CN116264682A - Equipment network access method and device, electronic equipment and storage medium - Google Patents

Equipment network access method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN116264682A
CN116264682A CN202111522694.1A CN202111522694A CN116264682A CN 116264682 A CN116264682 A CN 116264682A CN 202111522694 A CN202111522694 A CN 202111522694A CN 116264682 A CN116264682 A CN 116264682A
Authority
CN
China
Prior art keywords
network
equipment
connection
target router
network equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111522694.1A
Other languages
Chinese (zh)
Inventor
孙剑卿
何世健
庞超
许睿
李蒙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile IoT Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile IoT Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile IoT Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202111522694.1A priority Critical patent/CN116264682A/en
Publication of CN116264682A publication Critical patent/CN116264682A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The embodiment of the application discloses a method for accessing equipment into a network, which comprises the following steps: detecting at least one device within a preset connection range; establishing connection with a target router by using the network equipment under the condition that the network equipment exists in the at least one equipment; and establishing connection with the target router by using the mobile terminal under the condition that the network equipment does not exist in the at least one equipment. The embodiment of the application also provides a device network access device, electronic equipment and a storage medium.

Description

Equipment network access method and device, electronic equipment and storage medium
Technical Field
The present application relates to the technical field of electronic devices, and relates to, but is not limited to, a device networking method and apparatus, an electronic device, and a storage medium.
Background
In the prior art, there are various ways of distributing a network to a network device to be distributed, for example, the network device already distributed periodically scans a service set identifier (Service Set Identifier, SSID) of a peripheral device, and distributes the network to the newly added network device to be distributed. However, in the above process, the network device to be configured needs to disconnect itself from the router, and then connect to the network device to be configured, which may cause the network device to be configured to disconnect itself for a period of time, thereby affecting the network stability of the network device to be configured.
Disclosure of Invention
The embodiment of the application provides a device networking method and device, electronic equipment and a storage medium.
The technical scheme of the embodiment of the application is realized as follows:
in one aspect, an embodiment of the present application provides a method for accessing a device to be configured to a network, where the method includes: detecting at least one device within a preset connection range; establishing connection with a target router by using the network equipment under the condition that the network equipment exists in the at least one equipment; and establishing connection with the target router by using the mobile terminal under the condition that the network equipment does not exist in the at least one equipment.
In yet another aspect, an embodiment of the present application provides a device network access apparatus, where the device includes: the detection module is used for detecting at least one device within a preset connection range; the first connection module is used for establishing connection with the target router by utilizing the network equipment under the condition that the network equipment exists in the at least one equipment; and the second connection module is used for directly establishing connection with the target router by utilizing the mobile terminal under the condition that the network equipment does not exist in the at least one equipment.
In yet another aspect, an embodiment of the present application provides an electronic device, including a memory and a processor, where the memory stores a computer program executable on the processor, and where the processor implements steps in the above method when the program is executed.
In yet another aspect, embodiments of the present application provide a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs steps in the above-described method.
The beneficial effects that technical scheme that this application embodiment provided include at least:
in the embodiment of the application, the equipment to be distributed detects at least one equipment within a preset connection range; and establishing connection with the target router by utilizing the distributed network equipment under the condition that the distributed network equipment exists in the at least one equipment. On the one hand, the to-be-distributed network equipment can actively detect the distributed network equipment within the preset range and establish connection with the distributed network equipment, so that the regular scanning of peripheral equipment by disconnecting the distributed network equipment from a router is avoided, and the network stability of the distributed network equipment is improved.
On the other hand, the equipment to be distributed detects at least one equipment within a preset connection range, the equipment within the preset connection range can be classified, the equipment is divided into the distributed network equipment and the equipment to be distributed, and the situation that a user needs to manually input the SSID of the target router and the password of the target router to configure each equipment to be distributed under the condition that the distributed network equipment exists within the preset connection range is avoided.
In still another aspect, when the network-allocated device exists in the at least one device, connection is established between the network-allocated device and the target router, so that manual input of a user can be avoided by sharing the SSID of the target router and the password of the target router by the network-allocated device, and network access time of the network-allocated device is saved.
Drawings
For a clearer description of the technical solutions in the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly introduced below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art, wherein:
fig. 1A is a schematic system architecture diagram of a device networking method according to an embodiment of the present application;
fig. 1B is a schematic flow chart of a method for device network access according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a method for device network access according to an embodiment of the present application;
fig. 3 is a schematic flow chart of a method for device network access according to an embodiment of the present application;
fig. 4A is a schematic flow chart of a method for device network access according to an embodiment of the present application;
Fig. 4B is a schematic flow chart of a method for device network access according to an embodiment of the present application
Fig. 5 is a schematic flow chart of a method for device network access according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a device network access apparatus according to an embodiment of the present application;
fig. 7 is a schematic diagram of a hardware entity of an electronic device according to an embodiment of the present application.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. The following examples are illustrative of the present application, but are not intended to limit the scope of the present application. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is to be understood that "some embodiments" can be the same subset or different subsets of all possible embodiments and can be combined with one another without conflict.
It should be noted that the term "first\second\third" in relation to the embodiments of the present application is merely to distinguish similar objects and does not represent a specific ordering for the objects, it being understood that the "first\second\third" may be interchanged in a specific order or sequence, where allowed, to enable the embodiments of the present application described herein to be practiced in an order other than that illustrated or described herein.
It will be understood by those skilled in the art that all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which embodiments of this application belong unless defined otherwise. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
Before describing embodiments of the present application in further detail, the terms and terminology involved in the embodiments of the present application will be described, and the terms and terminology involved in the embodiments of the present application are suitable for the following explanation:
AP: when a wireless Access Point (AP) and a mobile hotspot (WiFi) device operate in a wireless Access Point mode, the AP becomes a creator of a wireless network and a central node of the network, and a server, a notebook computer, and other devices can be connected to a wireless local area network (WLAN, wireless Local Area Networks) through the WiFi device operating in the AP mode.
Soft AP: i.e., soft-AP, can generate AP hotspots. The physical hardware of the soft AP is a standard wireless network card.
And (3) STA: station (STA), the WiFi device operates in a Station mode, and becomes a device accessing the wireless network.
SSID: service set identifiers (Service Set Identifier, SSID), one SSID for each wireless AP, are used for user identification.
BSSID: a basic service set identifier (Basic Service Set Identifier, BSSID), each device in the network includes a physical address, also known as a media access control address (Media Access Control Address, MAC) address, that uniquely identifies the device.
In the related art, there are various ways of performing network allocation on the network equipment to be allocated, for example, starting an AP on the network equipment to be allocated and performing direct connection transmission; the network equipment to be allocated starts a monitoring mode, and the mobile terminal circularly broadcasts information such as SSID, password and the like by embedding the information in a specific field in a broadcast frame; the network equipment starts management frame monitoring, and sends SSID and password to the network equipment to be distributed under the condition that the management frame of the network access request of the equipment is monitored; the network equipment is periodically scanned by the network equipment, and after the network equipment to be distributed is detected, the network equipment to be distributed is actively connected, and SSID and password are sent to the network equipment to be distributed.
As can be seen, the related art has the following problems; 1) The wireless Access Point (AP) is turned on the device, so that the user needs to perform interactive operation of multiple interfaces, manually inputs a user name and a password, and can only configure one device to be configured at a time. 2) When the broadcast frame is transmitted, the safety cannot be ensured; and the failure rate is higher because the process of capturing packets of the transmission data and transmitting the data can be influenced by environmental channel fluctuation, other AP interference and the like. 3) The management frame monitoring mode needs to be realized through monitoring and sending of management frames, most modules do not open monitoring and sending interfaces of the management frames, and the realization threshold is high. 4) The network equipment is periodically scanned by the network equipment, the network equipment is required to disconnect from the router, and then the network equipment to be connected is disconnected, so that the network equipment is disconnected for a period of time, and the network stability of the network equipment is affected.
In order to solve the above-mentioned problems, an embodiment of the present application provides a device networking method, and before introducing the device networking method provided in the embodiment of the present application, a system architecture of the device networking method is introduced, and fig. 1A is a schematic diagram of a system architecture of the device networking method provided in the embodiment of the present application, as shown in fig. 1A, where the system architecture includes a device 110 to be configured, a cloud platform 120, and a mobile terminal 130, where:
The network to be configured device 110 is configured to establish a connection with a network configured device that has been connected to a network; sending a network allocation request to the network allocated equipment; receiving a first network allocation instruction sent by the mobile terminal 130; determining a network access mode according to the first network allocation instruction; after the network is accessed, the cloud platform is connected for registration; receiving a message corresponding to a registration result sent by a cloud platform; receiving network allocation requests sent by other network allocation equipment to be allocated after network access is performed; the received network allocation request is sent to a cloud platform;
the cloud platform 120 is configured to receive a network allocation request forwarded by the network allocation device; forwarding the distribution network request to the mobile terminal 130; receiving a second network allocation instruction sent by the mobile terminal 130; registering the network equipment 110 to be distributed; transmitting a message corresponding to the registration result to the network equipment 110 to be configured;
the mobile terminal 130 is configured to receive a network allocation request sent by the cloud platform 120; authenticating the distribution network request; determining a distribution network instruction according to the authentication result; in the case that the network allocation instruction is a first network allocation instruction, sending the first network allocation instruction to the to-be-allocated network device 110; and sending the second network equipment to be distributed to the cloud platform under the condition that the network distribution instruction is a second network distribution instruction.
In one implementation manner, the network device to be configured 110 may include: WIFI device 111, WIFI device 112, WIFI device 113, WIFI device 114, WIFI device 115, WIFI device 116, and WIFI device 117. In the case that WIFI device 111 receives the first network configuration instruction, network access may be achieved by directly establishing a connection with the target router, where the network access flow is a network configuration flow of the first device. In the case where WIFI device 112 receives the second network configuration instruction, network access may be achieved by establishing a connection between the network-configured device and the target router, where the network access flow is a network configuration flow of the nth device.
In one implementation, the mobile terminal 130 may include: mobile terminal 131, mobile terminal 132, and mobile terminal 133. The mobile terminal 131 can perform network access authentication on the network equipment to be allocated in an application program mode; the mobile terminal 132 may perform network access authentication through the subscriber identity module SIM; the mobile terminal 133 may perform network access authentication through a mobile communication message. For example, 5G messages are authenticated for network access.
Based on the system architecture of the device networking method shown in fig. 1A, the embodiment of the present application provides a device networking method, which is applied to a device to be configured with a network, and fig. 1B is a schematic flow diagram of the device networking method provided in the embodiment of the present application, as shown in fig. 1B, where the method at least includes the following steps:
Step S101, detecting at least one device within a preset connection range;
it should be understood that the preset connection range may be a distance range, and the device to be configured may detect a device within the preset distance range. It should be appreciated that the device may be a wireless network connection enabled device, such as a WIFI device.
Step S102, when the distributed network equipment exists in the at least one equipment, establishing connection with a target router by utilizing the distributed network equipment;
in one implementation manner, determining whether the allocated network device exists may be implemented by determining whether at least one device within a preset connection range has a target soft AP; alternatively, the target soft AP may be a second soft AP. It should be understood that the second softap is distinguished by the user id to which the device belongs, and the device owned by each user has the same second softap, so that the device to be configured is prevented from being accessed to the network to which other users belong by mistake. Each device has a first soft AP in addition to the second soft AP. It should be appreciated that the first softap may be identified by a device uuid, where each device has a unique device identification.
It should be appreciated that the device to be configured deactivates the first soft AP and enables the second soft AP after successful network access. Therefore, by detecting whether the device has the second soft AP, it can be determined whether the network device already exists. For example, the second soft AP may be an SSID including oneos_zeroal_ (where "zero" is the user id to which the device belongs), and when the device to be configured detects that there is a device including oneos_zeroal_, it determines that the device is a device to be configured.
In one possible implementation manner, if the network device already allocated exists in the at least one device, the network device to be allocated enters a network allocation flow of the nth device. Optionally, the network distribution flow of the nth device may establish connection with the router by establishing connection between the device to be distributed and the device to be distributed, and sharing the SSID of the target router and the password of the target router stored in the device to be distributed.
Therefore, each network equipment to be distributed can be prevented from manually inputting the SSID of the target router and the password of the target router by a user, only one network equipment to be distributed can be configured at a time, and when more network equipment to be distributed exist in one area, a long time is required.
Step S103, directly establishing connection with the target router by utilizing the mobile terminal under the condition that the network equipment does not exist in the at least one equipment.
In one implementation manner, the first soft AP of the device may be an SSID including oneos_zerony (where "zero" is a device uuid), and if the network device to be configured detects that each device includes an SSID of oneos_zerony (where "zero" is a device uuid) and does not include an SSID of oneos_zeroal (where "zero" is a user id to which the device belongs), it determines that the network device is not configured. Optionally, the network distribution flow of the first device can establish connection with the mobile terminal through the network distribution device to be distributed, and directly establish connection with the router through the mobile terminal by manually inputting the SSID of the target router and the password of the target router for the network distribution device to be distributed.
In the embodiment of the application, the equipment to be distributed detects at least one equipment within a preset connection range; and establishing connection with the target router by utilizing the distributed network equipment under the condition that the distributed network equipment exists in the at least one equipment. On the one hand, the to-be-distributed network equipment can actively detect the distributed network equipment within the preset range and establish connection with the distributed network equipment, so that the regular scanning of peripheral equipment by disconnecting the distributed network equipment from a router is avoided, and the network stability of the distributed network equipment is improved. On the other hand, the equipment to be distributed detects at least one equipment within a preset connection range, the equipment within the preset connection range can be classified, the equipment is divided into the distributed network equipment and the equipment to be distributed, and the situation that a user needs to manually input the SSID of the target router and the password of the target router to configure each equipment to be distributed under the condition that the distributed network equipment exists within the preset connection range is avoided. In still another aspect, when the network-allocated device exists in the at least one device, connection is established between the network-allocated device and the target router, so that manual input of a user can be avoided by sharing the SSID of the target router and the password of the target router by the network-allocated device, and network access time of the network-allocated device is saved.
Fig. 2 is a flow chart of a method for device network access, as shown in fig. 2, provided in an embodiment of the present application, where the method at least includes the following steps:
step S201, detecting at least one device within a preset connection range;
step S202, under the condition that the network equipment is distributed in the at least one equipment, establishing communication connection with the network equipment according to the target soft AP; the distributed network equipment comprises a target soft AP, wherein the target soft AP is used for representing a user to which the distributed network equipment belongs;
in one implementation, the communication connection may be a WIFI connection. The target soft AP may be an SSID including oneos_zero_ (where x is the user id to which the device belongs).
It should be understood that the reliability of information transmission can be greatly improved by firstly establishing communication connection and then transmitting information between each device to be distributed and the devices already distributed.
Step S203, sending a network allocation request to the network allocated equipment under the condition that the connection is successfully established with the network allocated equipment; the network allocation request at least comprises an encryption key corresponding to the equipment identifier of the equipment to be allocated;
in one implementation, the encryption key may be a symmetric key or an asymmetric key.
In one implementation manner, the encryption key may be generated by a cloud platform, and when the network equipment to be distributed leaves the factory, the encryption key generated by the cloud platform is written into the network equipment to be distributed. In one implementation manner, when the cloud platform authorizes the network access of the network equipment to be distributed, the cloud platform sends the encryption key of the network equipment to be distributed to the network equipment, the network equipment receives the encryption key of the network equipment to be distributed, the router password is encrypted by using the encryption key of the network equipment to be distributed, and the network equipment to be distributed decrypts the router password according to the encryption key under the condition that the encrypted router password is received.
In one implementation manner, after the network allocation request is sent by the network allocation equipment, the network allocation equipment receives the network allocation request sent by the network allocation equipment; and sending the distribution network request and the target soft AP to a cloud platform. The cloud platform receives the network allocation request and the target soft AP; determining a target administrator identifier according to the target soft AP; connecting the mobile terminal according to the target administrator identifier; the cloud platform sends the network allocation request to the mobile terminal; the mobile terminal receives a network allocation request sent by the cloud platform; under the condition of overtime response or refusing the network allocation request, the mobile terminal sends a first network allocation instruction to the network equipment to be allocated; the first network distribution instruction is used for controlling the to-be-distributed network equipment to be directly connected with a mobile terminal; under the condition of allowing the network allocation request, the mobile terminal sends a second network allocation instruction to the cloud platform; the second network distribution instruction is used for controlling the to-be-distributed network equipment to be connected with the mobile terminal through the distributed network equipment; the cloud platform receives the second distribution network instruction; the cloud platform generates a network access permission identifier according to the second network allocation instruction; the cloud platform sends the network access permission identification and the encryption key to the network equipment; the network-connected equipment receives the network access permission identification and the encryption key sent by the cloud platform; the matched network equipment acquires the password of the router and the SSID of the target router; the network equipment encrypts the password of the router according to the secret key; and the network equipment sends the encrypted password, the SSID of the target router and the user identification of the network equipment to be distributed.
Step S204, receiving response information returned by the network equipment; the response information comprises attribute information of the target router; the distributed network equipment accesses a network through the target router;
step S205, the target router is connected according to the attribute information;
in some implementations, the attribute information includes at least an encrypted password and an SSID of the target router; the step S205, which connects the target router according to the attribute information, includes: determining a target router according to the SSID of the target router; decrypting the encrypted password by using the encryption key; and establishing connection with the target router by using the decrypted password.
In some implementations, the SSID of the target router may be a MAC address, i.e., a physical address of the router. The network device to be configured finds the target router in the network according to the physical address of the router, and establishes connection with the target router according to the decrypted password.
Step S206, in the case that the network device is not distributed in the at least one device, the mobile terminal is utilized to directly establish connection with the target router.
In some implementations, the response information further includes a user identifier of the configured network device, and after the connection is established with the target router using the decrypted password, the method further includes: establishing connection with a cloud platform according to the user identification; the cloud platform is used for managing the distributed network equipment; receiving a successful network access message sent by the cloud platform under the condition that connection is successfully established with the cloud platform; and enabling the user identification under the condition of successful network access.
In one implementation manner, after establishing connection with a cloud platform, the cloud platform registers the network equipment to be distributed; and sending the successful registration message to the equipment to be distributed.
In one implementation, the device identification may be deactivated after the user identification is activated; in another implementation, the user identification may not be deactivated after being activated. Judging whether the equipment is connected to the network only needs to detect whether the equipment has the user identification or not, and does not need to have the equipment identification.
In some implementations, the method further includes: receiving a timeout message or a refusal network access message sent by the cloud platform under the condition that the connection with the cloud platform is not successfully established; and directly establishing connection with the target router by using the mobile terminal.
It should be understood that, in the case of receiving the timeout message or the reject network message, the configured network device fails to share the SSID of the target router and the password of the target router with the to-be-configured network device, and therefore, needs to be connected to the mobile terminal through the to-be-configured network device, and obtain the SSID of the target router and the password of the target router through a manual input manner of the user on the mobile terminal.
In some realizable modes, the successful network access message, the overtime message and the refusal network access message are authentication results after network access authentication is carried out on the network equipment to be allocated; the network access authentication mode at least comprises one of the following steps: mobile terminal applet, application, mobile communication message and subscriber identity module SIM.
It is understood that the application range of the device networking method can be expanded through multiple ways of authentication, so that the requirements of different mobile terminal users are fully met, and the user experience is improved.
In the embodiment of the application, on one hand, under the condition that the connection is successfully established with the network equipment, a network allocation request is sent to the network equipment; the network allocation request at least comprises an encryption key corresponding to the equipment identifier of the equipment to be allocated; therefore, the one-to-one correspondence between the equipment identification and the equipment key of the equipment to be distributed can be realized, the password leakage can be prevented, and the security of the distribution flow can be improved.
On the other hand, under the condition that the network equipment is distributed in the at least one equipment, establishing communication connection with the network equipment according to the target soft AP; therefore, communication connection can be established between each to-be-allocated network device and the allocated network device, and then information transmission is carried out, so that the reliability of information transmission is greatly improved.
In still another aspect, receiving a timeout message or a refusal to access the internet message sent by the cloud platform under the condition that the connection is not successfully established with the cloud platform; directly establishing connection with the target router by using a mobile terminal; the network security can be improved by preventing unauthorized users from accessing the network in a device authorization mode. The network access authentication mode at least comprises one of the following steps: the mobile terminal applet, the application program, the mobile communication message and the user identity module SIM, so that the user can flexibly select through various authorization modes of multiple channels, and the mobile terminal applet, the application program, the mobile communication message and the user identity module SIM are greatly convenient for the user.
Fig. 3 is a flow chart of a method for device network access, as shown in fig. 3, provided in an embodiment of the present application, where the method at least includes the following steps:
step S301, detecting at least one device within a preset connection range;
Step S302, when the distributed network equipment exists in the at least one equipment, connection is established between the distributed network equipment and a target router;
step S303, directly establishing connection with the target router by using the mobile terminal under the condition that the network equipment does not exist in the at least one equipment.
Step S304, connecting with at least one matched network device to obtain a matched network; each network equipment in the network is used for distributing network for the network equipment to be distributed.
Illustratively, when 3 nodes are included in the network already configured, the network to be configured can be accessed by any node.
In the embodiment of the application, the network is connected with at least one matched network device to obtain a matched network; each network equipment in the network is used for distributing network for the network equipment to be distributed; therefore, each device can be used as a distribution network device to distribute the network to other devices to be distributed to form a plurality of distribution network nodes, the spatial range of the distribution network is expanded, the access capacity of the distribution network is increased, and the distribution network speed is increased.
Fig. 4A is a flow chart of a method for device network access, as shown in fig. 4A, provided in an embodiment of the present application, where the method at least includes the following steps:
WiFi scanning searches for a contracted second soft AP after the equipment is powered on, SSID takes OneOS_ZeroAL as a prefix, if the SSID is not searched, the operation is transferred to a first equipment distribution network flow, otherwise, the operation is transferred to an Nth equipment distribution network flow
Step S401, powering up equipment to be distributed;
step S402, judging whether the equipment to be distributed is connected to the network;
in some possible implementation manners, the device to be configured is already connected to the network, step S403 is executed, and a device management flow is entered;
in some possible implementations, the to-be-configured network device does not access the network, and step S404 is executed to determine whether the to-be-configured network device has a target soft AP;
in some possible implementations, the to-be-configured network device has a target soft AP, execute step S405, and enter the nth device configuration flow;
in some possible implementations, the to-be-configured network device does not have a target softap, and step S406 is performed to enter a first device configuration flow.
Fig. 4B is a flow chart of a method for device network access according to an embodiment of the present application, as shown in fig. 4B, where the method at least includes the following steps:
step S410, the network device to be configured opens the first soft AP, where SSID is "oneos_zerony_" (where "is device uuid);
step S420, the mobile terminal detects the equipment to be distributed;
Illustratively, the mobile terminal searches for an AP hotspot whose SSID header is oneos_zerony_and then connects the AP hotspot by hashing the SSID information with a generated password (to prevent user misconnection).
Step S430, the mobile terminal detects the operation of connecting the user with the network equipment to be allocated;
step S440, the mobile terminal detects the router SSID and the password input by the user;
in step S450, the mobile terminal invokes the application program to encrypt the password, and the user obtains a key corresponding to the network device to be configured from the cloud platform according to the BSSID corresponding to the SSID to encrypt the password, and then sends the router SSID and the encrypted password to the network device to be configured together with the user identifier.
Step S460, the network equipment to be configured acquires the SSID and the encryption password, and decrypts the password;
illustratively, the network device to be configured receives the router SSID and the encrypted password, decrypts the password, and connects to the router.
Step S470, the router for connecting the network equipment to be distributed stores SSID and password in a cache;
step S480, the cloud platform registers the network equipment to be distributed;
in step S490, the network device to be configured turns on the second soft AP, and the SSID is oneos_zero_.
In one implementation, the network device to be provisioned turns off the first softap after turning on the second softap.
Fig. 5 is a flow chart of a method for device network access, as shown in fig. 5, provided in an embodiment of the present application, where the method at least includes the following steps:
step S501, the equipment to be distributed is connected with the distributed network equipment;
step S502, a network distribution request is sent by a network distribution device; the network allocation request at least comprises equipment identification of equipment to be allocated;
step S503, the network equipment receives the network allocation request;
step S504, the network equipment sends the network distribution request and the user identification to the cloud platform; the user identifier is a user identifier of a user to which the network equipment belongs;
step S505, the cloud platform receives a network allocation request;
step S506, the cloud platform identifies an account administrator according to the user identification; the account administrator authenticates the network allocation request through the mobile terminal;
step S507, the cloud platform pushes a distribution network request to an account administrator;
step S508, the mobile terminal confirms whether to authorize the request of the distribution network in 30S;
step S509, when detecting that the network allocation request is authorized overtime or rejecting the network allocation request, the network allocation equipment to be allocated enters a first equipment network allocation process;
step S510, under the condition that the mobile terminal is detected to authorize the network allocation request, the cloud platform sends the network access permission notification and the device key corresponding to the device identifier to the network allocated device;
Step S511, the network device sends the secret key corresponding to the device identifier, the SSID of the target router and the user identifier of the network device to be distributed;
step S512, the network equipment to be distributed acquires the SSID of the target router and the secret key corresponding to the equipment identifier, and decrypts the password of the router;
step S513, the equipment to be distributed is connected with the router through the SSID of the target router and the router password, and the SSID of the target router and the router password are stored in a cache of the equipment to be distributed;
step S514, the cloud platform registers network equipment to be distributed which is accessed to the network;
in step S515, the network device to be configured turns on the second soft AP, and the SSID is oneos_zero_.
The embodiment of the application provides a method for accessing equipment to the network, which at least comprises the following steps:
step 1, a network equipment to be distributed acquires a target soft AP of the network equipment; encrypting the target soft AP;
for example, the network device to be configured connects to the network AP according to the scanned target soft AP, and the SSID is a password (preventing the user from being connected by mistake) generated by hash of the information (oneos_zero). And the equipment to be distributed is connected with the distributed network equipment according to the target soft AP.
Step 2, the equipment to be distributed sends a network distribution request to the equipment to be distributed; the network allocation request at least comprises the equipment identifier of the equipment to be allocated and an encryption key corresponding to the equipment identifier of the equipment to be allocated;
Step 3, the network distribution equipment receives a network distribution request sent by the network distribution equipment to be distributed; the network distribution equipment sends the network distribution request and the target soft AP to a cloud platform;
the network device to be distributed and the current user identification are sent to the cloud platform together after receiving the network distribution request.
Step 4, the cloud platform receives the network allocation request and the target soft AP; determining a target account administrator identifier according to the target soft AP; connecting the mobile terminal according to the target account administrator identifier; sending the network allocation request to the mobile terminal;
the cloud platform determines the target account administrator identifier according to the user identifier after receiving the network allocation request, and pushes the network allocation request to an administrator corresponding to the target account administrator identifier.
Step 5, the mobile terminal receives a network allocation request sent by the cloud platform;
in one implementation manner, the account administrator authorizes or denies the network connection of the network device to be configured in a preset time through the mobile terminal; under the condition of overtime response or refusing the network allocation request, the mobile terminal sends a first network allocation instruction to the network equipment to be allocated; the first network distribution instruction is used for controlling the network equipment to be distributed to be connected with a target router by using a mobile terminal;
Illustratively, the user authorizes or denies the device access within 30s through the mobile terminal, e.g. APP/applet/SIM authentication/5G message, automatically denies for more than 30s, and the refusal of the device access enters the first device network configuration flow, and connects with the target router by means of the mobile terminal, i.e. step 6 is entered.
Step 6, under the condition that the network connection of the equipment to be distributed is refused, the equipment to be distributed enters a first equipment distribution flow;
step 7, under the condition of allowing the network allocation request, the mobile terminal sends a second network allocation instruction to the cloud platform; the second network distribution instruction is used for controlling the to-be-distributed network equipment to be connected with the mobile terminal through the distributed network equipment;
in one implementation manner, after the step 7, the cloud platform receives the second distribution network instruction; the cloud platform generates a network access permission identifier according to the second network allocation instruction; the cloud platform sends the network access permission identification and the encryption key to the network equipment;
step 8, the network-connected equipment receives the network access permission identification and the encryption key sent by the cloud platform; acquiring a password of a router and an SSID of a target router; encrypting the password of the router according to the secret key; sending the encrypted password, the SSID of the target router and the user identification of the network equipment to be distributed to the network equipment to be distributed;
Step 9, the network equipment to be distributed receives the encrypted password sent by the network equipment to be distributed, the SSID of the target router and the user identification of the network equipment to be distributed; decrypting the encrypted password according to the encryption key to obtain a password of the router; connecting a router according to the password of the router and the SSID of the target router;
step 10, the equipment to be distributed stores the password of the router and the SSID of the target router into a cache of the equipment to be distributed;
step 11, the equipment to be distributed is connected with the cloud platform through the received user identification
Step 12, registering the equipment to be distributed by the cloud platform; transmitting a successful registration message to the equipment to be distributed;
step 13, the equipment to be distributed receives a successful registration message sent by the cloud platform; and enabling the user identification and disabling the equipment identification.
In an exemplary embodiment, after the cloud platform is successfully connected, the network device to be configured opens the second soft AP, where the SSID is oneos_zeroal (where SSID is a user id to which the device belongs), and the device may serve as the network device to be configured to provide a network service for the network device to be configured.
Based on the foregoing embodiments, the embodiments of the present application further provide a device networking apparatus, where the control apparatus includes each module included, and may be implemented by a processor in a terminal; of course, the method can also be realized by a specific logic circuit; in practice, the processor may be a central processing unit (Central Processing Unit, CPU), microprocessor (Micro Processing Unit, MPU), digital signal processor (Digital Signal Processor, DSP) or field programmable gate array (Field Programmable Gate Array, FPGA), etc.
Fig. 6 is a schematic structural diagram of a device network access apparatus provided in the embodiment of the present application, as shown in fig. 6, where, the device 600 includes a detection module, a first connection module, and a second connection module, where:
a detection module 601, configured to detect at least one device within a preset connection range;
a first connection module 602, configured to establish a connection with a target router using a network device that has been configured in the at least one device;
and a second connection module 603, configured to directly establish a connection with the target router by using the mobile terminal when the configured network device does not exist in the at least one device.
In some possible embodiments, the configured network device includes a target soft AP, where the target soft AP is used to represent a user to whom the configured network device belongs, and the first connection module 602 is further configured to establish a communication connection with the configured network device according to the target soft AP; under the condition that connection is successfully established with the network equipment, sending a network allocation request to the network equipment; receiving response information returned by the network equipment; the response information comprises attribute information of the target router; the distributed network equipment accesses a network through the target router; and connecting the target router according to the attribute information.
In some possible embodiments, the network configuration request includes at least an encryption key corresponding to a device identifier of the device to be configured, the attribute information includes at least an encrypted password and an SSID of the target router, and the first connection module 602 is further configured to determine the target router according to the SSID of the target router; decrypting the encrypted password by using the encryption key; and establishing connection with the target router by using the decrypted password.
In some possible embodiments, the response information further includes a user identifier of the configured network device, and the apparatus 600 further includes a management module, a sending module, and an enabling module, where: the management module is used for establishing connection with the cloud platform according to the user identification; the cloud platform is used for managing the distributed network equipment; the sending module is used for receiving a successful networking message sent by the cloud platform under the condition that the connection with the cloud platform is successfully established; and the starting module is used for starting the user identification under the condition of successful network access.
In some possible embodiments, the apparatus 600 further comprises a receiving module and a third connecting module, wherein: the receiving module is used for receiving a timeout message or a refusal network access message sent by the cloud platform under the condition that the connection with the cloud platform is not successfully established; and the third connection module is used for directly establishing connection with the target router by utilizing the mobile terminal.
In some possible embodiments, the successful network access message, the timeout message and the refusal network access message are authentication results after network access authentication is performed on the network equipment to be configured; the network access authentication mode at least comprises one of the following steps: mobile terminal applet, application, mobile communication message and subscriber identity module SIM.
In some possible embodiments, the apparatus 600 further includes a fourth connection module, configured to connect with at least one configured network device to obtain a configured network; each network equipment in the network is used for distributing network for the network equipment to be distributed.
It should be noted here that: the description of the apparatus embodiments above is similar to that of the method embodiments above, with similar advantageous effects as the method embodiments. For technical details not disclosed in the device embodiments of the present application, please refer to the description of the method embodiments of the present application for understanding.
It should be noted that, in the embodiment of the present application, if the above-mentioned device network access method is implemented in the form of a software function module, and sold or used as a separate product, the device network access method may also be stored in a computer readable storage medium. Based on such understanding, the technical solution of the embodiments of the present application may be embodied essentially or in a part contributing to the related art in the form of a software product stored in a storage medium, including several instructions for causing an electronic device (which may be a smart phone with a camera, a tablet computer, etc.) to perform all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read Only Memory (ROM), a magnetic disk, an optical disk, or other various media capable of storing program codes. Thus, embodiments of the present application are not limited to any specific combination of hardware and software.
Correspondingly, the embodiment of the application provides a computer readable storage medium, on which a computer program is stored, which when being executed by a processor, implements the steps of the device networking method of any of the above embodiments.
Correspondingly, in the embodiment of the application, a chip is further provided, and the chip includes a programmable logic circuit and/or program instructions, and when the chip runs, the chip is used for implementing the steps in the device networking method in any of the above embodiments.
Correspondingly, in an embodiment of the present application, there is also provided a computer program product for implementing the steps of the device networking method of any of the above embodiments, when the computer program product is executed by a processor of an electronic device.
Based on the same technical concept, the embodiment of the application provides an electronic device, which is used for implementing the device networking method described in the embodiment of the method. Fig. 7 is a schematic diagram of a hardware entity of an electronic device according to an embodiment of the present application, as shown in fig. 7, where the electronic device 700 includes a memory 710 and a processor 720, where the memory 710 stores a computer program that can be run on the processor 720, and when the processor 720 executes the program, the steps in the device networking method according to any one of the embodiments of the present application are implemented.
The memory 710 is configured to store instructions and applications executable by the processor 720, and may also cache data (e.g., image data, audio data, voice communication data, and video communication data) to be processed or processed by various modules in the processor 720 and the electronic device, which may be implemented by a FLASH memory (FLASH) or a random access memory (Random Access Memory, RAM).
The steps of the device networking method of any of the above are implemented when the processor 720 executes a program. Processor 720 generally controls the overall operation of electronic device 700.
The processor may be at least one of an application specific integrated circuit (application lication Specific Integrated Circuit, ASIC), a digital signal processor (Digital Signal Processor, DSP), a digital signal processing device (Digital Signal Processing Device, DSPD), a programmable logic device (Programmable Logic Device, PLD), a field programmable gate array (Field Programmable Gate Array, FPGA), a central processing unit (Central Processing Unit, CPU), a controller, a microcontroller, and a microprocessor. It will be appreciated that the electronic device implementing the above-mentioned processor function may be other, and embodiments of the present application are not specifically limited.
The computer storage medium/Memory may be a Read Only Memory (ROM), a programmable Read Only Memory (Programmable Read-Only Memory, PROM), an erasable programmable Read Only Memory (Erasable Programmable Read-Only Memory, EPROM), an electrically erasable programmable Read Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), a magnetic random access Memory (Ferromagnetic Random Access Memory, FRAM), a Flash Memory (Flash Memory), a magnetic surface Memory, an optical disk, or a Read Only optical disk (Compact Disc Read-Only Memory, CD-ROM); but may be various electronic devices such as mobile phones, computers, tablet devices, personal digital assistants, etc., that include one or any combination of the above-mentioned memories.
It should be noted here that: the description of the storage medium and apparatus embodiments above is similar to that of the method embodiments described above, with similar benefits as the method embodiments. For technical details not disclosed in the embodiments of the storage medium and the apparatus of the present application, please refer to the description of the method embodiments of the present application for understanding.
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present application. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. It should be understood that, in various embodiments of the present application, the sequence numbers of the foregoing processes do not mean the order of execution, and the order of execution of the processes should be determined by the functions and internal logic thereof, and should not constitute any limitation on the implementation process of the embodiments of the present application. The foregoing embodiment numbers of the present application are merely for describing, and do not represent advantages or disadvantages of the embodiments.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above described device embodiments are only illustrative, e.g. the division of the units is only one logical function division, and there may be other divisions in practice, such as: multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. In addition, the various components shown or discussed may be coupled or directly coupled or communicatively coupled to each other via some interface, whether indirectly coupled or communicatively coupled to devices or units, whether electrically, mechanically, or otherwise.
The units described above as separate components may or may not be physically separate, and components shown as units may or may not be physical units; can be located in one place or distributed to a plurality of network units; some or all of the units may be selected according to actual needs to achieve the purposes of the embodiments of the present application.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may be separately used as one unit, or two or more units may be integrated in one unit; the integrated units may be implemented in hardware or in hardware plus software functional units.
Alternatively, the integrated units described above may be stored in a computer readable storage medium if implemented in the form of software functional modules and sold or used as a stand-alone product. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partly contributing to the related art, embodied in the form of a software product stored in a storage medium, including several instructions for causing an apparatus automatic test line to perform all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a removable storage device, a ROM, a magnetic disk, or an optical disk.
The methods disclosed in the several method embodiments provided in the present application may be arbitrarily combined without collision to obtain a new method embodiment.
The features disclosed in the several method or apparatus embodiments provided in the present application may be arbitrarily combined without conflict to obtain new method embodiments or apparatus embodiments.
The foregoing is merely an embodiment of the present application, but the protection scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered in the protection scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A method for accessing a device to a network, the method being applied to a device to be connected to the network, the method comprising:
detecting at least one device within a preset connection range;
establishing connection with a target router by using the network equipment under the condition that the network equipment exists in the at least one equipment;
and establishing connection with the target router by using the mobile terminal under the condition that the network equipment does not exist in the at least one equipment.
2. The method of claim 1, wherein the configured network device includes a target softap, the target softap being used to represent a user to which the configured network device belongs, and the establishing a connection with a target router using the configured network device includes:
establishing communication connection with the matched network equipment according to the target soft AP;
under the condition that connection is successfully established with the network equipment, sending a network allocation request to the network equipment;
receiving response information returned by the network equipment; the response information comprises attribute information of the target router;
and connecting the target router according to the attribute information.
3. The method of claim 2, wherein the network allocation request includes at least an encryption key corresponding to a device identifier of the device to be allocated, the attribute information includes at least an encrypted password and an SSID of the target router, and the connecting the target router according to the attribute information includes:
determining a target router according to the SSID of the target router;
decrypting the encrypted password by using the encryption key;
and establishing connection with the target router by using the decrypted password.
4. The method of claim 3, wherein the response information further includes a user identification of the provisioned network apparatus, the method further comprising, after the establishing a connection with the target router using the decrypted password:
establishing connection with a cloud platform according to the user identification; the cloud platform is used for managing the distributed network equipment;
receiving a successful network access message sent by the cloud platform under the condition that connection is successfully established with the cloud platform;
and enabling the user identification under the condition of successful network access.
5. The method of claim 4, wherein the method further comprises:
receiving a timeout message or a refusal network access message sent by the cloud platform under the condition that the connection with the cloud platform is not successfully established;
and directly establishing connection with the target router by using the mobile terminal.
6. The method of claim 5, wherein the successful network access message, the timeout message, and the reject network access message are authentication results after network access authentication is performed on the network device to be configured; the network access authentication mode at least comprises one of the following steps: mobile terminal applet, application, mobile communication message and subscriber identity module SIM.
7. The method of any of claims 1 to 6, wherein after said establishing a connection with the target router using the provisioned network apparatus, the method further comprises:
connecting with at least one matched network device to obtain a matched network; each network equipment in the network is used for distributing network for the network equipment to be distributed.
8. A device networking apparatus, the apparatus comprising:
the detection module is used for detecting at least one device within a preset connection range;
the first connection module is used for establishing connection with the target router by utilizing the network equipment under the condition that the network equipment exists in the at least one equipment;
and the second connection module is used for directly establishing connection with the target router by utilizing the mobile terminal under the condition that the network equipment does not exist in the at least one equipment.
9. An electronic device comprising a memory and a processor, the memory storing a computer program executable on the processor, characterized in that the processor implements the steps of the method of any of claims 1 to 7 when the program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, realizes the steps in the method of any one of claims 1 to 7.
CN202111522694.1A 2021-12-13 2021-12-13 Equipment network access method and device, electronic equipment and storage medium Pending CN116264682A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111522694.1A CN116264682A (en) 2021-12-13 2021-12-13 Equipment network access method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111522694.1A CN116264682A (en) 2021-12-13 2021-12-13 Equipment network access method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116264682A true CN116264682A (en) 2023-06-16

Family

ID=86723259

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111522694.1A Pending CN116264682A (en) 2021-12-13 2021-12-13 Equipment network access method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116264682A (en)

Similar Documents

Publication Publication Date Title
US10681545B2 (en) Mutual authentication between user equipment and an evolved packet core
US9705883B2 (en) Communications terminal and system and rights management method
US9763094B2 (en) Methods, devices and systems for dynamic network access administration
US9553897B2 (en) Method and computer device for monitoring wireless network
JP4864094B2 (en) Communication control system
RU2546610C1 (en) Method of determining unsafe wireless access point
EP3122144B1 (en) Device and method for accessing wireless network
WO2018090830A1 (en) Method and apparatus allowing smart terminal device to access internet
US9009792B1 (en) Method and apparatus for automatically configuring a secure wireless connection
US9826399B2 (en) Facilitating wireless network access by using a ubiquitous SSID
KR20210116508A (en) Improved handling of unique identifiers for stations
US10470102B2 (en) MAC address-bound WLAN password
US20170238236A1 (en) Mac address-bound wlan password
CN112291787B (en) Network connection method, device and system
JP2014509468A (en) Method and system for out-of-band delivery of wireless network credentials
US20210385728A1 (en) Protected pre-association device identification
WO2013185709A1 (en) Call authentication method, device, and system
US20220053334A1 (en) Using a network requirements field to provide a station access to a network
US11171927B2 (en) Method for enabling establishment of a direct connection
CN116264682A (en) Equipment network access method and device, electronic equipment and storage medium
JP2018097821A (en) Control device and communication control method
US20210385729A1 (en) Unsolicited handling of unique identifier for stations
JP7276960B2 (en) Relay device, relay method and relay program
US20240080667A1 (en) Method and device for securely connecting to a local area network
WO2023076072A1 (en) Using a network requirements field to provide a station access to a network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination