white list, judging that the equipment to be accessed has the networking authority.
When the device to be accessed is not in the networking white list, the device to be accessed is judged not to have the networking authority.
Whether the equipment to be accessed has the networking authority or not is judged through the networking white list, and the safety of the host is ensured.
In this disclosure, the identity information of the device to be accessed is not particularly limited. For example, when the device to be accessed is a Mobile device (e.g., a Mobile phone), the identity information of the device to be accessed includes an International Mobile Equipment Identity (IMEI) of the device to be accessed.
In this disclosure, the networking whitelist may be pushed by a host to a networking device executing the networking method.
And when the equipment to be accessed is not in the networking white list, sending the identity information of the equipment to be accessed to a host, and authenticating the equipment by the host.
When the authentication is passed, the device to be accessed can be accessed to the host computer to realize networking. And, in this case, the host pushes information of the non-white list group to the device that has accessed.
And when the authentication is not passed, the equipment to be accessed is not allowed to access the host.
When the equipment to be accessed is in the networking white list, the networking equipment directly accesses the equipment to be accessed to the host. And, in this case, the host pushes information of the white list group to the device that has accessed.
In other words, as shown in fig. 2, the networking method may further include, after step S130:
in step S140, in response to the networking permission instruction returned by the host, the device to be accessed is accessed to the host and networked.
In the present disclosure, there is no particular limitation on how the authentication information is transmitted to the host. As an alternative embodiment, as shown in fig. 2, the step of sending a networking authentication request to the host includes:
in step S131, it is determined whether the host is in a lan;
when the host is in the local area network, in step S132, sending the networking authentication request to the host through the local area network;
when the host is not in the local area network, in step S133, the networking authentication request is sent to the host through a WIFI network.
In the present disclosure, the networking authentication request may be transmitted to the host through a communication module, in particular, a Narrow Band (NB) communication module. In order to reduce energy consumption, as an optional implementation manner, after receiving feedback from the host, the main control module and the NB communication module may enter a sleep state. Specifically, as shown in fig. 2, the networking method may include, after step S140:
in step S150, a sleep control signal is sent to the power management module, so that the NB communication module and the main control module are controlled by the power management module to enter a sleep state.
Accordingly, the master control module and the NB communication module are in a sleep state before the networking request is received. This requires that the modules in the dormant state, such as the master module, the NB communication module, etc., be activated after receiving the networking request. Therefore, as shown in fig. 2, the networking method may further include, before step S110:
in step S100, receiving the networking request;
in step S105, in response to the networking request, a power supply signal is sent to the power management module, so that the power management module supplies power to the current main control module to end the sleep state of the current main control module.
Further, in step S105, power may be supplied to the NB communication module in the sleep state by the power management module to end the sleep state of the NB communication module.
In order to further ensure the security of the master, as an optional embodiment, the master may set the networking duration of each slave device accessing the master. And when the slave equipment connected with the host exceeds the networking time of the host, the host can be disconnected with the slave equipment.
In other words, in the present disclosure, only after receiving the networking request and when executing the networking method, the main control module and the NB communication module need to be activated, and in other time periods, both the main control module and the NB communication module are in the sleep state, which may reduce energy consumption of the networking device including the main control module.
As another aspect of the present disclosure, a networking method is provided, which may be performed by the device to be accessed (i.e., the slave device) described above. As shown in fig. 3, the networking method includes:
in step S210, when the first NFC module is excited by the electromagnetic field, a networking request is sent through the first NFC module, where the networking request carries identity information of a current device to be accessed.
The networking method provided by the second aspect of the present disclosure is used in conjunction with the networking method provided by the first aspect of the present disclosure.
In particular, the networked device has a second NFC module that provides an electromagnetic field. When the equipment to be accessed provided with the first NFC module enters an electromagnetic field provided by the second NFC module, the first NFC module is activated, and a networking request carrying identity information of the current equipment to be accessed is sent to the networking equipment. And when the main control module of the networking device receives the networking request, executing the networking method provided by the first aspect of the disclosure.
In the method, the identity information is sent to the networking equipment through the first NFC module, the user does not need to input the identity information by hand, and non-inductive networking can be achieved.
As a third aspect of the present disclosure, there is provided a networking device, as shown in fig. 4, including a first storage module 310, a first master module 320, a second NFC module 330, and an NB communication module 340.
The first storage module 310 has a first executable program stored thereon, the first host module 320 can execute the first executable program to implement the networking method provided by the first aspect of the present disclosure, the second NFC module 330 can provide an electromagnetic field, and the NB communication module 340 is configured to communicate with a host.
Specifically, the NB communication module 340 is configured to send the networking authentication request generated by the first main control module 320 to the host, and feed back data sent by the host to the networked devices.
The first master control module 320 of the networking device may execute the networking method provided in the first aspect of the present disclosure, and control the second NFC module 330 to receive the networking request sent by the first NFC module of the device to be accessed, and first determine whether the device to be accessed has the networking right according to the identity information carried in the networking request. And when the equipment to be accessed has the networking right, accessing the equipment to be accessed to the host to realize the networking of the equipment to be accessed. And when the equipment to be accessed does not have the networking right, the identity information of the equipment to be accessed is sent to the host for the host to authenticate. And when the authentication is passed, the equipment to be accessed is accessed to the host, and when the authentication is not passed, the equipment to be accessed is not accessed to the host.
In the process of executing the networking method by the networking equipment, a user of the equipment to be accessed does not need to input data by hand, so that real non-inductive networking can be realized, and the user experience is improved.
Further, the networking device may further include a power management module 350, where the power management module 350 is configured to supply power to the first master control module 320 and the NB communication module 340 of the networking device. Specifically, when the power management module 350 receives the sleep signal sent by the first master control module 320, the first master control module 320 and the NB communication module 340 are controlled to enter a sleep state with low power consumption. When the power management module 350 receives the power supply signal sent by the first master control module 320, it normally supplies power to the first master control module 320 and the NB communication module 340 to end the sleep state of the first master control module 320 and the NB communication module 340.
As a fourth aspect of the present disclosure, an electronic device is provided, as shown in fig. 5, including a second storage module 410, a second master module 420, and a first NFC module 430.
The second storage module 410 has stored thereon a second executable program that can be executed by the second master module 420 to implement the networking method provided according to the second aspect of the present disclosure, and the first NFC module 430 can send a networking request carrying identity information of the current electronic device when activated by an electromagnetic field.
The electronic device provided by the present disclosure is the device to be accessed mentioned above, and since the electronic device has the first NFC module 430, when the first NFC module 430 enters the electromagnetic field of the second NFC module 330 of the networking device provided in the above, the first NFC module 430 is activated, and at this time, the second master module 420 sends the networking request carrying the identity information of the electronic device to the second NFC module 330 through the first NFC module 430. The networking method provided by the first aspect of the present disclosure may then be performed by the networking device and an inductively-free networking of electronic devices is achieved.
In the present disclosure, the electronic device functions as a slave device when networked. The electronic device can be a mobile phone, a tablet computer and other terminal devices, and can also be other electronic devices with networking requirements.
The following briefly describes a process of the electronic device provided by the present disclosure accessing to a host for networking by using a networking device provided by the present disclosure.
The electronic equipment is a mobile phone, and when the electronic equipment does not enter the electromagnetic field range of the second NFC module of the networking equipment, the main control module and the NB communication module of the networking equipment are both in a dormant state.
And the first main control module of the networking equipment sets the networking white list by using the IMEI number.
And scanning the mobile phone to be accessed by using the networking equipment to acquire the networking request of the mobile phone to be accessed. The mobile phone carries the IMEI number of the mobile phone in the networking request sent by the first NFC module.
The networking equipment judges whether the mobile phone is in the networking white list or not according to the IMEI number of the mobile phone, judges that the mobile phone has networking authority when the mobile phone is in the networking white list, and accesses the mobile phone to the host under the condition of no need of further authentication, so that the mobile phone can be accessed to the WIFI network without sensing. At this time, the host computer pushes the information of the information non-white list unit to the mobile phone.
And when the mobile phone is not in the networking white list, the networking equipment judges whether the networking equipment and the host are in the same local area network or not. When the networking equipment and the host are in the same local area network, the networking equipment sends a networking authentication request carrying mobile phone identity information to the host through the local area network by utilizing an NB communication module; when the networking equipment and the host are not in the same local area network, the networking equipment sends a networking authentication request carrying mobile phone identity information to the host through a WIFI network by utilizing an NB communication module.
When the networking equipment and the host are in the same local area network, the networking equipment transmits the networking authentication request to the host through the local area network by utilizing an NB communication module; when the networking equipment and the host are not in the same local area network, the networking equipment utilizes an NB communication module to send a networking authentication request to the host through a WIFI network.
And the host authenticates the mobile phone according to the identity information in the networking authentication request and feeds back an authentication result to the NB communication module.
The networking equipment receives feedback information sent by the host through the NB communication module, and judges whether the mobile phone is allowed to access the host according to the feedback information.
After the authentication process is completed, the networking device sends a sleep control signal to the power control module, so that the first main control module and the NB communication module enter a low-power-consumption sleep state.
As a fifth aspect of the present disclosure, there is provided a computer readable storage medium storing a computer program which, when executed by a processor, implements the networking method provided according to the first aspect of the present disclosure, or the networking method provided according to the second aspect of the present disclosure.
It will be understood by those of ordinary skill in the art that all or some of the steps of the methods, systems, functional modules/units in the devices disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed by several physical components in cooperation. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable storage media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
Example embodiments have been disclosed herein, and although specific terms are employed, they are used and should be interpreted in a generic and descriptive sense only and not for purposes of limitation. In some instances, features, characteristics and/or elements described in connection with a particular embodiment may be used alone or in combination with features, characteristics and/or elements described in connection with other embodiments, unless expressly stated otherwise, as would be apparent to one skilled in the art. Accordingly, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of the disclosure as set forth in the appended claims.

Claims (11)

1. A networking method, comprising:
judging whether the equipment to be accessed has networking authority or not according to a networking request sent by the equipment to be accessed through a first Near Field Communication (NFC) module, wherein the networking request carries identity information of the equipment to be accessed;
when the equipment to be accessed has the networking right, accessing the equipment to be accessed to a host and networking;
and when the equipment to be accessed does not have the networking right, sending a networking authentication request to the host, wherein the networking authentication request carries the identity information of the equipment to be accessed.
2. The networking method of claim 1, wherein determining whether the device to be accessed has networking rights comprises: judging whether the equipment to be accessed is in a networking white list or not according to the identity information of the equipment to be accessed, wherein,
when the device to be accessed is in the networking white list, judging that the device to be accessed has the networking authority;
when the device to be accessed is not in the networking white list, the device to be accessed is judged not to have the networking authority.
3. The networking method of claim 2, wherein the identity information of the device to be accessed comprises an International Mobile Equipment Identification (IMEI) number of the device to be accessed.
4. The networking method according to claim 1, wherein before the step of determining whether the device to be accessed has networking authority according to a networking request sent by the device to be accessed through a first Near Field Communication (NFC) module, the networking method further comprises:
receiving the networking request;
and responding to the networking request, and sending a power supply signal to a power supply management module so that the power supply management module supplies power to the current main control module to end the dormant state of the current main control module.
5. The networking method of any of claims 1-4, wherein sending a networking authentication request to the host comprises:
judging whether the host is in a local area network or not;
when the host is in the local area network, sending the networking authentication request to the host through the local area network;
and when the host is not in the local area network, sending the networking authentication request to the host through a WIFI network.
6. The networking method according to any one of claims 1 to 4, wherein the networking method further comprises:
and responding to the networking allowing instruction returned by the host, and accessing the equipment to be accessed to the host and networking.
7. The networking method of claim 6, wherein in the step of sending a networking authentication request to the host, the networking authentication request is sent to the host through a local narrowband NB communication module, the networking method further comprising, after the step of accessing and networking the device to be accessed to the host:
and sending a sleep instruction to a battery management module so that the battery management module controls the NB communication module and the current main control module to enter a sleep state.
8. A networking method, comprising:
when the first NFC module is activated by an electromagnetic field, sending a networking request through the first NFC module, wherein the networking request carries identity information of a current device to be accessed.
9. A networking device, the networking device comprising:
a first storage module having a first executable program stored thereon;
a first master module capable of executing the first executable program to implement the networking method of any one of claims 1 to 7;
a second NFC module to provide an electromagnetic field;
an NB communication module to communicate with a host.
10. An electronic device, comprising:
a second storage module having a second executable program stored thereon;
a second master module capable of executing the second executable program to implement the networking method of claim 8;
a first NFC module capable of sending a networking request carrying identity information of a current electronic device when activated by an electromagnetic field.
11. A computer-readable storage medium storing a computer program which, when executed by a processor, implements the networking method of any one of claims 1 to 7, or the networking method of claim 8.
CN202011245325.8A 2020-11-10 2020-11-10 Networking method, networking device, electronic device and storage medium Pending CN114554462A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011245325.8A CN114554462A (en) 2020-11-10 2020-11-10 Networking method, networking device, electronic device and storage medium
PCT/CN2021/129443 WO2022100559A1 (en) 2020-11-10 2021-11-09 Networking method, networking device, electronic device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011245325.8A CN114554462A (en) 2020-11-10 2020-11-10 Networking method, networking device, electronic device and storage medium

Publications (1)

Publication Number Publication Date
CN114554462A true CN114554462A (en) 2022-05-27

Family

ID=81600759

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011245325.8A Pending CN114554462A (en) 2020-11-10 2020-11-10 Networking method, networking device, electronic device and storage medium

Country Status (2)

Country Link
CN (1) CN114554462A (en)
WO (1) WO2022100559A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115314448B (en) * 2022-08-11 2023-12-05 北京百度网讯科技有限公司 Method and device for accessing cloud network, electronic equipment and computer medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5862969B2 (en) * 2013-04-25 2016-02-16 ビッグローブ株式会社 Mobile network connection system and mobile network connection method
CN104159275B (en) * 2014-07-17 2015-12-09 小米科技有限责任公司 Method for connecting network and device
CN105813080A (en) * 2014-12-31 2016-07-27 阿里巴巴集团控股有限公司 Method and device for controlling access of equipment to network
CN108810858A (en) * 2018-05-08 2018-11-13 郑州易通众联电子科技有限公司 A method of the quick obtaining wireless router access authority based on NFC

Also Published As

Publication number Publication date
WO2022100559A1 (en) 2022-05-19

Similar Documents

Publication Publication Date Title
US9936390B2 (en) Method and apparatus of triggering applications in a wireless environment
US9594896B2 (en) Two factor authentication using near field communications
US11682922B2 (en) Contraband detection through smart power components
US9055393B2 (en) Near field communication data transfer
CN109661794B (en) Method and equipment for controlling access to access object
CN103959857A (en) Managing mobile device applications in a wireless network
CN106211131A (en) The management method of virtual SIM card, managing device, server and terminal
WO2014210563A1 (en) Fingerprinting a mobile device through near field communication
EP2747362A1 (en) Two factor authentication using near field communications
CN109410384B (en) Safety management system
CN114554462A (en) Networking method, networking device, electronic device and storage medium
KR20100077914A (en) Wireless communication device and method of controlling the same
CN104640112A (en) Authentication method, device and system
CN116489762A (en) Access registration method, device, system, communication equipment and storage medium
CN105292020A (en) Vehicle control method, vehicle control device and terminal
CN103843378A (en) Method for binding secure device to a wireless phone
CN114268959B (en) Communication device and system
CN110768397B (en) Charging control method and device, storage medium and wireless charging equipment
CN108632433B (en) Mobile terminal unlocking method and device
CN116405937A (en) Networking method, gateway device, intelligent device and storage medium
US20220014926A1 (en) Authentication of a user of a software application
CN115175277A (en) Dual-frequency router control method, dual-frequency router control device, and storage medium
CN105323756A (en) Authentication method, network side equipment and terminal
CN106304068A (en) Radio-frequency card remote identification method whatsoever and system
CN117479157A (en) Terminal access verification method and device and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination