Disclosure of Invention
The following presents a simplified summary of one or more aspects in order to provide a basic understanding of such aspects. This summary is not an extensive overview of all contemplated aspects, and is intended to neither identify key or critical elements of all aspects nor delineate the scope of any or all aspects. Its sole purpose is to present some concepts of one or more aspects in a simplified form as a prelude to the more detailed description that is presented later.
As described above, in the prior art, there are many problems with WiFi sharing and access. Therefore, the present application aims to provide a method and a system for sharing and accessing a WiFi network safely and quickly. By the method and the system, the device terminal which is not connected with the WiFi network can be quickly and safely accessed to use the WiFi network by touching the network device terminal which is connected with the WiFi network.
According to a first aspect of the present application, there is provided a method for WiFi network access and sharing, the method comprising:
the first equipment accesses the WiFi network through the router and synchronizes the first equipment identification and the router identification to the router control management platform;
the router control management platform sends the authorization identifier to the first device;
the second equipment establishes NFC connection with the first equipment; and
the second device accesses the WiFi network via the NFC connection and through the router identification and temporary key.
According to a preferred embodiment of the present application, the second device accessing the WiFi network via the NFC connection and through the router identification and the temporary key further comprises:
the first device acquires the second device identifier through the NFC connection;
the first device sends the second device identifier, the first device identifier and the authorization identifier to the router control management platform;
after receiving the first equipment identifier, the second equipment identifier and the authorization identifier, the router control management platform generates a temporary key and sends the temporary key to the first equipment and the router;
the first device sends the temporary secret key and the SSID of the WiFi network to the second device;
the second device accesses the WiFi network through the SSID and the temporary key.
According to a preferred embodiment of the present application, the authorization identifier is pre-stored in the NFC module of the first device.
According to the preferred embodiment of the present application, the router control management platform issues the temporary key to the router through the router identifier.
According to a preferred embodiment of the present application, the method further comprises: after the second device establishes the NFC connection with the first device, whether the second device wants to join a WiFi network is determined.
According to a second aspect of the present application, there is provided a system for WiFi network access and sharing for performing the method as described above, the system comprising:
a first device;
one or more second devices;
a router; and
the router controls the management platform.
To the accomplishment of the foregoing and related ends, the one or more aspects comprise the features hereinafter fully described and particularly pointed out in the claims. The following description and the annexed drawings set forth in detail certain illustrative features of the one or more aspects. These features are indicative, however, of but a few of the various ways in which the principles of various aspects may be employed and the present description is intended to include all such aspects and their equivalents.
Detailed Description
The detailed description set forth below in connection with the appended drawings is intended as a description of various configurations and is not intended to represent the only configurations in which the concepts described herein may be practiced. The detailed description includes specific details for the purpose of providing a thorough understanding of the various concepts. It will be apparent, however, to one skilled in the art that these concepts may be practiced without these specific details. In some instances, well known components are shown in block diagram form in order to avoid obscuring such concepts.
It is to be understood that other embodiments will be evident based on the present disclosure, and that system, structural, process, or mechanical changes may be made without departing from the scope of the present disclosure.
With reference to fig. 1 and 2, aspects are described with reference to one or more components and one or more methods that may perform the actions or functions described herein. In an aspect, the term "component" as used herein may be one of the parts that make up a system, may be hardware or software or some combination thereof, and may be divided into other components. While the operations described below in fig. 2 are presented in a particular order and/or as performed by example components, it should be understood that the order of the actions, as well as the components performing the actions, may vary depending on the implementation. Further, it should be understood that the following acts or functions may be performed by a specially programmed processor, a processor executing specially programmed software or computer readable media, or by any other combination of hardware components and/or software components capable of performing the described acts or functions.
As mentioned above, for shared access of WiFi, shortcut and security are aspects that must both need to be considered uniformly.
A flow diagram for a WiFi network access and sharing method according to an embodiment of the present application is illustrated in fig. 1.
As shown in fig. 1, the secure and fast WiFi network access and sharing method 100 mainly includes the following steps.
The first device performs WiFi network access through the SSID and the WiFi network key and synchronizes messages to the router control management platform (step 101), thereby triggering a trust authorization authentication event. These messages mainly include: an identification of the router to which the device is connected, and an identification of the first device itself, etc.
The router control management platform then returns an authorization identifier to the first device and pre-stores the authorization identifier in the NFC module of the first device (step 102).
When the second device needs to join the WiFi network, the second device touches the first device to establish connection with the first device through the NFC module (step 103).
The second device connects through the NFC and triggers a shared access event to access the WiFi network using the authorized identifier of the first device (step 104).
A detailed description of step 104 (200) for a WiFi network access and sharing method according to an embodiment of the present application is further illustrated in fig. 2. Step 104 mainly includes the following substeps.
First, the first device acquires the device identifier of the second device through the NFC connection and synchronously initiates a sharing access request to the router control management platform (step 201).
Second, the second device identification, the first device identification, and the authorized identification of the first device are sent to the router control management platform (step 202).
Thirdly, after receiving the first device identifier, the second device identifier and the authorization identifier, the router control management platform generates a temporary key, and sends the temporary key to the first device and the router to which the first device is connected (step 203).
Fourthly, the first device sends the temporary key issued by the router control management platform and the SSID connected with the WiFi to the second device through the NFC connection (step 204).
Fifth, the second device receives the SSID and the ephemeral key of the current WiFi network through the NFC connection and accesses the WiFi network using the SSID and the ephemeral key (step 205).
Specifically, the second device invokes WiFi access to initiate a request to the router, which completes access authentication and closes the shared access event.
A schematic structural diagram for a WiFi network access and sharing system 300 according to an embodiment of the present application is illustrated in fig. 3.
As shown in fig. 3, the system 300 mainly includes the following components.
The first device 301 is a device that performs WiFi network access through an SSID of a WiFi network and a key preset by a router. As can be appreciated by those skilled in the art, the first device includes a device wireless access module and an NFC module.
One or more second devices 302, i.e., devices that currently need access to the WiFi network. As can be appreciated by those skilled in the art, the second device also includes a device wireless access module and an NFC module.
Router 303, i.e., a wireless access point hardware device.
A router control management platform 304, which is mainly used to manage and configure various network access information.
As described above with respect to the method, the first device 301 first joins the current WiFi network with the SSID and WiFi network key preset by its router 303, while synchronizing the message to the router control management platform 304, thereby triggering a trust authority authentication event.
These messages mainly include: an identification of the router to which the device is connected, and an identification of the first device itself, etc.
The router control management platform 304 then returns an authorization identifier (i.e., an identifier for authenticating that the first device 301 is a legitimate access device) to the first device 301, and pre-stores the authorization identifier in the NFC module of the first device 301.
Next, when the second device 302 needs to join the WiFi network, an NFC connection is established with the first device 301 through its respective NFC module.
After the connection, the first device 301 acquires the device identifier of the second device 302 through the NFC connection and sends the second device identifier, the first device identifier, and the authorization identifier of the first device to the router control management platform 304.
After receiving the identifier, the router control and management platform 304 generates a temporary key, and sends the temporary key to the first device 301 and the router 303 to which the first device is connected.
Thereafter, the first device 301 sends the temporary key issued by the router control management platform 304 and the SSID of the current WiFi to the second device 302.
Finally, the second device 302 can successfully access the network via the SSID of the current WiFi network and the temporary secret key.
By adopting the WiFi access and sharing system according to the embodiment of the application, the non-connected WiFi network device (second device) can smoothly access the current network without knowing a network key through the connection of the connected WiFi network device (first device). On one hand, the private network key cannot be leaked, so that the privacy and the network security of a user are better protected; on the other hand, the current network password and any information do not need to be remembered at all times, the network can be accessed quickly only through NFC connection, and the user experience is good.
Compared with the prior art, the WiFi sharing access method and system have the following advantages.
Firstly, the application realizes noninductive and rapid access of the WiFi network of the unconnected device by the integral system and the method through the light touch and NFC connection between the connected WiFi device and the unconnected WiFi device through the NFC functional module of the wireless terminal, so that the wireless terminal has great convenience and convenience;
secondly, based on the fact that the WiFi equipment and the router which are connected control the management platform to trust to register and issue the authorized identification, the router can be linked to carry out configuration, the WiFi equipment which is not connected adopts the temporary secret key to access authentication, and therefore the safety of the network is greatly improved.
Aspects, elements, or any portion of an element, or any combination of elements according to the present disclosure may be implemented with a "processing system" that includes one or more processors. Examples of processors include: microprocessors, microcontrollers, Digital Signal Processors (DSPs), Field Programmable Gate Arrays (FPGAs), Programmable Logic Devices (PLDs), state machines, gated logic, discrete hardware circuits, and other suitable hardware configured to perform the various functionalities described throughout this disclosure. One or more processors in the processing system may execute software. Software should be construed broadly to mean instructions, instruction sets, code segments, program code, programs, subprograms, software modules, applications, software packages, routines, subroutines, objects, executables, threads of execution, procedures, functions, etc., whether referred to in software, firmware, middleware, microcode, hardware description language, or other terminology. The software may reside on a computer readable medium. The computer readable medium may be a non-transitory computer readable medium. By way of example, a non-transitory computer-readable medium comprises: magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips), optical disks (e.g., Compact Disk (CD), Digital Versatile Disk (DVD)), smart cards, flash memory devices (e.g., memory card, memory stick, key drive), Random Access Memory (RAM), Read Only Memory (ROM), programmable ROM (prom), erasable prom (eprom), electrically erasable prom (eeprom), registers, removable disk, and any other suitable medium for storing software and/or instructions that may be accessed and read by a computer. By way of example, computer-readable media may also include carrier waves, transmission lines, and any other suitable media for conveying software and/or instructions that may be accessed and read by a computer. The computer readable media may reside in a processing system, external to the processing system, or distributed across multiple entities including the processing system. The computer readable medium may be embodied in a computer program product. By way of example, a computer program product may include a computer-readable medium in packaging material. Those skilled in the art will recognize how best to implement the described functionality presented throughout this disclosure, depending on the particular application and the overall design constraints imposed on the overall system.
It is to be understood that the specific order or hierarchy of steps in the methods disclosed is an illustration of exemplary processes. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the methods or methodologies described herein may be rearranged. The accompanying method claims present elements of the various steps in a sample order, and are not meant to be limited to the specific order or hierarchy presented unless specifically recited herein.
The previous description is provided to enable any person skilled in the art to practice the various aspects described herein. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects. Thus, the claims are not intended to be limited to the aspects shown herein, but is to be accorded the full scope consistent with the language claims, wherein reference to an element in the singular is not intended to mean "one and only one" (unless specifically so stated) but rather "one or more". The term "some" means one or more unless specifically stated otherwise. A phrase referring to "at least one of a list of items refers to any combination of those items, including a single member. By way of example, "at least one of a, b, or c" is intended to encompass: at least one a; at least one b; at least one c; at least one a and at least one b; at least one a and at least one c; at least one b and at least one c; and at least one a, at least one b, and at least one c. All structural and functional equivalents to the elements of the various aspects described throughout this disclosure that are known or later come to be known to those of ordinary skill in the art are expressly incorporated herein by reference and are intended to be encompassed by the claims. Moreover, nothing disclosed herein is intended to be dedicated to the public regardless of whether such disclosure is explicitly recited in the claims.