CN114916038A - Automatic network access and automatic connection method, system, device and medium - Google Patents

Automatic network access and automatic connection method, system, device and medium Download PDF

Info

Publication number
CN114916038A
CN114916038A CN202110184819.8A CN202110184819A CN114916038A CN 114916038 A CN114916038 A CN 114916038A CN 202110184819 A CN202110184819 A CN 202110184819A CN 114916038 A CN114916038 A CN 114916038A
Authority
CN
China
Prior art keywords
network
network access
electronic device
account
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110184819.8A
Other languages
Chinese (zh)
Inventor
童诗佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202110184819.8A priority Critical patent/CN114916038A/en
Publication of CN114916038A publication Critical patent/CN114916038A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/10Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The application relates to a method, a system, a device and a medium for automatic network access and automatic connection, which specifically comprise the following steps: the access equipment receives a first equipment identifier of the electronic equipment, the electronic equipment broadcasts a connection request after being electrified, and the connection request comprises a second equipment identifier of the electronic equipment; the access device matches a second device identifier in the connection request with the first device identifier according to the received connection request, and accesses the electronic device to a preset network or preset connection equipment under the condition that the first device identifier is matched with the second device identifier. By the method, the electronic equipment can be automatically accessed to the local area network or automatically connected with the third-party equipment after being electrified, a user does not need to repeatedly give corresponding connection authorization permission under the condition that the electronic equipment has connection requirements every time, and connection safety of the electronic equipment is guaranteed while connection permission operation of the user is greatly simplified.

Description

Automatic network access and automatic connection method, system, device and medium
Technical Field
The present application relates to the field of terminal technologies, and in particular, to a method, a system, a device, and a medium for automatic network access and automatic connection.
Background
At present, along with continuous popularization and popularization of intelligent equipment, the use demand of users for the intelligent equipment is also continuously improved, and the functional demand for the intelligent equipment turns to more attention on how to improve the use convenience of the intelligent equipment. Smart devices need to be connected into a network environment for use, such as the most common local area network or home network.
In an actual application scenario, a plurality of intelligent devices can be connected to one local area network at the same time. For example, a plurality of smart devices such as a smart phone, a tablet computer, a smart television, a smart speaker, and a router may be connected to a home network at the same time. Considering the privacy of the home network environment, before the smart device accesses the home network, security verification needs to be performed on the access action, and the user is required to perform authorization permission on the access request of the smart device to the home network.
Disclosure of Invention
The application aims to provide an automatic network access and automatic connection method, system and device. According to the technical scheme, the automatic connection of the electronic equipment in the power-on state can be realized on the basis of guaranteeing the connection safety and privacy of the user equipment, and the use experience of a user is further improved.
A first aspect of the present application provides a network access method for an electronic device, including: the network access equipment receives a first network access identifier of first electronic equipment; the method comprises the steps that a first electronic device broadcasts a network access request, wherein the network access request comprises a second network access identifier of the first electronic device; the network access equipment matches a second network access identifier and a first network access identifier in the network access request according to the received network access request; and the network access equipment accesses the first electronic equipment into a preset network under the condition that the first network access identification is matched with the second network access identification.
That is, in the embodiment of the present application, the first electronic device may broadcast the second network access identifier of the first electronic device to the surrounding environment when the first electronic device is in the powered-on state, and the network access device of the preset network may receive the first network access identifier of the first electronic device in advance, and determine whether the first electronic device is allowed to access the preset network by comparing whether the second network access identifier is matched with the first network access identifier. Under the condition that the first network access identifier is matched with the second network access identifier, the fact that the first electronic device is allowed to access the preset network is indicated, at the moment, the network access device automatically accesses the first electronic device into the preset network, extra authorization operation is not needed to be executed by a user, and the use experience of the user on the first electronic device is improved.
For example, the default network may be a local area network such as a home network, and the network access device may be an access point device of the local area network such as a router and a laptop. The first electronic device can be a terminal device such as an intelligent printer and an intelligent scanner which need to be connected to enter a local area network. The first network access identifier may be a product serial number of the first electronic device, and is used for identifying the identity of the first electronic device and has uniqueness. The second network access identifier may be the same as the first network access identifier, or may be verification information that can have a one-to-one correspondence with the first network access identifier. The network access equipment judges whether the first electronic equipment has the access authority of the preset network or not by matching the first network access identification with the second network access identification, and accesses the first electronic equipment into the preset network under the condition that the first network access identification is matched with the second network access identification.
In a possible implementation of the first aspect, the network access method further includes: the second electronic equipment acquires a first network access identifier of the first electronic equipment from the first server under the condition that a purchase order of the first electronic equipment is completed; the first server acquires a first network access identifier of first electronic equipment from the first electronic equipment under the condition that a purchase order of the first electronic equipment is generated; the second electronic device is capable of accessing a predetermined network.
For example, the first server may be a mall server, and the first network access identifier of the first electronic device is obtained when a purchase order of the first electronic device is generated. The second electronic device may be a user device such as a mobile phone, and the user may perform a receiving confirmation operation on the first electronic device through the user device such as the mobile phone, so as to complete a purchase order of the first electronic device. In the case that the purchase order of the first electronic device is completed, the second electronic device may acquire the first network access identifier of the first electronic device from the mall server.
In a possible implementation of the first aspect, the second electronic device sends the first network access identifier of the first electronic device to the network access device when receiving the first network access identifier of the first electronic device.
It can be understood that, since the second electronic device can access the preset network, the second electronic device can send the first network access identifier of the first electronic device to the network access device of the preset network. The second electronic device can send the first network access identifier to the network access device in time under the condition that the first network access identifier of the first electronic device is received, so that the first electronic device can be smoothly accessed to a preset network when being in a power-on state.
In a possible implementation of the first aspect, the second electronic device sends the first network access identifier of the first electronic device to the network access device when the second server verifies that the first account bound to the first electronic device meets the access condition of the preset network; and the second electronic equipment sends the binding information of the first electronic equipment and the first account to the second server under the condition that the purchase order of the first electronic equipment is completed.
That is, in the embodiment of the present application, an authentication process for connecting the first electronic device to the preset network may be implemented in an account verification manner. Under the condition that a first account bound with first electronic equipment meets the access condition of a preset network, it is indicated that the first electronic equipment corresponding to the first account meets the access condition of the preset network, network access can be performed to the preset network, and at the moment, a second electronic equipment carrying a first network access identifier sends the first network access identifier to network access equipment of the preset network, so that the first electronic equipment can be successfully accessed to the preset network in a mode of broadcasting the second network access identifier after being powered on. The binding information of the first electronic device and the first account is confirmed by the user through the second electronic device, and the user can select a proper first account by himself to enable the first electronic device to be smoothly accessed into a preset network to which the user needs to be connected.
For example, the second electronic device may be a user device such as a mobile phone, and the user may perform a receiving confirmation operation on the first electronic device through the user device such as the mobile phone, so as to complete a purchase order of the first electronic device. When the purchase order of the first electronic device is completed, the user may bind the first electronic device with a first account through the user device, where the first account may be a device account bound with the first electronic device. The second server determines whether the first electronic device can access the preset network by verifying whether the first account (such as a device account) meets an access condition of the preset network according to the binding information of the first electronic device and the first account: and under the condition that the first account number meets the access condition of the preset network, the first electronic equipment can be accessed to the preset network, and at the moment, the second electronic equipment issues a first network access identifier of the first electronic equipment to the network access equipment.
In a possible implementation of the first aspect, the second server obtains, in advance, binding information between a preset network and a second account; and the second server matches the first account with the second account according to the received binding information of the first electronic device and the first account, and verifies that the first account meets the access condition of the preset network under the condition that the first account is matched with the second account.
For example, the second account may be a network account corresponding to a preset network, and each network account may have at least one connection permission account allowing access to a network environment corresponding to the network account. The second server determines whether the device account as the first account and the second account as the network account match by identifying whether the device account of the first electronic device belongs to the connection permission account of the network account. When the device account belongs to the connection permission account of the network account, it indicates that the first electronic device corresponding to the device account is allowed to be connected to the preset network corresponding to the network account, that is, the first account is matched with the second account.
In a possible implementation of the first aspect, the second electronic device sends the first network access identifier to the network access device through the second server when the second server verifies that the first account bound to the first electronic device meets the preset network access condition. It can be understood that the second electronic device (e.g., a mobile phone) can access a preset network (e.g., a home network), but cannot be guaranteed to be always connected to the preset network, and the first network access identifier of the first electronic device to be connected to the network may be sent out in time by sending the first network access identifier to the network access device (e.g., a router) of the preset network through the second electronic device, so that the first electronic device cannot complete automatic access to the preset network at the first time after being powered on. In this case, considering that the second electronic device (e.g., a mobile phone) can maintain a connection state with the second server (e.g., an account server), and meanwhile, the preset network can also maintain a connection state with the second server, the second electronic device can send the first network access identifier of the first electronic device to the network access device through the second server, so that the network access device can timely obtain the first network access identifier, and it is ensured that the first electronic device can smoothly access the preset network when broadcasting the second network access identifier after being powered on for the first time.
In one possible implementation of the foregoing first aspect, the network access method further includes: the method comprises the steps that a second server obtains a first network access identifier of first electronic equipment from a first server under the condition that a purchase order of the first electronic equipment is completed; the first server acquires a first network access identifier of the first electronic equipment from the first electronic equipment under the condition that a purchase order of the first electronic equipment is generated.
That is, in this embodiment of the present application, the first network access identifier of the first electronic device may also be directly sent to the second server by the first server. For example, the first server may be a mall server, and the first network access identifier of the first electronic device is obtained when a purchase order of the first electronic device is generated. The second server may be an account server having a connection channel with the mall server, and the first network access identifier of the first electronic device is obtained from the mall server when the purchase order of the first electronic device is completed.
In a possible implementation of the first aspect, the second server sends the first network access identifier of the first electronic device to the network access device when verifying that the first account bound to the first electronic device meets a preset network access condition; and the second electronic equipment sends the binding information of the first electronic equipment and the first account to the second server under the condition that the purchase order of the first electronic equipment is completed. It can be understood that, no matter the second server or the second electronic device is used to receive the first network access identifier of the first electronic device, the authentication process for connecting the first electronic device to the preset network can be implemented in an account verification manner, which is not described herein again.
In a possible implementation of the first aspect, the second server obtains binding information between a preset network and the second account in advance; and the second server matches the first account with the second account according to the received binding information of the first electronic device and the first account, and verifies that the first account meets the access condition of the preset network under the condition that the first account is matched with the second account. It can be understood that, when the first server sends the first network access identifier of the first electronic device to the second server, the second server also needs to match the first account with the second account of the preset network according to the received binding information between the first electronic device and the first account, and the matching process may use the same matching policy as described above, which is not described herein again. And under the condition that the first account number is matched with the second account number, the second server sends the first network access identifier of the first electronic equipment to the network access equipment for local storage.
In a possible implementation of the first aspect, the second server sends the first network access identifier of the first electronic device to the network access device when verifying that the first account bound to the first electronic device meets a preset network access condition and receiving a network access identifier update request of the network access device; and the network access equipment sends a network access identifier updating request to the second server under the condition that the first network access identifier and the second network access identifier are unsuccessfully matched for the first time.
That is, in an embodiment of the present application, the first network access identifier of the first electronic device may be stored in a second server (e.g., an account server). When the first electronic device is powered on and starts to broadcast the second network access identifier, the network access device firstly performs matching identification on the second network access identifier according to the locally stored historical first network access identifier information. And under the condition that the historical first network access identifier and the second network access identifier which are locally stored by the network access equipment are not successfully matched for the first time, the network access equipment sends an updating request to a second server to update the latest first network access identifier information. The second server sends the first network access identifier of the first electronic device to the network access device only when the first account bound with the first electronic device meets the preset network access condition and receives a network access identifier updating request of the network access device.
It can be understood that, in the case that the first network access identifier of the first electronic device may be stored in the second server, the network access device of the preset network may only store the first network access identifier of the access terminal device commonly used in the preset network without locally storing all the first network access identifiers of the terminal devices that need to be connected to the preset network; and for the access terminal device which is not commonly used in the preset network, when the corresponding first network access identifier cannot be found locally, the corresponding first network access identifier can be obtained by sending an update request to the second server. Meanwhile, the first network access identifier of the first electronic device is stored in the second server, so that the first electronic device can access a required preset network conveniently, and all the preset networks allowing the first electronic device to access can be obtained through interaction with the second server.
In one possible implementation of the first aspect, the first network access identifier includes a product serial number of the first electronic device and a physical address of the first electronic device. It can be understood that the first network access identifier of the first electronic device has a function of indicating the uniqueness of the identity of the first electronic device, and may be a product serial number of the first electronic device, or a physical address of the first electronic device.
In a possible implementation of the first aspect, the network access device sends network configuration information of a preset network to the first electronic device when the first network access identifier is matched with the second network access identifier; the first electronic equipment is accessed to a preset network according to the network configuration information. It can be understood that the first electronic device may locally store the network configuration information after acquiring the network configuration information of the preset network, and the first electronic device may directly call the locally stored network configuration information to access the corresponding preset network in a subsequent network access process.
A second aspect of the present application provides a network access method for an electronic device, including: the network access equipment receives a first network access identifier of first electronic equipment; the network access equipment receives a network access request broadcasted by first electronic equipment, wherein the network access request comprises a second network access identifier of the first electronic equipment; the network access equipment matches a second network access identifier and a first network access identifier in the network access request according to the received network access request; and the network access equipment accesses the first electronic equipment to a preset network under the condition that the first network access identification is matched with the second network access identification. It is understood that the network access device may be an access point device of a predetermined network, for example, a router in a home network is a network access device. And the network access equipment authenticates that the first electronic equipment can access the preset network according to the received first network access identification and the received second network access identification. Under the condition that the first network access identifier is matched with the second network access identifier, the first electronic device is indicated to have obtained the user authorization for accessing the preset network in advance, and at the moment, the network access device can access the first electronic device into the preset network, so that the first electronic device can automatically access the preset network.
In a possible implementation of the second aspect, the network access device sends network configuration information of a preset network to the first electronic device when the first network access identifier is matched with the second network access identifier, where the network configuration information can be used by the first electronic device to access the preset network, and the first network access identifier includes a product serial number of the first electronic device and a physical address of the first electronic device. It can be understood that the network access device serves as an access point of the preset network, network configuration information of the preset network is stored in the network access device, and the first electronic device can access the preset network through the network configuration information sent by the network access device.
A third aspect of the present application provides a network access method for an electronic device, including: the second electronic device determining that the purchase order of the first electronic device is complete; the second electronic equipment acquires a first network access identifier of the first electronic equipment from the first server; the first server acquires a first network access identifier of the first electronic device from the first electronic device under the condition that a purchase order of the first electronic device is generated, and the second electronic device can access a preset network.
It can be understood that the second electronic device may be a user device such as a mobile phone, and when the first electronic device completes the logistics transportation process, the user may perform an operation of confirming receiving through the second electronic device, and obtain the first network access identifier of the first electronic device from the first server (e.g., a mall server). The second electronic device may access the preset network to send the first network access identifier of the first electronic device to the preset network.
In a possible implementation of the third aspect, the second electronic device sends the first network access identifier of the first electronic device to the network access device when receiving the first network access identifier of the first electronic device.
In a possible implementation of the third aspect, the second electronic device sends the first network access identifier of the first electronic device to the network access device when the second server verifies that the first account bound to the first electronic device meets the access condition of the preset network; and the second electronic equipment sends the binding information of the first electronic equipment and the first account to the second server under the condition that the purchase order of the first electronic equipment is completed. Different from the possible implementation, the second electronic device may send the first network access identifier to the network access device under the condition that the first electronic device is verified to meet the preset network access condition, so that the security of the connection of the first electronic device can be better considered.
A fourth aspect of the present application provides a network access method for an electronic device, including: the method comprises the steps that a second server obtains a first network access identifier of first electronic equipment from a first server under the condition that a purchase order of the first electronic equipment is completed; the second server sends a first network access identifier of the first electronic equipment to the network access equipment; the first server acquires a first network access identifier of the first electronic device from the first electronic device under the condition that a purchase order of the first electronic device is generated. For example, the second server may be an account server, and according to the device account bound to the first electronic device and the network account bound to the preset network, security verification is performed on whether the first electronic device can access the preset network through an authorized connection relationship between the device account and the network account, so that security of the first electronic device in a process of accessing the preset network is further improved.
In a possible implementation of the fourth aspect, the second server obtains binding information between a preset network and the second account in advance; the second server matches the first account with the second account according to the received binding information of the first electronic device and the first account, and verifies that the first account meets the access condition of a preset network under the condition that the first account is matched with the second account; and the second electronic equipment sends the binding information of the first electronic equipment and the first account to the second server under the condition that the purchase order of the first electronic equipment is completed.
In a possible implementation of the fourth aspect, the second server sends the first network access identifier of the first electronic device to the network access device when verifying that the first account bound to the first electronic device meets the preset network access condition.
In a possible implementation of the fourth aspect, the second server sends the first network access identifier of the first electronic device to the network access device when verifying that the first account bound to the first electronic device meets a preset network access condition and receiving a network access identifier update request of the network access device; and the network access equipment sends a network access identifier updating request to the second server under the condition that the first network access identifier and the second network access identifier are unsuccessfully matched for the first time.
That is, in the embodiment of the application, the second server (e.g., the account server) can provide a cloud storage space for the first network access identifier, in addition to performing security verification on whether the first electronic device can access the preset network. Under the condition that the first network access identifier of the first electronic equipment can be stored in the second server, the network access equipment of the preset network does not need to locally store all the first network access identifiers of the terminal equipment which needs to be connected to the preset network, and only the first network access identifier of the access terminal equipment commonly used in the preset network can be stored; and for the access terminal equipment which is not commonly used in the preset network, when the corresponding first network access identification cannot be found locally, the corresponding first network access identification can be obtained by sending an update request to the second server.
A fifth aspect of the present application provides a bluetooth connection method for an electronic device, including: the Bluetooth connection equipment receives a first connection identifier of third electronic equipment; the third electronic equipment broadcasts a Bluetooth connection request, wherein the Bluetooth connection request comprises a second connection identifier of the third electronic equipment; the Bluetooth connection equipment matches a second connection identifier with a first connection identifier in the Bluetooth connection request according to the received Bluetooth connection request; and the Bluetooth connection equipment is in Bluetooth connection with the third electronic equipment under the condition that the first connection identifier is matched with the second connection identifier.
That is, in the embodiment of the present application, as the third electronic device that needs to perform bluetooth connection, the second connection identifier may be broadcast when the third electronic device is in a power-on state. The Bluetooth connecting equipment matches a second connecting identification broadcasted by the third electronic equipment according to the first connecting identification received in advance, and if the first connecting identification is matched with the second connecting identification, the third electronic equipment is proved to have the permission of accessing the Bluetooth connecting equipment and can be connected with the Bluetooth connecting equipment in a Bluetooth mode.
It can be understood that how the bluetooth connection device receives the first connection identifier of the third electronic device may adopt the same manner as that in the network access method provided by the foregoing first aspect, where the network access device receives the first network access identifier of the first electronic device, and details are not described herein.
In a possible implementation of the above fifth aspect, the first connection identifier of the third electronic device includes a product serial number of the third electronic device and a physical address of the third electronic device. It is understood that the first connection identifier of the third electronic device has a function of indicating the uniqueness of the identity of the third electronic device, and may be a product serial number of the third electronic device or a physical address of the third electronic device.
In a possible implementation of the fifth aspect, the bluetooth connection device sends the bluetooth configuration information of the bluetooth connection device to the third electronic device when the first connection identifier matches the second connection identifier; and the third electronic equipment performs Bluetooth connection with the Bluetooth connection equipment according to the Bluetooth configuration information. It can be understood that the third electronic device can locally store the bluetooth configuration information after acquiring the bluetooth configuration information of the bluetooth connection device, and the third electronic device can directly call the locally stored bluetooth configuration information to access the corresponding bluetooth connection device in the subsequent bluetooth connection process.
A sixth aspect of the present application provides an electronic device, comprising: a memory storing instructions; a processor coupled to the memory, wherein the program instructions stored by the memory, when executed by the processor, cause the electronic device to perform the network access method as provided by the first aspect or the bluetooth connectivity method as provided by the second aspect.
A seventh aspect of the present application provides a readable medium, characterized in that the readable medium has stored thereon instructions, which when executed on an electronic device, cause the electronic device to execute the network access method provided by the foregoing first aspect or the bluetooth connection method provided by the foregoing second aspect.
Drawings
Fig. 1 illustrates a scenario architecture of a terminal device accessing a network environment according to an embodiment of the present application;
fig. 2 shows an operation schematic diagram of implementing the smart scanner 300 to access the home network 400 through the mobile phone 100 according to the embodiment of the present application;
fig. 3 shows another operation schematic diagram of implementing the smart scanner 300 to access the home network 400 through the mobile phone 100 according to the embodiment of the present application;
fig. 4 illustrates a device networking method according to an embodiment of the present application;
fig. 5 illustrates a scenario architecture of an automatic network access method according to an embodiment of the present application;
fig. 6 shows specific steps of purchasing the smart scanner 300 by the mobile phone 100 according to an embodiment of the present application;
fig. 7 shows specific steps of authorizing the smart scanner 300 to access the home network 400 through the mobile phone 100 according to an embodiment of the present application;
FIG. 8 illustrates an automatic network entry method according to an embodiment of the present application;
fig. 9 shows a flow diagram of a process for exchanging items for the smart scanner 300 according to an embodiment of the application;
fig. 10 illustrates a scenario architecture of another automatic network entry method according to an embodiment of the present application;
fig. 11 illustrates an example of device account binding performed on the smart scanner 300 by the mobile phone 100 according to an embodiment of the present application;
fig. 12 shows another example of device account binding for the smart scanner 300 by the mobile phone 100 according to the embodiment of the present application;
fig. 13 shows another example of device account binding for the smart scanner 300 by the mobile phone 100 according to the embodiment of the present application;
fig. 14 illustrates a method for device account binding and authentication according to an embodiment of the present disclosure;
fig. 15 shows a scenario architecture of another automatic network access method according to an embodiment of the present application;
fig. 16 shows a scenario architecture of another automatic network entry method according to an embodiment of the present application;
FIG. 17 illustrates another method for automatic network entry according to an embodiment of the present application;
fig. 18 shows a scenario architecture of another automatic network entry method according to an embodiment of the present application;
FIG. 19 illustrates another method for automatic network entry according to an embodiment of the present application;
fig. 20 illustrates a scenario architecture of another automatic network entry method according to an embodiment of the present application;
FIG. 21 illustrates another method for automatic network entry according to an embodiment of the present application;
fig. 22 illustrates a device connection management interface of the handset 100 according to an embodiment of the application;
FIG. 23 illustrates a scenario architecture for Bluetooth automatic connection according to an embodiment of the present application;
FIG. 24 shows a schematic structural diagram of an electronic device according to an embodiment of the application;
fig. 25 shows a block diagram of a software architecture of an electronic device according to an embodiment of the present application.
Detailed Description
The application provides a technical scheme for automatically accessing a local area network by related terminal equipment. Through the technical scheme, the terminal equipment can realize automatic connection to the local area network. The user only needs to give the corresponding network access authority to the terminal equipment before the terminal equipment is firstly accessed into the local area network, and the terminal equipment can automatically acquire the network configuration information of the local area network after being electrified and automatically access into the local area network. The user does not need to give corresponding authorization permission when the terminal equipment accesses the local area network every time, and the network access permission operation of the user is simplified while the network access security of the terminal equipment is ensured.
Embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Fig. 1 illustrates a scenario architecture of a terminal device accessing a network environment, according to some embodiments of the present application.
As shown in fig. 1, the scenario includes the user equipment 100, a local area network 400 and a terminal equipment 300 to be accessed to the local area network 400. Wherein the user equipment 100 is accessed in the local area network 400.
In the above scenario, the user may obtain the device information of the terminal device 300 to be accessed to the local area network 400 through the user device 100, and at this time, the terminal device 300 initiates a connection request for accessing the local area network 400 to the user through the user device 100. If the user agrees to the connection request through the user equipment 100, the terminal equipment 300 obtains the network configuration information of the local area network 400, and the terminal equipment 300 accesses the local area network 400 according to the network configuration information. The manner of acquiring the network configuration information of the local area network 400 by the terminal device 300 may be that the user device 100 directly issues the network configuration information to the terminal device 300, or that the user device 100 controls the local area network 400 to issue the network configuration information to the terminal device 300.
It is understood that the user equipment 100 and the terminal equipment 300 suitable for the present technical solution may be various electronic devices with network connection function, such as a smart phone, a tablet computer, a desktop computer, a laptop computer, a wearable device, a head-mounted display, a portable game console, a portable music player, a smart television, a smart speaker, a smart scanner, a router, a smart printer, and so on. Meanwhile, it is understood that the local area network 400 suitable for the technical solution of the present application may be a local area network environment in a local area, such as a home network in a home environment and a work network in an office environment.
For convenience of description, the user equipment 100 is a mobile phone, the terminal device 300 is an intelligent scanner, and the local area network 400 is a home network.
For example, fig. 1 and 2 illustrate one manner of operation for a user to access a home network 400 via a mobile phone 100 using a smart scanner 300. As shown in fig. 2a to 2b, the user scans the two-dimensional code on the surface of the smart scanner 300 using the mobile phone 100 to acquire the device information of the smart scanner 300. As shown in fig. 2c, when the device information of the smart scanner 300 is displayed on the display screen of the mobile phone 100, the smart scanner 300 initiates a request to the mobile phone 100 as to whether to allow the smart scanner to access the home network. When the user clicks the "yes" option on the display screen, indicating that the user allows the smart scanner 300 to access the home network 400, the mobile phone 100 may issue network configuration information of the home network 400 to the smart scanner 300, as shown in fig. 2 d. The intelligent scanner 300 can access the home network 400 according to the network configuration information.
Also for example, fig. 1 and 3 illustrate one manner of operation for a user to access a home network 400 via a handset 100 via a smart scanner 300. Unlike the operation mode shown in fig. 2, as shown in fig. 3a, the user establishes near field communication with the smart scanner 300 by using the mobile phone 100 to approach the smart scanner 300, and obtains the device information of the smart scanner 300. The user authorization step of fig. 3b and the network accessing step of the intelligent scanner 300 shown in fig. 3c are respectively consistent with the steps shown in fig. 2c and fig. 2d in the scenario shown in fig. 2, and are not described again here.
Based on the scenario shown in fig. 2 or fig. 3, fig. 4 shows an implementation flow of a device networking method, which specifically includes:
step 401: the terminal device 300 is previously given a device identification. The device identifier includes device information of the terminal device 300 and has uniqueness, and the device identifier may be a product serial number or a physical Access Control (MAC) Address of the terminal device 300.
Each terminal device 300 corresponds to an independent device identifier, which may be assigned to the terminal device by a device manufacturer at a production stage or a factory stage of the terminal device 300. As shown in fig. 2 or fig. 3, the device identifier may be embodied in the form of a recognizable two-dimensional code or a readable code stored in the terminal device 300.
Step 402: the user equipment 100 obtains the device information of the terminal device 300 by parsing the device identification of the terminal device 300.
The user equipment 100 may select a corresponding parsing manner according to the specific representation form of the device identifier. For example, as shown in fig. 2, when the device identifier is a recognizable two-dimensional code, the mobile phone 100 may acquire the device information of the smart scanner 300 by scanning the two-dimensional code. For another example, as shown in fig. 3, when the device identifier is a readable code, the mobile phone 100 may establish a connection with the smart scanner 300 by near field communication to read the code, and obtain the device information of the smart scanner 300. Here, the specific resolution of the device identifier by the user equipment 100 is not limited.
Step 403: the terminal device 300 makes a connection authorization request to the user device 100. For example, as shown in fig. 2c or fig. 3b, when the mobile phone 100 acquires the device information of the smart scanner 300, the smart scanner 300 sends a connection authorization request to the mobile phone 100, the mobile phone 100 responds to the authorization request and displays a confirmation notification for the user to select, and the content of the confirmation notification may be, for example, "whether the smart scanner is allowed to access the home network," or other content, which is not limited herein. The user can confirm or reject the authorization of the connection authorization request of the smart scanner 300 by performing touch control and other operations on the mobile phone 100. Step 404: the terminal device 300 acquires network configuration information of the local network 400. The network configuration information may include connection information such as an IP address, a subnet mask, and a gateway of the local area network 400, and the terminal device 300 can access the local area network 400 according to the network configuration information of the local area network 400.
In step 405, the terminal device 300 accesses the local area network 400 according to the network configuration information.
It is understood that, for the terminal device 300, after the network configuration information of the local area network 400 is obtained in the step 404, the terminal device 300 may locally store the network configuration information; when the terminal device 300 needs to access the local area network 400 next time, the local area network 400 can be directly accessed by means of the locally stored network configuration information without a secondary authorization operation requiring user intervention. Therefore, the application scenario applicable to the technical solution may be a scenario in which the terminal device 300 requests to access the local area network 400 for the first time.
In the foregoing embodiment, the access operation of the terminal device 300 to the local area network 400 can be implemented when the user confirms the authorization, and since the access operation of the terminal device 300 is authorized by the user, the security of the terminal device 300 accessing the local area network 400 is effectively ensured. However, the device network access method also has the problem of poor user experience: for each terminal device 300 to be connected to the network, the user needs to obtain the device information of the terminal device 300 by scanning the two-dimensional code or establishing near field communication, and send the network configuration information of the local area network 400 to the terminal device 300. This authorization operation is complex and cumbersome, and especially when the number of terminal devices 300 that need to access the lan 400 is large, the user is required to repeat the authorization operation, which will greatly reduce the user experience.
In order to solve the above problem, some embodiments of the present application show a scenario architecture of an automatic network access method.
As shown in fig. 5, the foregoing scenario specifically includes the user equipment 100, the mall server 200, the terminal equipment 300 purchased by the user, and the home network 400. In this scenario, the user may purchase the terminal device 300 in the online mall corresponding to the mall server 200 through the user device 100, and when the user device 100 confirms receiving of the goods for the terminal device 300, the user device 100 gives the terminal device 300 an access right to automatically access the local area network 400, so that the terminal device 300 can automatically access the local area network 400 after being powered on for the first time, which greatly simplifies the steps of the authorization operation compared with the foregoing embodiment. For convenience of description, the user equipment 100 is taken as a mobile phone, the terminal equipment 300 is taken as an intelligent scanner, and the local area network 400 is taken as a home network.
Fig. 6 shows a specific process performed by the user to enter the mall application to purchase the smart scanner 300 through the mobile phone 100 in the above scenario.
Specifically, as shown in fig. 6a and 6b, the user enters the display interface of the mall application by clicking the mall icon in the mobile phone 100, and at this time, the mall application accesses the mall server 200 from the background to obtain specific display contents in the display interface. As shown in fig. 6c, the user clicks on the smart scanner 300 in fig. 6b and enters the goods page of the smart scanner 300. After the user clicks the "buy button" on the goods page, the mall application generates a purchase order locally on the cell phone 100 and displays the purchase order in the display of the mall application, as shown in fig. 6 d. If the user clicks "submit order" in the purchase order at this time, the mall application guides the user to complete payment, and displays the successful payment information as shown in fig. 6 e. Meanwhile, the mall application transmits the purchase order information to the mall server 200 in the background. The mall server 200 generates a shopping order according to the received purchase order information and issues an ex-warehouse instruction regarding the intelligent scanner 300 to the logistics server. As shown in fig. 6f, after the mall server 200 issues the warehouse-out command, the user may view the specific information and logistics of the order through the "my" interface of the mobile phone 100 in the mall application.
When the mall server 200 issues an outbound command related to the intelligent scanner 300 to the logistics server, the product serial number corresponding to the intelligent scanner 300 is acquired at the same time. For example, the logistics server may respond to the delivery instruction of the intelligent scanner 300, and issue a shipping instruction of the intelligent scanner 300 to the delivery person in charge of the logistics warehouse; the ex-warehouse person in charge extracts the intelligent scanner 300 from the logistics warehouse according to the shipping instruction and performs the shipping operation. In the shipping operation, the ex-warehouse person in charge performs a goods inspection scan on the intelligent scanner 300 through the handheld scanner, obtains a product serial number corresponding to the intelligent device 300, and then feeds the product serial number back to the mall server 200. The mall server 200 binds the product serial number of the intelligent scanner 300 with the shopping order of the intelligent scanner 300.
The product serial number may be a unique identification code of the intelligent scanner 300, and is equivalent to the "identification number" of the intelligent scanner 300. The product serial number of the smart scanner 300 may serve as an identification of the smart scanner 300 during a subsequent access of the smart scanner 300 to the home network 400. A process of how the smart scanner 300 automatically accesses the home network 400 according to its product serial number will be described in detail below.
Fig. 7 shows a specific process in which the user authorizes the smart scanner 300 to access the home network 400 through the cellular phone 100 after confirming the receipt.
Specifically, as shown in fig. 7a to 7b, when the smart scanner 300 is delivered to the user's receiving address via logistics transportation, the user can confirm receiving by checking a yes option on a mall application program interface running on the mobile phone 100, the mall application program running on the mobile phone 100 generates receiving confirmation information and sends the receiving confirmation information to the mall server 200 from the background, and the mall server 200 issues a product serial number bound with a shopping order to the mobile phone 100. As shown in fig. 7c to 7d, the mall application of the mobile phone 100 automatically jumps to the device configuration page after confirming the receipt, and displays "whether to allow the device to automatically access the local area network allowed to be accessed" through the display screen of the mobile phone 100. When the user again clicks the "yes" option on the display screen of the mobile phone 100, the user allows the smart scanner 300 to perform the automatic network access operation, and at this time, as shown in fig. 7f, the mobile phone 100 automatically synchronizes the acquired product serial number to the local area network to which the access is allowed for the successful automatic access configuration of the smart scanner 300. The local area network in which access is allowed includes the home network 400. So far, the user authorization process for the first network access of the intelligent scanner 300 is completed.
After the goods purchase process shown in fig. 6 and the user authorization process shown in fig. 7 are described above, the smart scanner 300 may automatically access the home network 400 when it is first powered on. Specifically, when the smart scanner 300 is powered on for the first time, the smart scanner 300 starts to broadcast its product serial number to the surroundings through its wireless transceiver module. At this time, the router 402, as an access point of the home network 400, may compare the product serial number received from the smart scanner 300 with a list of allowed access serial numbers stored in the router 402 in advance: when it is found that the same contents as the product serial number broadcast by the smart scanner 300 exist in the above serial number list, it can be determined that the smart scanner 300 has the autonomous connection authority of the home network 400. At this time, the router 402 feeds back the network configuration information of the home network 400 to the intelligent scanner 300, so that the intelligent scanner 300 can autonomously access the home network 400 according to the network configuration information without the user performing an additional authorization and authentication action.
Through the scene architecture shown in fig. 5, when the user confirms the delivery of the purchased terminal device, the authorization for the automatic network access of the terminal device can be completed by inputting a simple permission instruction into the delivery confirmation device such as a mobile phone, and the authorization operation by the user is not required to be performed again when the terminal device needs to access the local area network environment, so that the problem that the authorization operation is complicated in the automatic network access process of the terminal device is solved.
It will be appreciated that the list of allowed access sequence numbers pre-stored in router 402 may be formed based on historical authorization behavior of the user. For example, as shown in fig. 7f, when the mobile phone 100 issues the serial number of the smart scanner 300 to the home network 400, the router 402 locally stores the serial number of the smart scanner 300, and forms the serial number list together with the previously stored serial numbers corresponding to other terminal devices allowed to access the home network 400. If the product serial number broadcast by the intelligent scanner 300 is in the serial number list locally stored in the router 402, it indicates that the intelligent scanner is allowed to access the home network 400, thereby implementing the verification of the home network 400 for the automatic network access connection of the terminal device. In other embodiments, the method of verification may also employ other things: for example, the electronic signature or other verification information corresponding to the product serial number of the intelligent scanner 300 may also be acquired by the mall server 200 when the intelligent scanner 300 is going out of the warehouse; after the user confirms the receipt, the mall server 200 feeds back the electronic signature or the verification information to the mobile phone 100 and then sends the electronic signature or the verification information to the home network 400; the router 402, as an access point of the home network 400, stores such electronic signatures or authentication information locally as an authentication information set, and authenticates the product serial number broadcast by the smart scanner 300 through the authentication information set.
It is understood that the home network 400 does not have an entity, which is composed of at least two smart devices accessing in the same local area network. For example, in the scenario shown in fig. 5, a home network 400 is composed of an intelligent printer 401, a router 402, a desktop computer 403, and a laptop computer 404, which are theoretically access points of the home network 400. However, since the desktop computer 403 is connected to the home network 400 through a network cable and does not have a wireless communication function, it cannot receive the product serial number issued by the mobile phone 100, and cannot receive the product serial number broadcast by the smart scanner 300, and cannot perform an authentication operation and an access permission operation. Therefore, in the embodiment of the present application, the access point of the home network 400 may be defined as a smart device having a wireless data transceiving function in the home network 400. For example, in the scenario shown in fig. 5, the smart printer 401, the router 402, and the laptop 404 may serve as access points of the home network 400 due to their wireless data transceiving functions. For convenience of explanation, the router 402 will be described as an access point of the home network 400 in the following other embodiments.
Further, in the scenario shown in fig. 5, the home network 400 includes at least one access point. When the mobile phone 100 issues the product serial number of the intelligent scanner 300 to the home network 400, in a specific implementation process, the mobile phone 100 issues the product serial number of the intelligent scanner 300 to each access point of the home network 400, and each access point performs local storage and serial number list generation on the product serial number of the intelligent scanner 300. For convenience of explanation, the description of "issuing a serial number of a product to the home network 400" or the like in other embodiments below means issuing a serial number of a product to an access point in the home network 400. Also, hereinafter, the description that "the home network 400 performs network entry authentication on the broadcast serial number according to the locally stored serial number list" or the like also means that the network entry authentication actions are respectively performed by the access points of the home network 400.
Specifically, fig. 8 shows a flow diagram of an automatic network access method suitable for the scenario shown in fig. 5, according to some embodiments, including:
step 801: the handset 100 accesses the mall server 200 through the application program and performs a purchase operation of the smart scanner 300 according to a user instruction. For example, the application is a marketplace application.
In step 802, the mall server 200 generates a purchase order, obtains the product serial number of the intelligent scanner 300, and binds the product serial number of the intelligent scanner 300 with the purchase order.
Step 803: the mobile phone 100 feeds back the confirmation receipt information to the mall server 200 according to the user instruction.
Step 804: the mall server 200 issues the product serial number to the cellular phone 100.
Step 805: the mobile phone 100 issues the product serial number of the intelligent scanner 300 to the corresponding home network 400 according to the access authorization of the user.
Specifically, the specific implementation of steps 801 and 805 may be as shown in fig. 6 to 7, which is not described herein again.
Step 806: the product serial number of the smart scanner 300 is broadcast after the smart scanner 300 is powered on.
Step 807: the home network 400 performs network entry authentication on the smart scanner 300 according to the locally stored serial number list. The network access authentication may be implemented by identifying whether the product serial number broadcast by the smart scanner 300 exists in a serial number list locally stored in an access point of the home network 400, and if so, it indicates that the smart scanner 300 passes the network access authentication.
If the authentication is passed, it indicates that the smart scanner 300 has already obtained the connection authorization given by the user, and then step 808 is entered; if the access authentication is not passed, it indicates that the smart scanner 300 has not obtained the connection authorization given by the user, and then step 810 is performed.
Step 808: the home network 400 transmits the network access configuration information to the intelligent scanner 300.
Step 809: the smart scanner 300 automatically accesses the home network 400 according to the network access configuration information.
Step 810: the home network 400 feeds back connection failure information to the handset 100.
The operations in the above steps 806 to 810 are all independent of the user, and the intelligent scanner 300 and the access point of the home network 400 cooperate to implement an automatic network access process: after the intelligent scanner 300 is powered on, the product serial number of the intelligent scanner 300 is actively broadcasted to the surroundings, the access point router 402, the intelligent printer 401 and the laptop 404 in the home network 400 can independently verify the broadcast serial number according to the locally stored serial number list, when the access verification of any one access point (such as the router 402) passes, the access point sends corresponding network access configuration information to the intelligent scanner 300, and the intelligent scanner 300 realizes automatic network access according to the network access configuration information.
In an actual application scenario, if all access points in the home network 400 fail to access the network for authentication, it means that no current broadcast serial number exists in the serial number lists stored locally in the access point router 402, the intelligent printer 401, and the laptop 404, which indicates that the intelligent device with the current broadcast serial number does not obtain the authorization of automatic network access and cannot automatically access. This may be due to the user not granting the request for network entry authorization for the intelligent scanner 300 in the foregoing step 805. In this case, the access point may feed back information of the automatic network access failure to the mobile phone 100, and the mobile phone 100 may prompt the user accordingly or request the user to grant a new automatic network access right.
Further, the mobile phone 100 may determine that the smart device fails to automatically access the network after receiving the connection failure information fed back by all access points in the home network 400, and feed back the automatic access failure information to the user or request a corresponding further authorization. This is because, considering that there is a sequence of access time among the access points such as the router 402, the intelligent printer 401, and the laptop 404 in the home network 400, the serial number list of the access point device accessed later on the timeline may be less: for example, the router 402 as the access point with the longest access time in the home network 400 stores the serial number list containing 5 product serial numbers, and the laptop 404 as the access point with the shortest access time in the home network 400 stores the serial number list as empty, in which case even if the smart scanner 300 has the automatic access right of the home network 400, it will still have the situation of the access authentication failure before the access point laptop 404. Therefore, the mobile phone 100 can accurately determine that the automatic network access of the intelligent device fails only after the connection failure information fed back by all the access points, and can remind the user or request a new automatic network access authorization in a manner of pop-up window prompt and the like.
In the aforementioned embodiment of the present application, the user confirms the receipt of the smart scanner 300 to complete the whole purchase process. In other practical scenarios, the user may request a return due to damage or other reasons during the logistics transportation of the intelligent scanner 300. Specifically, fig. 9 shows a flow diagram for exchanging items for the smart scanner 300, which is suitable for the scenario shown in fig. 5, and includes:
step 901: the mobile phone 100 accesses the mall server 200 through the application program and performs a purchase operation of the smart scanner 300 according to a user instruction.
Step 902: the mall server 200 generates a purchase order and transmits it to the logistics terminal 201.
Step 903: the logistics terminal 201 obtains the product serial number by scanning the intelligent scanner 300 to be delivered from the warehouse, and writes the product serial number of the intelligent scanner 300 into the purchase order.
Step 904: the logistics terminal 201 performs an ex-warehouse operation for the intelligent scanner 300.
Step 905: the mobile phone 100 feeds back confirmation information on confirmation receipt of the smart scanner 300 or information on a request for return of goods to the mall server 200 according to the user instruction.
Step 906: when the mobile phone 100 feeds back the information of the return goods required to the mall server 200, the logistics terminal 201 monitors the return warehousing condition of the intelligent scanner 300. The logistics terminal 201 can monitor whether the intelligent scanner 300 is returned to the shipment warehouse by tracking the flow state of the refunded goods of the intelligent scanner 300.
Step 907: when the logistics terminal 201 confirms that the intelligent scanner 300 is returned to the warehouse, the logistics terminal 201 informs the marketplace server 200 to delete the product serial number written in the purchase order.
Specifically, after the mall server 200 generates a purchase order for the intelligent scanner 300, the purchase order needs to be sent to the logistics terminal 201 to perform a specific ex-warehouse logistics operation. In the warehouse-out logistics operation, the logistics terminal 201 can obtain the product serial number of the intelligent scanner 300 purchased by the user by scanning a bar code or other suitable means and write the product serial number of the intelligent scanner 300 into a purchase order. It is to be appreciated that the product serial number written to the purchase order can also be obtained by the mall server 200, since the mall server 200 needs to keep a continuous tracking status of the purchase order.
When the intelligent scanner 300 is delivered to the user's receiving address through logistics transportation, the user can feed back the confirmation receiving information to the mall server 200 through the mobile phone 100, and the subsequent steps may be consistent with the foregoing steps 804 to 810, which are not described herein again. When the smart scanner 300 is damaged or damaged, or the user is in other consideration and does not want to purchase the smart device any more, the user may choose to feed back the return request information to the mall server 200 through the mobile phone 100. At this time, the logistics terminal 201 starts to continuously monitor the returning and warehousing condition of the intelligent scanner 300, and when it is confirmed that the intelligent device has been returned and warehoused, the mall server 200 is notified, and at this time, the mall server 200 deletes the product serial number bound in the purchase order.
Further, in an actual application scenario, the user may also require the smart scanner 300 to be returned after a period of use due to dissatisfaction with performance of the smart scanner 300 or other reasons. In this case, since the smart scanner 300 has already accessed the home network 400 during the use process, not only does the smart scanner 300 store the network configuration information that can access the home network 400, but also the home network 400 includes the product serial number of the smart scanner 300 in the locally stored serial number list of at least one access point device (e.g., the router 402). In order to ensure the connection security of the home network 400, in addition to deleting the network configuration information about the home network 400 stored in the intelligent scanner 300 during the return process, the access point device (such as the router 402) of the home network 400 needs to delete the product serial number corresponding to the intelligent scanner 300 stored in the local serial number list and add the product serial number into the connection blacklist of the home network 400 at the same time of initiating the return process, thereby ensuring the connection security of the home network 400. For example, when the intelligent scanner 300 is continuously purchased by other users and put into use in the subsequent circulation process, the intelligent scanner 300 cannot directly access the home network 400 by broadcasting the product serial number after being powered on, thereby avoiding the potential risk of privacy disclosure of the users. The devices in the connection black list need to be re-authorized by the user to access the home network 400 when the devices subsequently want to join the home network again.
In the foregoing embodiment, after the user grants the smart scanner 300 the automatic access right through the mobile phone 100, the mobile phone 100 issues the product serial number of the smart scanner 300 to the corresponding home network 400, where the "corresponding home network 400" only has an association relationship with the mobile phone 100 (for example, the association relationship may include a home network to which the mobile phone 100 is currently connected, a home network to which the mobile phone 100 allows to access, and other home networks associated with the mobile phone 100), so that the user cannot accurately specify the smart scanner 300 to be connected to a network environment to which the user wants to connect. To address the above issues, fig. 10 illustrates a scenario architecture of another automatic network entry method according to some embodiments of the present application. Compared with the scenario shown in fig. 5, an account server 500 is added to the scenario shown in fig. 10, and interacts with the home network 400, the mobile phone 100, and the smart scanner 300, respectively. The home network 400 and the smart scanner 300 are bound to a network account and a device account, respectively, through the account server 500. The user can select the device account number bound by the intelligent scanner 300 according to the incidence relation between the network account number and the device account number, so that the product serial number of the intelligent scanner 300 can be issued to the network environment to which the user wants the intelligent scanner 300 to be connected, and the connection accuracy between the terminal device and the local area network is improved.
In the scenario shown in fig. 10, also for the process that the user purchases the smart scanner 300 in the online mall through the mobile phone 100 and authorizes the smart scanner to automatically access the home network 400, the purchase process of the user to the smart scanner 300 through the mobile phone 100 and the automatic network access verification process after the smart scanner 300 is powered on are the same as those in the foregoing embodiments, and details are not repeated here. That is, the purchase process of the smart scanner 300 by the user through the mobile phone 100 can be implemented through the steps 801 to 803, and the automatic network access authentication process after the smart scanner 300 is powered on can be implemented through the steps 806 to 810. The difference lies in that: after initiating an authorization request for the smart scanner 300 to automatically access the network and obtaining authorization permission, the mobile phone 100 further initiates an account binding request related to the smart scanner 300 to the user, associates the smart scanner 300 with a device account according to a user instruction, and synchronizes the association information of the smart scanner 300 and the device account to the account server 500.
Specifically, a plurality of device accounts and a plurality of network accounts may be pre-stored in the account server 500, where the device accounts may be associated with the smart device, and the network accounts may be associated with the local area network. It is understood that, in the embodiment of the present application, the device account and the network account are only defined and distinguished based on the difference of the binding objects, and in an actual application scenario, taking an account entity of "ABC @ hw.com" as an example, when "ABC @ hw.com" is bound to a smart device such as the mobile phone 100, it may be considered as the device account in the embodiment of the present application; com "ABC @ hw" may be considered as a network account in the embodiments of the present application when bound to a local network, such as the home network 400.
Further, in an actual application scenario, an object to which each account entity can be bound is not limited, and also taking the account entity of "ABC @ hw.com" as an example, the account entity can bind a new smart device on the basis of a bound smart device, for example, the account entity binds with the smart scanner 300 on the basis of the bound mobile phone 100 according to a binding instruction of a user; a new smart device may also be bound based on the bound local area network, for example, with the smart scanner 300 based on the binding command of the user based on the bound home network 400. The mapping relationship between the account entity and the intelligent device or the local area network is one-to-many. That is, in an actual application scenario, the account server 500 stores a plurality of account entities and binding information of each account entity, each smart device and each local area network correspond to one account subject, and each account subject corresponds to one or more smart devices or local area networks; for convenience of description, in other embodiments below, a device account and a network account are described in a unified manner, where each smart device corresponds to one device account, and each local area network corresponds to one network account.
In the scenario shown in fig. 10, the account server 500 stores a network account bound to the home network 400 in advance, and after receiving the association information between the smart scanner 300 and the device account transmitted by the mobile phone 100, the account server 500 determines whether the device account associated with the smart scanner is an authorized connection account of the network account of the home network 400. If yes, it indicates that the smart scanner 300 can access the home network 400, at this time, the account server 500 returns an authorization permission to the mobile phone 100, and the mobile phone 100 issues the product serial number to the home network 400 according to the authorization permission. If not, it indicates that the intelligent scanner 300 may not access the home network 400, and the user needs to further apply for an authorized connection permission of the device account of the intelligent scanner 300 to the network account of the home network 400.
Specifically, whether the device account is an authorized connection account of the network account is determined based on historical authorization permissions of the user. For example, when the network account of the home network 400 is "zhangsan @ hw.com" and the device account of the smart scanner 300 is "ABC @ hw.com", if the user has authorized "ABC @ hw.com" as an authorized connection account of "zhangsan @ hw.com" in the previous daily use process, the server 500 may directly feed back the mobile phone 100 to issue the product serial number to the home network 400 based on the authorized connection account; if the device account "ABC @ hw.com" is not the authorized connection account of the network account "zhangsan @ hw.com", the account server 500 may initiate a new connection permission application request to the user through the mobile phone 100.
It can be understood that, in the account binding process, the user only selects the device account bound to the smart scanner 300, but does not select the home network 400 to be accessed, and the account server 500 cannot know in advance whether the device account that the user wants to access is the home network 400, so in an actual application scenario, the account server 500 traverses all network accounts related to the current user in the storage space and performs authorization connection determination one by one with the device accounts of the smart scanner 300, returns the mobile phone 100 to the local area networks corresponding to all network accounts whose device accounts have authorization connection permissions according to the determination result, and uniformly issues the product serial numbers to the local area networks by the mobile phone 100. In an actual application scenario, considering that there is often only one or a few home networks corresponding to one user, the operation of executing the traversal process by the account server 500 is relatively convenient and has operability. In addition, considering that the user does not directly select the home network 400 to be accessed through the mobile phone 100, the user can automatically select the device account with the authorized connection of the home network 400 to bind, so as to realize the automatic network access connection of the smart scanner 300 to the home network 400.
Particularly, in an actual application scenario, if the account main bodies corresponding to the network account and the device account are the same, for example, when the network account of the home network 400 is "zhangsan @ hw.com", and the user may also bind the account main body of "zhangsan @ hw.com" as the device account of the smart scanner 300 through the mobile phone 100 again; when the user selects the account main body corresponding to the network account as the device account of the smart scanner 300, it obviously means that the user desires to authorize the smart scanner 300 to automatically access the home network 400, so when the network account and the account main body corresponding to the device account are the same, the account server 500 may directly recognize the device account as the authorized connection account of the network account.
It can be understood that, in the above embodiment, in consideration of the preset application scenario that "the user purchases the smart scanner 300 in an online shopping mall through the mobile phone 100 and authorizes the smart scanner 300 to automatically access the home network 400", when the user confirms receiving goods through the mobile phone 100 and gives account binding to the smart scanner 300, the smart scanner 300 may not be unpacked and powered up for the first time, and naturally, the account binding information of the user cannot be acquired through the account server 500 or the mobile phone 100. Therefore, in the above embodiment, the smart scanner 300 may periodically send a binding account synchronization request to the account server 500 after power-on to acquire or update the binding status of its own device account.
Fig. 11 to fig. 13 show specific steps of the user performing device account binding on the smart scanner 300 through the mobile phone 100 in the above scenario.
As shown in fig. 11a, after the user completes the receiving confirmation through the mobile phone 100, the mobile phone 100 first sends a request to the user as to whether to allow the device to automatically access the local area network allowing access, and when the user agrees, turns to fig. 11b to request a new account binding request. Referring to fig. 6f, when a user purchases a shopping mall through the mobile phone 100, the user needs to log in an account "ABC @ hw.com", which may be a device account of the mobile phone 100 itself; the mobile phone 100, as a device most frequently used in a smart home environment, may have an access right of the home network 400, and the device account of the mobile phone 100 may also be an authorized connection account of a network account corresponding to the home network 400. As shown in fig. 11b, in order to simplify the step of the user inputting the account to be bound, the mobile phone 100 may ask in advance whether the user needs to bind the smart scanner 300 with the current login account "ABC @ hw. As shown in fig. 11c, when the user clicks the "yes" option in the display of the mobile phone 100, the mobile phone 100 sends the binding information of the smart scanner 300 and the device account "ABC @ hw.com" from the background to the account server 500. As shown in fig. 11d to 11e, the account server 500 performs permission check on the device account bound by the smart scanner 300 in the background, where the permission check may be performed in such a manner that the account server 500 traverses all network accounts related to the current user in the storage space of the account server and performs authorization connection determination with the device account one by one, and then returns the local area networks corresponding to all network accounts having authorization connection permissions of the device account to the mobile phone 100 according to the determination result, and the mobile phone 100 uniformly issues the product serial number to the local area networks. As shown in fig. 11e, when there is a home network 400 allowing the smart scanner 300 to access, the mobile phone 100 displays "automatic access configuration success" on the mobile phone 100 after issuing a product serial number to prompt the user.
Unlike the steps shown in fig. 11, as shown in fig. 12b to 12d, the user may also select another device account, such as the device account "Zhangsan @ hw.com" to be bound with the smart scanner 300. The other binding steps shown in fig. 12 are all the same as those shown in fig. 11, and are not described herein again.
Different from the steps shown in fig. 11, as shown in fig. 13e to fig. 13f, when the device account bound by the smart scanner 300 does not belong to an authorized connection account of any network account in the account server 500, it indicates that there is no local area network allowed to access the smart scanner 300, and at this time, the mobile phone 100 prompts the user that "there is no local area network allowed to access in the device bound account", and simultaneously provides a jump link. A user can enter an account management interface by clicking a skip link, and in the account management interface, the user can directly access the account server 500 through the mobile phone 100, and obtain account information of an account main body, bound equipment and execute association or release of an associable account through the mobile phone 100. It can be understood that, a user can manage the establishment and release of the binding relationship between the device account and the smart device, the binding relationship between the network account and the local area network, and the authorized connection relationship between the account bodies through the account management interface. . The other binding steps shown in fig. 13 are all the same as those shown in fig. 11, and are not described herein again.
Specifically, fig. 14 shows a flow diagram of device account binding and authentication applicable to the scenario shown in fig. 10 according to some embodiments, where the flow diagram includes:
step 1400: the account server 500 previously acquires a network account corresponding to the home network 400.
The network account corresponding to the home network 400 may be fed back to the account server 500 by an access point of the home network 400. For example, the router 402, as a gateway of the home network 400, may periodically update the network account corresponding to the home network 400 to the account server 500, or may update the network account in synchronization with the account server 500 in time when the network account is changed.
Step 1401: the handset 100 binds the smart scanner 300 to a device account according to user instructions.
Step 1402: the mobile phone 100 sends the binding information of the smart scanner 300 and the device account to the account server 500.
Step 1403: the account server 500 determines whether the device account of the smart scanner 300 belongs to an authorized connection account of the network account of the home network 400 based on the binding information.
If yes, it indicates that the smart scanner 300 has permission to connect to the home network 400, and the process goes to step 1404; if not, it indicates that the smart scanner 300 does not currently have permission to connect to the home network 400, and the process goes to step 1405.
Step 1404: the handset 100 issues a product serial number to the home network 400 and then goes to step 1406.
Step 1405: the handset 100 feeds back to the user that the smart scanner 300 does not currently have permission to connect to the home network 400, and then exits the current flow.
Step 1406: the account server 500 synchronizes a device account corresponding to the smart scanner 300 according to a request of the smart scanner 300. After being powered on, the intelligent scanner 300 sends an account number binding synchronization request to the account number server 500 every preset period to obtain its current binding device account number. Additionally, when the account server 500 detects that the binding device account of the smart scanner 300 is changed, new account binding information may be actively issued to the smart scanner 300 to implement timely update.
In the foregoing embodiment, for a newly purchased smart scanner 300, the mall server 200 issues the product serial number of the smart scanner 300 to the mobile phone 100 after acquiring the product serial number of the smart scanner 300, and issues the product serial number of the smart scanner 300 to the home network 400 through the mobile phone 100. It can be understood that the mobile phone 100 can only issue the product serial number of the intelligent scanner 300 to the home network 400 when the mobile phone 100 needs to maintain the wireless connection with the home network 400, and if the mobile phone 100 fails to complete the issue of the product serial number to the home network 400 before the intelligent scanner 300 is powered on for the first time, the problem of automatic access failure of the intelligent scanner 300 after the first power on may occur.
In order to solve the above problem, in some embodiments of the present application, based on the scenario structure shown in fig. 10, the account server 500 is placed in the issuing process of the product serial number, so that the success of automatic network access after the intelligent scanner 300 is powered on for the first time can be further ensured. For ease of understanding, how to put the account server 500 into the flow of issuing the product serial number to the home network 400 will be further described below with reference to the scenario architectures shown in fig. 15 and fig. 16.
In particular, fig. 15 illustrates a scenario architecture of an automatic network entry method according to some embodiments of the present application.
Different from the scenario architecture shown in fig. 10, as shown in fig. 15, after the account server 500 confirms to the mobile phone 100 that the device account bound by the smart scanner 300 is an authorized connection account of the network account corresponding to the home network 400, the mobile phone 100 does not issue the product serial number of the smart scanner 300 to the home network 400, but the mobile phone 100 transmits the product serial number to the account server 500, and then the account server 500 issues the product serial number of the smart scanner 300 to the home network 400. Considering that the mobile phone 100 and the home network 400 cannot be guaranteed to be always connected, but the account server 500 can respectively keep continuous connection and interaction with the home network 400 and the mobile phone 100, the serial number of the product of the intelligent scanner 300 can be timely transmitted to the home network 400 through the scene architecture shown in fig. 15. It is understood that in the scenario shown in fig. 15, the account server 500 only plays a role of transfer and does not store the product serial number.
Accordingly, fig. 16 illustrates a scenario architecture of another automatic network entry method according to some embodiments of the present application.
Unlike the scenario architecture shown in fig. 15, as shown in fig. 16, after the user confirms the receipt through the mobile phone 100, the mall server 200 does not issue the product serial number of the smart scanner 300 to the mobile phone 100, but issues the product serial number of the smart scanner 300 to the account server 500 for caching. After the account server 500 confirms that the device account bound by the intelligent scanner 300 is the authorized connection account of the network account corresponding to the home network 400, on one hand, the account server 500 can feed back a prompt of "automatic access configuration success" to the mobile phone 100, and on the other hand, the cached product serial number of the intelligent scanner 300 is directly issued to the home network 400, and the product serial number can be timely released and updated.
It can be understood that in the scenario architecture shown in fig. 16, the account server 500 and the mall server 200 have a communication channel, which can implement the issuing of the product serial number of the smart scanner 300 to the account server 500 by the mall server 200. For example, the user may log into the same mall application as the corresponding provider of the account server 500 through the mobile phone 100 to purchase the smart scanner 300. For another example, when the user selects panning or a third-party mall such as kyoto to purchase the smart scanner 300, the third-party mall server is required to provide a writing interface of the product serial number and a connection interface of the account server 500 to ensure the implementation of the above technical solution.
It can be understood that, after the account server 500 confirms that the device account bound by the intelligent scanner 300 is the authorized connection account of the network account corresponding to the home network 400, the product serial number of the intelligent scanner 300 and the device account of the intelligent scanner 300 are synchronized, so that the product serial number of the intelligent scanner 300 can be accurately issued to the home network 400.
It is understood that in the scenario shown in fig. 16, the account server 500 performs a caching operation on the serial number of the smart scanner 300 through an independent caching unit, and the serial number of the smart scanner 300 is not backed up and stored after the serial number is issued.
Specifically, fig. 17 shows a flowchart of an automatic network access method according to the scenario architecture shown in fig. 16, where the flowchart includes:
steps 1701 to 1703 are identical to steps 801 to 803 described above and will not be described herein.
Step 1704: the mall server 200 issues the product serial number to the account server 500.
Step 1705: the handset 100 binds the smart scanner 300 to a device account according to user instructions.
Step 1706: the mobile phone 100 sends the binding information of the smart scanner 300 and the device account to the account server 500.
Step 1707: the account server 500 determines whether the device account of the smart scanner 300 belongs to an authorized connection account of the network account of the home network 400 based on the binding information.
If yes, it indicates that the smart scanner 300 has permission to connect to the home network 400, and the process goes to step 1708; if not, it indicates that the smart scanner 300 does not currently have permission to connect to the home network 400, and the process goes to step 1709.
Step 1708: the handset 100 issues a product serial number to the home network 400 and then goes to step 1710.
Step 1709: the handset 100 feeds back to the user that the smart scanner 300 does not currently have permission to connect to the home network 400. And then exits the current flow.
Steps 1710 to 1714 are the same as steps 806 to 810, and are not described herein.
By the automatic network access method shown in fig. 17, a technical scheme that the mall server 200 directly issues the product serial number to the account server 500 is adopted, so that the product serial number can be updated and issued in time. The intelligent scanner 300 can be actively accessed to the home network 400 after being powered on for the first time, authorization operation of a user through a complex mode of scanning two-dimensional codes or near field communication is not needed, automatic network access operation of equipment is greatly simplified, and use experience of the user is improved.
In the foregoing embodiment, for a newly purchased intelligent scanner 300, the product serial number of the intelligent scanner 300 is sent to the home network 400 through any sending way, and is finally sent to the home network 400, and is locally stored by the access point of the home network 400, and this technical implementation does not need to store the product serial number of the intelligent scanner 300 to the cloud, which provides better guarantee for the privacy and security of the user, but this technical implementation requires local storage of the access point of the home network 400, and locally stores the product serial numbers of all the intelligent devices that can be connected in the home network 400, and is also not beneficial to timely update of the access point of the home network 400 for the connectable intelligent devices.
To solve the above problem, fig. 18 shows a scenario architecture of another automatic network entry method according to other embodiments of the present application. Compared with the scenario shown in fig. 5, 15, or 16, in the scenario shown in fig. 18, the serial number of the product of the smart scanner 300 is not all stored locally in the home network 400, but is stored in the account server 500, and may be issued by actively requesting the account server 500 for updating through the home network 400.
As shown in fig. 18, also for the process that the user purchases the smart scanner 300 in the online mall through the mobile phone 100 and authorizes the user to automatically access the home network 400, a purchase process of the user to the smart scanner 300 through the mobile phone 100, a binding process of the user to the device account of the smart scanner 300 through the mobile phone 100, and an authorized connection account of the account server 500 as to whether the device account belongs to the network account are the same as those in the foregoing embodiment, which are not described herein again.
When the intelligent scanner 300 is powered on for the first time, the intelligent scanner 300 starts to broadcast its own product serial number to the surroundings through its own wireless transceiver module, and the router 402 in the home network 400, as a network access point, receives the product serial number broadcast by the intelligent scanner 300 and performs the first comparison with its own locally stored serial number list in advance. When it is found that the same information as the product serial number broadcast by the smart scanner 300 exists in the serial number list, the router 402 may directly feed back the network configuration information of the home network 400 to the smart scanner 300.
It is understood that the account server 500 includes a pre-storing process and a reassignment storing process in the process of storing the product serial number: when the mall server 200 issues the product serial numbers to the account server 500, the account server 500 stores the product serial numbers in a pre-storage unit, and after the user gives the device account number bound to the smart scanner 300 through the mobile phone 100, the product serial number of the smart scanner 300 is allocated to the independent storage space of the bound device account number for storage.
In the scenario architecture shown in fig. 18, if the router 402 finds, in the first comparison, that there is no information that is the same as the product serial number broadcast by the intelligent scanner 300 in the current serial number list, the router 402 serving as the access point may send an update request to the account server 500, and the account server 500 sends, to the router 402, the product serial number of the accessible device corresponding to the home network 400 according to the update request. The router 402 performs secondary comparison on the product serial number broadcast by the intelligent scanner 300 according to the updated serial number list, and the specific flow of the secondary comparison is consistent with the specific flow of the primary comparison.
In the scenario structure shown in fig. 18, if the router 402 finds that the updated serial number list has the same information as the product serial number broadcast by the intelligent scanner 300 during the secondary matching process, the router may also directly feed back the network configuration information of the home network 400 to the intelligent scanner 300. If the router 402 finds that the updated serial number list still does not contain the information identical to the product serial number broadcasted by the intelligent scanner 300 in the secondary comparison process, it indicates that the intelligent scanner 300 does not have the automatic connection authority of the home network 400, and the user can be prompted in a manner of feeding back the connection failure information to the mobile phone 100.
Further, if the router 402 finds that the updated serial number list still does not contain the same information as the product serial number broadcasted by the intelligent scanner 300 in the secondary comparison process, the intelligent scanner 300 that initiates the automatic network access request may be added to the black list of the current home network 400. In an actual application scenario, a scenario that a terminal device illegally accesses the home network 400 through other ways may exist, and a scenario that an automatic network access application fails may occur in a subsequent access process of such a terminal device, in order to prevent hidden dangers to stability and safety of a home network environment due to access of such an intelligent device, the terminal device with an automatic network access request failure may be uniformly added into a blacklist of the current home network 400, and if the device in the blacklist wants to be added into the home network 400 again subsequently, a user needs to give corresponding access authorization to the device through a network account corresponding to the home network 400.
In the scenario shown in fig. 18, the account server 500 may adopt the following manner in the serial number list update process of the router 402: when the router 402 requests an update request, the account server 500 selects one or more device accounts corresponding to the network account according to the network account of the home network 400 corresponding to the router 402, where each device account may store a certain number of product serial numbers; the account server 500 sequentially issues the product serial numbers corresponding to each device account to the router 402 according to a certain order to perform local comparison query: if the broadcast serial number exists in the product serial number corresponding to the current device account, the router 402 issues network configuration information to the intelligent scanner 300 according to the foregoing steps; if there is no broadcast serial number in the product serial number corresponding to the current device account, the router 402 locally deletes all product serial numbers corresponding to the current device account, receives a product serial number corresponding to the next device account from the account server 500 in sequence, and performs the same comparison operation until all device accounts serving as authorized connection accounts of the home network 400 are compared. Through the technical scheme, the router 402 does not need to receive all product serial numbers stored in the account server 500 when submitting the update request, so that the update of the serial number list is more targeted, and the updated data communication volume and the update time duration are simplified in the actual application process.
Specifically, fig. 19 shows a schematic flow chart of an automatic network access method according to the above embodiment of the present application, where steps 1901 to 1909 are consistent with steps 1701 to 1709, and are not described herein again, and the flow step further includes:
step 1910: the product serial number of the smart scanner 300 is broadcast after the smart scanner 300 is powered on.
Step 1911: the home network 400 performs a first network access verification on the product serial number broadcast from the smart scanner 300 according to the locally stored serial number list. The network access authentication may be implemented by identifying whether the product serial number broadcast by the smart scanner 300 exists in a serial number list locally stored in an access point of the home network 400, and if so, it indicates that the smart scanner 300 passes the network access authentication.
If so, it indicates that the smart scanner 300 is allowed to access the home network 400, and then proceeds to step 1915.
If not, it indicates that the current smart scanner 300 does not allow the access to the home network 400 for authentication, and then goes to step 1912.
Step 1912: the home network 400 submits a serial number update request to the account server 500.
Step 1913: the account server 500 issues the product serial number to the home network 400 according to the serial number update request, and the home network 400 performs secondary network access verification on the broadcast serial number according to the updated serial number list.
If so, it indicates that the smart scanner 300 is not allowed to access the home network 400, and then the process goes to step 1914.
Step 1914: the home network 400 feeds back the connection failure information to the cell phone 100, and then exits the process.
Step 1915: the home network 400 transmits network configuration information to the smart scanner 300.
Step 1916: the smart scanner 300 automatically accesses the home network 400 according to the network access configuration information.
Through the above-described process steps, the product serial number is not all stored in the local side of the home network 400, but may be synchronously stored in the account server 500. In some embodiments of the present application, the home network 400 may store only serial number information of some currently-used devices (e.g., smart devices bound to a network account corresponding to the home network 400), and product serial numbers of other less-used smart devices may be stored in the account server 500. When the home network 400 has an automatic network access requirement and cannot find the home network in a locally stored serial number list, the corresponding serial number information may be acquired from the account server 500.
It is understood that the product serial number of the terminal device may be synchronously stored in a cloud server connected to the home network 400, and the cloud server is not limited to the account server 500; similarly, the mall server 200 may also directly issue the product serial number to the cloud server, or the home network 400 may resynchronize the product serial number to the cloud server after receiving the product serial number according to the foregoing other embodiments.
In the foregoing embodiments, the set application scenarios are all processes for a user to purchase the smart scanner 300 through the mobile phone 100 in an online shopping mall and authorize the user to automatically access the home network 400. In other embodiments of the present application, another automatic network access architecture and corresponding processes are proposed for the process in which the smart scanner 300 needs to switch from the home network 400 to another home network 410 to perform automatic access.
Fig. 20 illustrates a scenario architecture of another method of automatic network entry, according to some embodiments of the present application.
It can be understood that, for the functional requirement that the intelligent scanner 300 can perform automatic connection when accessing a new network environment, the application scenarios to be covered include both automatic access when the intelligent scanner 300 is first powered on after purchase, and first automatic access to other local area networks when the intelligent scanner 300 needs to switch access to the network environment in the daily use process. When the smart scanner 300 successfully accesses the home network 400 for the first time, the smart scanner 300 stores the acquired network configuration information about the home network 400, so that the network access can be automatically performed without authentication at the subsequent power-on. Therefore, in some embodiments of the present application, when the smart scanner 300 needs to switch to a new lan, only the automatic connection authorization for the initial access is needed.
In the scenario architecture shown in fig. 20, the product serial number of the smart scanner 300 is stored locally by an access point of the local area network. That is, when the smart scanner 300 wants to access a new home network 410, the product serial number of the smart scanner 300 needs to be sent to an access point of the home network 410 in advance through the mobile phone 100 or the account server 500 for local storage. The product serial number of the smart scanner 300 is stored in the cloud (e.g., the account server 500) as will be described later.
It can be understood that, in the process that the smart scanner 300 needs to switch from the home network 400 to another home network 410 to perform automatic access, it is preset that the smart scanner 300 has already finished binding with the device account at this time, and the network account corresponding to the home network 410 is also stored in the account server 500.
As shown in fig. 20, the user can request an authorization request for automatic connection to the home network 410 through the cellular phone 100; the authorization request is sent by the mobile phone 100 to the account server 500 for verification, and the verification manner may still be to verify whether the device account of the smart scanner 300 is an authorized connection account of the network account corresponding to the home network 410. If yes, it indicates that the smart scanner 300 is allowed to access the home network 410, and the mobile phone 100 issues the product serial number of the smart scanner 300 to the home network 410. If not, it indicates that the smart scanner 300 is not allowed to access the home network 410, and the account server 500 returns an authorization failure message to the mobile phone 100 and requests the user to perform an additional authorization update operation. A specific flow diagram can be seen in fig. 21. Similarly, in order to ensure that the product serial number of the intelligent scanner 300 can be issued to the home network 410 in time, the mobile phone 100 may also issue the product serial number to the home network 410 through the account server 500.
It can be understood that the broadcast serial number and the network access verification process after the intelligent scanner 300 is powered on may adopt the same implementation scheme as that in any of the foregoing embodiments, and details are not described herein. The technical scheme makes the switching and automatic access of the home network 410 more pertinent, and simultaneously covers the network switching scene which cannot be realized in the embodiment.
It can be understood that the intelligent scanner 300, as an intelligent device, allows storing network configuration information of a plurality of different local area networks for automatic access, and when the intelligent scanner 300 is powered on and finds that a plurality of network configuration information can be accessed to a corresponding local area network, it will select one of the local area networks to connect according to a preset rule: the local area network with the optimal connection state can be selected for connection according to the signal intensity of the local area network or other connection influence factors, or the local area network with the highest priority can be selected for connection according to the user-defined connection priority preset by the user.
Specifically, as shown in fig. 22a, the user may enter a "device connection management" interface through the mobile phone 100, and view all devices under the current device account by logging in the device account. As shown in fig. 22b, the user views the local area network information and signal strength that the smart scanner 300 allows to connect by clicking the detail key on the right side of the "smart scanner". As shown in fig. 22c to 22d, the user may manually adjust the automatic access priority of the smart device 300 to the home network 400, the home network 410, and the work network 420 by dragging the moving bar on the right side of the local network information such as the "work network 420".
Meanwhile, the user can check and manage the current connection state of the equipment through an equipment connection management interface. As shown in fig. 22c to 22d, when the user enters the "device connection management" interface through the mobile phone 100, the current connection status of the smart scanner 300 can be checked by clicking the detail key on the right side of the "smart scanner". In the above embodiment, the connection state of the terminal device may include three types, namely an "initial state", a "connection state", and a "sharing state", where the "initial state" indicates that the terminal device is not currently allowed to join any local area network, that is, the user has not performed automatic network access permission on the terminal device or cancelled the automatic network access permission of the device; the connection state means that the terminal equipment is in a successful network access state when being accessed into a local area network currently; the "shared state" means that the terminal device is allowed to access multiple local area networks and is not currently accessed to any one of the local area networks, and the intelligent devices in the "connected state" and the "shared state" both have the automatic access permission of the user and pass the corresponding automatic access verification. Further, the user may grant or revoke the automatic network access permission of the smart scanner 300 "in the device connection management interface".
When the serial number of the smart scanner 300 is stored in the cloud (e.g., the account server 500), if the smart scanner 300 needs to be switched to the new home network 410, the user does not need to make an advance selection through the mobile phone 100. When the smart scanner 300 is in the "sharing state", the smart scanner 300 broadcasts its own product serial number after being powered on; when the access point of the home network 410 receives the serial number broadcasted by the smart scanner 300 and the first matching fails, it may request the cloud server (e.g., the account server 500) storing the serial number to update the locally stored serial number list by itself, so as to further simplify the authorization selection operation of the user.
It can be understood that, when the smart scanner 300 needs to switch from the home network 400 to the home network 410, the switching reason may be actively selected by the user through the mobile phone 100, or the smart scanner 300 may be passively selected due to network connection limitation. In some embodiments of the present application, if the intelligent scanner 300 performs an automatic network access connection according to the locally stored network configuration information, if all the network configuration information cannot be connected to the corresponding local area network, it indicates that the intelligent scanner 300 needs to be switched to a new network environment. Further, when all the network configuration information cannot be connected to the corresponding local area network, the intelligent scanner 300 may further continue to broadcast the product serial number to the local area network that needs to be connected to update the network configuration information, but when none of the local area networks can find the broadcast serial number from the local serial number list or the cloud updated serial number list (which may be because the user manually deletes the automatic access right of the intelligent scanner 300 to the local area networks due to adjustment of the network connection environment), it may also be indicated that the intelligent scanner 300 needs to be switched to a completely new network environment. When the smart scanner 300 passively selects a need to access a new home network 410 due to network connection restrictions, the user may not pre-select an authorization request for automatic connection to the home network 410 through the mobile phone 100, and at this time, the smart scanner 300 may directly broadcast the serial number of the product to the home network 410, and when the access point of the home network 410 fails to verify the first comparison, the account server 500 may be actively applied for verification of access authorization, and the verification may be performed by checking whether the device account bound by the smart scanner 300 belongs to an authorized connection account of the network account corresponding to the home network 410, returning authorized connection information of the home network 410 and issuing corresponding network configuration information by the home network 410 if the device account passes the access authorization, returning connection information prohibited by the home network 410 if the device account does not pass the access authorization, and the connection failure information can be fed back to the user through the handset 100 by the home network 410.
The application also provides a technical scheme for automatically executing the Bluetooth connection by the terminal equipment.
In the foregoing embodiment, the set application scenarios are all processes for the intelligent scanner 300 to automatically access the home network 400 or the home network 410; in other embodiments of the present application, the same technical solution may also be adopted for the smart watch 2301, which needs bluetooth connection, to implement automatic bluetooth connection with the mobile phone 100.
In particular, fig. 23 shows a scenario architecture of an automatic connection method for a bluetooth connection environment.
It can be understood that, before the bluetooth connection, the smart watch 2301 may complete the binding process between the smart watch 2301 and the device account in a manner that the display screen of the smart watch 2301 logs in the device account by itself, and synchronize the binding result, the device information (including the product serial number of the smart watch 2301), and the bluetooth connection preference corresponding to the device information to the account server 500.
As shown in fig. 23, when the smart watch 2301 needs to perform bluetooth connection, the product serial number is also broadcasted to the surrounding bluetooth connection environment 2300, and the bluetooth connection environment 2300 includes at least one accessible bluetooth device, for example, the bluetooth connection environment 2300 in fig. 17 includes two accessible bluetooth device handsets 100 and the smart scanner 300, where the accessible bluetooth device refers to a smart device that has a bluetooth connection function and is in an idle state at the present time. When the smart watch 2301 starts broadcasting its product serial number, these accessible bluetooth devices independently determine whether they have automatic connection authority with the smart watch 2301 according to the serial number. When having automatic connection rights with the smart watch 2301, the accessible bluetooth device returns its device connection code to the smart watch 2301. The step of determining whether the connection has the automatic connection right automatically may adopt any one of the methods described above, which are not described herein again.
It is understood that in the present application, the bluetooth connection environment 2300 of the device access point is equivalent to the home network 400 of the access point, when any accessible bluetooth device receives the product serial number, the connection verification can be performed independently, and the connection verification may also be performed by comparing whether the locally stored serial number list includes the broadcast serial number; likewise, any one of the accessible bluetooth devices may also independently send a bluetooth connection request to the account server 500; for example, according to the preset bluetooth connection preference, the mobile phone 100 is the device access point with the highest priority among the device access points in the idle state at the present time, so the smart watch 2301 finally completes the bluetooth pairing connection with the mobile phone 100 according to the above process steps.
Fig. 24 shows a schematic configuration of the cellular phone 100.
The mobile phone 100 may include a processor 110, an external memory interface 120, an internal memory 121, a Universal Serial Bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, a key 190, a motor 191, an indicator 192, a camera 193, a display screen 194, a Subscriber Identification Module (SIM) card interface 195, and the like. The sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, a bone conduction sensor 180M, and the like.
It is to be understood that the illustrated structure of the embodiment of the present invention does not specifically limit the mobile phone 100. In other embodiments of the present application, the handset 100 may include more or fewer components than shown, or some components may be combined, some components may be separated, or a different arrangement of components may be used. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
Processor 110 may include one or more processing units, such as: the processor 110 may include an Application Processor (AP), a modem processor, a Graphics Processor (GPU), an Image Signal Processor (ISP), a controller, a video codec, a Digital Signal Processor (DSP), a baseband processor, and/or a neural-Network Processor (NPU), among others. Wherein, the different processing units may be independent devices or may be integrated in one or more processors.
The controller can generate an operation control signal according to the instruction operation code and the timing signal to complete the control of instruction fetching and instruction execution.
A memory may also be provided in processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that have just been used or recycled by the processor 110. If the processor 110 needs to use the instruction or data again, it can be called directly from memory. Avoiding repeated accesses reduces the latency of the processor 110, thereby increasing the efficiency of the system.
It should be understood that the connection relationship between the modules according to the embodiment of the present invention is only an exemplary illustration, and does not limit the structure of the mobile phone 100. In other embodiments of the present application, the mobile phone 100 may also adopt different interface connection manners or a combination of multiple interface connection manners in the above embodiments.
The wireless communication function of the mobile phone 100 can be realized by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modem processor, the baseband processor, and the like.
The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the handset 100 may be used to cover a single or multiple communication bands. Different antennas can also be multiplexed to improve the utilization of the antennas.
The mobile communication module 150 may provide a solution including wireless communication of 2G/3G/4G/5G, etc. applied to the handset 100. The mobile communication module 150 may include at least one filter, a switch, a power amplifier, a Low Noise Amplifier (LNA), and the like. The mobile communication module 150 may receive the electromagnetic wave from the antenna 1, filter, amplify, etc. the received electromagnetic wave, and transmit the electromagnetic wave to the modem processor for demodulation. The mobile communication module 150 may also amplify the signal modulated by the modem processor, and convert the signal into electromagnetic wave through the antenna 1 to radiate the electromagnetic wave. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the processor 110. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be provided in the same device as at least some of the modules of the processor 110.
The wireless communication module 160 may provide solutions for wireless communication applied to the mobile phone 100, including Wireless Local Area Networks (WLANs) (e.g., wireless fidelity (Wi-Fi) networks), Bluetooth (BT), Global Navigation Satellite System (GNSS), Frequency Modulation (FM), Near Field Communication (NFC), Infrared (IR), and the like. The wireless communication module 160 may be one or more devices integrating at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, performs frequency modulation and filtering on electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, perform frequency modulation and amplification on the signal, and convert the signal into electromagnetic waves through the antenna 2 to radiate the electromagnetic waves.
The mobile phone 100 implements the display function through the GPU, the display screen 194, and the application processor. The GPU is a microprocessor for image processing, connected to the display screen 194 and the application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. The processor 110 may include one or more GPUs that execute program instructions to generate or change display information, such as an interface that prompts a user to switch input methods that pops up automatically when managing the input methods, or an interface that includes a list of available input methods.
The internal memory 121 may be used to store computer-executable program code, which includes instructions. The internal memory 121 may include a program storage area and a data storage area. The storage program area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) required by at least one function, and the like. The data storage area may store data created during use of the mobile phone 100 (e.g., audio data, a phone book, etc.), and the like. In addition, the internal memory 121 may include a high speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, a Universal Flash Storage (UFS), and the like. The processor 110 executes various functional applications of the cellular phone 100 and data processing by executing instructions stored in the internal memory 121 and/or instructions stored in a memory provided in the processor.
The keys 190 include a power-on key, a volume key, and the like. The keys 190 may be mechanical keys. Or may be touch keys, such as keys of a virtual keyboard of the first input method displayed by the mobile phone 100. The cellular phone 100 may receive a key input, and generate a key signal input related to user setting and function control of the cellular phone 100.
The software system of the mobile phone 100 may adopt a layered architecture, an event-driven architecture, a micro-core architecture, a micro-service architecture, or a cloud architecture. The embodiment of the present invention uses an Android system with a layered architecture as an example to exemplarily illustrate a software structure of the mobile phone 100.
Fig. 25 is a block diagram of the software configuration of the cellular phone 100 according to the embodiment of the present invention.
The layered architecture divides the software into several layers, each layer having a clear role and division of labor. The layers communicate with each other through a software interface. In some embodiments, the Android system is divided into four layers, an application layer, an application framework layer, an Android runtime (Android runtime) and system library, and a kernel layer from top to bottom.
The application layer may include a series of application packages.
As shown in fig. 25, the application package may include applications such as a mall, camera, gallery, calendar, call, map, navigation, WLAN, bluetooth, music, video, short message, etc.
The application framework layer provides an Application Programming Interface (API) and a programming framework for the application program of the application layer. The application framework layer includes a number of predefined functions.
As shown in FIG. 25, the application framework layers may include a window manager, content provider, view system, phone manager, resource manager, notification manager, and the like.
The window manager is used for managing window programs. The window manager can obtain the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like.
The content provider is used to store and retrieve data and make it accessible to applications. The data may include video, images, audio, calls made and answered, browsing history and bookmarks, phone books, etc.
The view system may be a display system service 101 of the cell phone 100 for managing and modifying the display style of applications of the cell phone 100. The view system acquires a display function corresponding to the display style parameter according to the display style parameter included in the display parameter acquired by the mobile phone 100 from the tablet pc 200, and is used for configuring an application program of the mobile phone 100.
The phone manager is used to provide the communication functions of the handset 100. Such as management of call status (including connection, hangup, etc.).
The resource manager provides various resources for the application, such as localized strings, icons, pictures, layout files, video files, and the like.
In embodiments of the present invention, the resource manager may also be used to store an Overlay configuration file.
The notification manager enables the application to display notification information in the status bar, can be used to convey notification-type messages, can disappear automatically after a short dwell, and does not require user interaction. Such as a notification manager used to inform download completion, message alerts, etc. The notification manager may also be a notification that appears in the form of a chart or scroll bar text at the top status bar of the system, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, prompting text information in the status bar, sounding a prompt tone, vibrating the electronic device, flashing an indicator light, etc.
The Android Runtime comprises a core library and a virtual machine. The Android runtime is responsible for scheduling and managing an Android system.
The core library comprises two parts: one part is a function which needs to be called by java language, and the other part is a core library of android.
The application layer and the application framework layer run in a virtual machine. The virtual machine executes java files of the application layer and the application framework layer as binary files. The virtual machine is used for performing the functions of object life cycle management, stack management, thread management, safety and exception management, garbage collection and the like.
The system library may include a plurality of functional modules. For example: surface managers (surface managers), Media Libraries (Media Libraries), three-dimensional graphics processing Libraries (e.g., OpenGL ES), 2D graphics engines (e.g., SGL), and the like.
The surface manager is used to manage the display subsystem and provide a fusion of the 2D and 3D layers for multiple applications.
The media library supports a variety of commonly used audio, video format playback and recording, and still image files, among others. The media library may support a variety of audio-video encoding formats, such as MPEG4, h.264, MP3, AAC, AMR, JPG, PNG, and the like.
The three-dimensional graphic processing library is used for realizing three-dimensional graphic drawing, image rendering, synthesis, layer processing and the like.
The 2D graphics engine is a drawing engine for 2D drawing.
The kernel layer is a layer between hardware and software. The inner core layer at least comprises a display driver, a camera driver, an audio driver and a sensor driver.
Through the description of the above embodiments, those skilled in the art will understand that, for convenience and simplicity of description, only the division of the above functional modules is used as an example, and in practical applications, the above function distribution may be completed by different functional modules as needed, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the above described functions.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, a module or a unit may be divided into only one logic function, and may be implemented in other ways, for example, a plurality of units or components may be combined or integrated into another apparatus, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
Units described as separate parts may or may not be physically separate, and parts displayed as units may be one physical unit or a plurality of physical units, may be located in one place, or may be distributed to a plurality of different places. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partially contributed to by the prior art, or all or part of the technical solutions may be embodied in the form of a software product, where the software product is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the methods of the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (29)

1. A network access method of an electronic device, comprising:
the network access equipment receives a first network access identifier of first electronic equipment;
a first electronic device broadcasts a network access request, wherein the network access request comprises a second network access identifier of the first electronic device;
the network access equipment matches a second network access identifier in the network access request with the first network access identifier according to the received network access request;
and the network access equipment accesses the first electronic equipment to the preset network under the condition that the first network access identification is matched with the second network access identification.
2. The method of claim 1, wherein the network access method further comprises:
the second electronic equipment acquires the first network access identifier of the first electronic equipment from a first server under the condition that the purchase order of the first electronic equipment is completed;
the first server acquires the first network access identifier of the first electronic device from the first electronic device under the condition that a purchase order of the first electronic device is generated;
the second electronic device can access the preset network.
3. The method of claim 2, wherein the second electronic device sends the first network access identifier of the first electronic device to the network access device upon receiving the first network access identifier of the first electronic device.
4. The method of claim 2, wherein the second electronic device sends the first network access identifier of the first electronic device to the network access device when a second server verifies that a first account bound to the first electronic device meets an access condition of the preset network;
and the second electronic equipment sends the binding information of the first electronic equipment and the first account to the second server under the condition that the purchase order of the first electronic equipment is completed.
5. The method of claim 4, wherein the second server obtains binding information between the preset network and the second account in advance;
the second server matches the first account with the second account according to the received binding information of the first electronic device and the first account, and verifies that the first account meets the access condition of the preset network under the condition that the first account is matched with the second account.
6. The method of claim 4, wherein the second electronic device sends the first network access identifier to the network access device through the second server if the second server verifies that the first account bound to the first electronic device satisfies the access condition of the preset network.
7. The method of claim 1, wherein the network access method further comprises:
the second server acquires the first network access identifier of the first electronic equipment from the first server under the condition that the purchase order of the first electronic equipment is completed;
the first server acquires the first network access identifier of the first electronic device from the first electronic device under the condition that a purchase order of the first electronic device is generated.
8. The method of claim 7, wherein the second server sends the first network access identifier of the first electronic device to the network access device when verifying that a first account bound to the first electronic device meets an access condition of the preset network;
and the second electronic equipment sends the binding information of the first electronic equipment and the first account to the second server under the condition that the purchase order of the first electronic equipment is completed.
9. The method of claim 8, wherein the second server obtains binding information between the preset network and a second account in advance;
the second server matches the first account with the second account according to the received binding information of the first electronic device and the first account, and verifies that the first account meets the access condition of the preset network under the condition that the first account is matched with the second account.
10. The method of claim 8, wherein the second server sends the first network access identifier of the first electronic device to the network access device when verifying that a first account bound to the first electronic device satisfies an access condition of the preset network and receiving a network access identifier update request of the network access device;
and the network access equipment sends the network access identification updating request to the second server under the condition that the first network access identification and the second network access identification are not matched successfully for the first time.
11. The method of claim 1, wherein the first network entry identifier comprises a product serial number of the first electronic device and a physical address of the first electronic device.
12. The method of claim 1, wherein the network access device sends the network configuration information of the preset network to the first electronic device if the first network access identifier and the second network access identifier match;
and the first electronic equipment accesses the preset network according to the network configuration information.
13. A network access method of an electronic device, comprising:
the network access equipment receives a first network access identifier of first electronic equipment;
the method comprises the steps that network access equipment receives a network access request broadcasted by first electronic equipment, wherein the network access request comprises a second network access identifier of the first electronic equipment;
the network access equipment matches a second network access identifier in the network access request with the first network access identifier according to the received network access request;
and the network access equipment accesses the first electronic equipment to the preset network under the condition that the first network access identification is matched with the second network access identification.
14. The method of claim 13, further comprising:
the network access equipment sends network configuration information of the preset network to the first electronic equipment under the condition that the first network access identification is matched with the second network access identification, wherein the network configuration information can be used by the first electronic equipment to access the preset network, and the first network access identification comprises a product serial number of the first electronic equipment and a physical address of the first electronic equipment.
15. A network access method of an electronic device, comprising:
the second electronic device determining that the purchase order of the first electronic device is complete;
the second electronic equipment acquires a first network access identifier of the first electronic equipment from a first server;
the first server acquires the first network access identifier of the first electronic device from the first electronic device under the condition that a purchase order of the first electronic device is generated, and the second electronic device can access a preset network.
16. The method of claim 15, wherein the second electronic device sends the first network access identifier of the first electronic device to the network access device upon receiving the first network access identifier of the first electronic device.
17. The method of claim 15, wherein the second electronic device sends the first network access identifier of the first electronic device to the network access device when a second server verifies that a first account bound to the first electronic device meets an access condition of the preset network;
and the second electronic equipment sends the binding information of the first electronic equipment and the first account to the second server under the condition that the purchase order of the first electronic equipment is completed.
18. A network access method of an electronic device, comprising:
the second server acquires the first network access identifier of the first electronic equipment from the first server under the condition that a purchase order of the first electronic equipment is completed;
the second server sends the first network access identifier of the first electronic equipment to network access equipment;
the first server acquires the first network access identifier of the first electronic device from the first electronic device under the condition that a purchase order of the first electronic device is generated.
19. The method of claim 18, wherein the second server obtains binding information between a preset network and the second account in advance;
the second server matches the first account with the second account according to the received binding information of the first electronic device and the first account, and verifies that the first account meets the access condition of the preset network under the condition that the first account is matched with the second account;
and the second electronic equipment sends the binding information of the first electronic equipment and the first account to the second server under the condition that the purchase order of the first electronic equipment is completed.
20. The method of claim 19, wherein the second server sends the first network access identifier of the first electronic device to the network access device upon verifying that a first account number bound to the first electronic device satisfies an access condition of the preset network.
21. The method of claim 19, wherein the second server sends the first network access identifier of the first electronic device to the network access device when verifying that a first account bound to the first electronic device satisfies an access condition of the preset network and receiving a network access identifier update request of the network access device;
and the network access equipment sends the network access identification updating request to the second server under the condition that the first network access identification and the second network access identification are not matched successfully for the first time.
22. A Bluetooth connection method of an electronic device, comprising:
the Bluetooth connection equipment receives a first connection identifier of third electronic equipment;
broadcasting a Bluetooth connection request by a third electronic device, wherein the Bluetooth connection request comprises a second connection identifier of the third electronic device;
the Bluetooth connection equipment matches a second connection identifier with the first connection identifier in the Bluetooth connection request according to the received Bluetooth connection request;
and the Bluetooth connection equipment is in Bluetooth connection with the third electronic equipment under the condition that the first connection identifier is matched with the second connection identifier.
23. The method of claim 22, further comprising:
the fourth electronic equipment acquires the first connection identification of the third electronic equipment from a first server;
the Bluetooth connection equipment acquires the first connection identifier of the third electronic equipment from fourth electronic equipment;
wherein the first server acquires the first connection identifier of the third electronic device from the third electronic device under the condition that a purchase order of the third electronic device is generated, and the fourth electronic device is capable of connecting with the bluetooth connection device.
24. The method of claim 22, further comprising:
the second server acquires the first connection identification of the third electronic equipment from the first server;
the Bluetooth connection equipment acquires the first connection identification of the third electronic equipment from a second server;
wherein the first server acquires the first connection identifier of the third electronic device from the third electronic device in a case where a purchase order of the third electronic device is generated, and the second server is capable of connecting to the bluetooth connection device.
25. The method of claim 22, wherein the bluetooth connection device sends bluetooth configuration information of the bluetooth connection device to the third electronic device if the first connection identifier and the second connection identifier match;
and the third electronic equipment performs Bluetooth connection with the Bluetooth connection equipment according to the Bluetooth configuration information.
26. A Bluetooth connection method of an electronic device, comprising:
the Bluetooth connection equipment receives a first connection identifier of third electronic equipment;
the Bluetooth connection device receives a connection request broadcast by a third electronic device, wherein the connection request comprises a second connection identifier of the third electronic device;
the Bluetooth connection equipment matches a second connection identifier with the first connection identifier in the connection request according to the received connection request;
and the Bluetooth connection equipment accesses the third electronic equipment to the Bluetooth connection equipment under the condition that the first connection identification is matched with the second connection identification.
27. The method of claim 26, further comprising:
the Bluetooth connection equipment sends the Bluetooth connection information of the Bluetooth connection equipment to the third electronic equipment under the condition that the first connection identification is matched with the second connection identification;
the third electronic equipment is accessed to the Bluetooth connection equipment according to the Bluetooth connection information;
wherein the first connection identifier comprises a product serial number of the third electronic device and a physical address of the third electronic device.
28. An electronic device, comprising:
a memory storing instructions;
a processor coupled to a memory, the program instructions stored by the memory when executed by the processor causing the electronic device to perform the network access method or the bluetooth connectivity method of any of claims 1 to 27.
29. A readable medium having stored thereon instructions that, when executed on an electronic device, cause the electronic device to perform the network access method or the bluetooth connection method of any one of claims 1 to 27.
CN202110184819.8A 2021-02-10 2021-02-10 Automatic network access and automatic connection method, system, device and medium Pending CN114916038A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110184819.8A CN114916038A (en) 2021-02-10 2021-02-10 Automatic network access and automatic connection method, system, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110184819.8A CN114916038A (en) 2021-02-10 2021-02-10 Automatic network access and automatic connection method, system, device and medium

Publications (1)

Publication Number Publication Date
CN114916038A true CN114916038A (en) 2022-08-16

Family

ID=82761156

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110184819.8A Pending CN114916038A (en) 2021-02-10 2021-02-10 Automatic network access and automatic connection method, system, device and medium

Country Status (1)

Country Link
CN (1) CN114916038A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115146252A (en) * 2022-09-05 2022-10-04 深圳高灯计算机科技有限公司 Authorization authentication method, system, computer device and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106454828A (en) * 2016-09-30 2017-02-22 广东美的制冷设备有限公司 Network access authentication method, network access authentication device, network access device and router
CN110868748A (en) * 2019-11-06 2020-03-06 北京小米移动软件有限公司 Intelligent equipment network access method, device, equipment, system and medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106454828A (en) * 2016-09-30 2017-02-22 广东美的制冷设备有限公司 Network access authentication method, network access authentication device, network access device and router
CN110868748A (en) * 2019-11-06 2020-03-06 北京小米移动软件有限公司 Intelligent equipment network access method, device, equipment, system and medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115146252A (en) * 2022-09-05 2022-10-04 深圳高灯计算机科技有限公司 Authorization authentication method, system, computer device and storage medium
CN115146252B (en) * 2022-09-05 2023-02-21 深圳高灯计算机科技有限公司 Authorization authentication method, system, computer device and storage medium

Similar Documents

Publication Publication Date Title
US11647448B2 (en) Method for enabling smart device to access network, network access method, apparatus and shopping system
WO2020143414A1 (en) Wireless network access method, device, equipment and system
JP7326471B2 (en) Bluetooth scanning method and electronic device
US9628970B2 (en) Method and device for customizing configuration of printing application
US20090227274A1 (en) Secure device configuration profiles
CN104169932A (en) Methods and devices for distributing content to an electronic device
CN113347242B (en) Cross-device resource access method and device, storage medium and electronic device
WO2022048385A1 (en) Method and apparatus for migrating profile
CN111221845A (en) Cross-device information searching method and terminal device
EP3817322A1 (en) Method for upgrading service application range of electronic identity card, and terminal device
CN113746777B (en) Method for safely accessing data and electronic equipment
EP3907930B1 (en) File processing method and terminal device
CN115086344B (en) Card sharing method, system and storage medium
US20220014353A1 (en) Method by which device shares digital key
KR102490395B1 (en) Electronic device for sharing a key of external electronic device and method for the same
CN113435173B (en) Text generation method, related device and system
CN114916038A (en) Automatic network access and automatic connection method, system, device and medium
CN110602689B (en) Method and device for safely operating equipment
CN103377321A (en) DRM (digital rights management) file processing method, terminal device and cloud
CN113468606A (en) Application program access method and electronic equipment
CN112543431A (en) Account synchronization method, medium and server
CN113055884B (en) Network access method, network access device and terminal
CN114528533A (en) Authentication method, terminal, handwriting pen and system
KR101850820B1 (en) Electronic Device and the Operating Method Thereof
WO2023185881A1 (en) Application program permission management method, system, and related apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination