CN116546523A - Network configuration method, system and storage medium - Google Patents

Network configuration method, system and storage medium Download PDF

Info

Publication number
CN116546523A
CN116546523A CN202310518992.6A CN202310518992A CN116546523A CN 116546523 A CN116546523 A CN 116546523A CN 202310518992 A CN202310518992 A CN 202310518992A CN 116546523 A CN116546523 A CN 116546523A
Authority
CN
China
Prior art keywords
network configuration
equipment
configuration information
target network
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310518992.6A
Other languages
Chinese (zh)
Inventor
李训辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Kaihong Digital Industry Development Co Ltd
Original Assignee
Shenzhen Kaihong Digital Industry Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Kaihong Digital Industry Development Co Ltd filed Critical Shenzhen Kaihong Digital Industry Development Co Ltd
Priority to CN202310518992.6A priority Critical patent/CN116546523A/en
Publication of CN116546523A publication Critical patent/CN116546523A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0889Techniques to speed-up the configuration process
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Abstract

The embodiment of the application relates to the technical field of wireless communication, and particularly provides a network configuration method, a system and a storage medium. The method comprises the following steps: the method comprises the steps that a main configuration device obtains network configuration information of the main configuration device, encrypts the network configuration information by means of a preset encryption strategy, and obtains first target network configuration information; the master equipment sends the first target network configuration information to the equipment to be matched; after receiving the first target network configuration information, the matched equipment decrypts the first target network configuration information according to preset certificate information to obtain second target network configuration information; after the configured device obtains the second target network configuration information, communication connection is established with the routing device according to the second target network configuration information, so that the configured device can access an external network through the routing device, and further, a user can enable the configured device to obtain the network configuration information and connect to the routing device under the condition that the user does not operate the main configuration device.

Description

Network configuration method, system and storage medium
Technical Field
The present disclosure relates to the field of wireless communications technologies, and in particular, to a network configuration method, a system, and a storage medium.
Background
With the development of internet of things, many intelligent devices are also equipped with a wired or wireless network card, and the network can be accessed in a wired or wireless manner, and the access of the network usually has some limitations, and network information needs to be configured for the intelligent devices before the access.
In the prior art, the mode of acquiring network configuration information needs to be in the same network segment with different devices, for example, when different devices are in the same wifi scene, the device needs to sense that the wifi password has the problem of information transmission across devices in the process of acquiring the password, at this time, if the password plaintext transmission has leakage risk, and the command of issuing the password transmission to the device needs to be manually operated, so that the operation burden of a user is caused, and the method is not convenient.
Disclosure of Invention
The main purpose of the embodiments of the present application is to provide a network configuration method, which aims to reduce the operation burden in the use process of a user and improve the convenience of network configuration.
In a first aspect, an embodiment of the present application provides a network configuration method, which is applied to a communication system, where the communication system includes a master device, a routing device, and a matched device, and the method includes:
when the master equipment detects a communication triggering operation, responding to the communication triggering operation and sending a communication connection request to the routing equipment so that the routing equipment responds to the communication connection request and establishes communication connection with the master equipment;
after the communication connection is established between the routing equipment and the main configuration equipment, the main configuration equipment acquires own network configuration information, encrypts the network configuration information by utilizing a preset encryption strategy to acquire first target network configuration information, and stores the first target network configuration information;
when the master equipment detects that the matched equipment enters the communication coverage range of the master equipment, the master equipment sends the first target network configuration information to the matched equipment;
after receiving the first target network configuration information, the configured device decrypts the first target network configuration information according to preset certificate information to obtain second target network configuration information, wherein the second target network configuration information is generated after the first target network configuration information is successfully decrypted according to the certificate information;
and after the matched equipment obtains the second target network configuration information, establishing communication connection with the routing equipment according to the second target network configuration information so that the matched equipment can access an external network through the routing equipment.
In a second aspect, an embodiment of the present application further provides a communication system, where the communication system includes a master device, a routing device, and a matched device;
when the master equipment detects a communication triggering operation, responding to the communication triggering operation and sending a communication connection request to the routing equipment so that the routing equipment responds to the communication connection request and establishes communication connection with the master equipment;
after the communication connection is established between the routing equipment and the main configuration equipment, the main configuration equipment acquires own network configuration information, encrypts the network configuration information by utilizing a preset encryption strategy to acquire first target network configuration information, and stores the first target network configuration information;
when the master equipment detects that the matched equipment enters the communication coverage range of the master equipment, the master equipment sends the first target network configuration information to the matched equipment;
the configured device is configured to decrypt the first target network configuration information according to preset certificate information after receiving the first target network configuration information, so as to obtain second target network configuration information, where the second target network configuration information is generated after the first target network configuration information is successfully decrypted according to the certificate information;
and after the configured device obtains the second target network configuration information, establishing communication connection with the routing device according to the second target network configuration information, so that the configured device can access an external network through the routing device.
In a third aspect, embodiments of the present application further provide a storage medium for computer readable storage, where the storage medium stores one or more programs, and the one or more programs are executable by one or more processors to implement the steps of the network configuration method as provided in any one of the present application specifications.
The embodiment of the application provides a network configuration method, a system and a storage medium, wherein the network configuration method comprises the steps that a main configuration device and a routing device are in communication connection, so that the main configuration device obtains network configuration information corresponding to the routing device, the network configuration information is stored in the main configuration device, the network configuration information is encrypted by a preset encryption strategy, first target network configuration information is obtained, and the first target network configuration information is stored; when the master equipment detects that the equipment to be matched enters the communication coverage range of the master equipment, the master equipment sends first target network configuration information to the equipment to be matched; after receiving the first target network configuration information, the matched equipment decrypts the first target network configuration information according to preset certificate information to obtain second target network configuration information; after the configured device obtains the second target network configuration information, the configured device establishes communication connection with the routing device according to the second target network configuration information, so that the configured device can access the external network through the routing device. Therefore, the main configuration equipment can be utilized to send the first target network configuration information to the matched equipment, so that the matched equipment obtains the second target network configuration information according to the first target network configuration information and establishes communication connection with the routing equipment according to the second target network configuration information, the problem of operation burden of a user is reduced, convenience of network configuration is effectively improved, and further efficiency of network configuration is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a block diagram of a communication system according to an embodiment of the present application;
fig. 2 is a flowchart of steps of a network configuration method according to an embodiment of the present application;
FIG. 3 is a schematic block diagram of a public key of a master device 10 storing multiple sets of types of provisioned devices 20;
FIG. 4 is a flowchart corresponding to one embodiment of step S2 in FIG. 2;
fig. 5 is a flowchart corresponding to one embodiment of step S3 in fig. 2.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The flow diagrams depicted in the figures are merely illustrative and not necessarily all of the elements and operations/steps are included or performed in the order described. For example, some operations/steps may be further divided, combined, or partially combined, so that the order of actual execution may be changed according to actual situations.
It is to be understood that the terminology used in the description of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
The embodiment of the application provides a network configuration method, a system and a storage medium, wherein the network configuration method comprises the steps that a main configuration device and a routing device are in communication connection, so that the main configuration device obtains network configuration information corresponding to the routing device, the network configuration information is stored in the main configuration device, the network configuration information is encrypted by a preset encryption strategy, first target network configuration information is obtained, and the first target network configuration information is stored; when the master equipment detects that the equipment to be matched enters the communication coverage range of the master equipment, the master equipment sends first target network configuration information to the equipment to be matched; after receiving the first target network configuration information, the matched equipment decrypts the first target network configuration information according to preset certificate information to obtain second target network configuration information; after the configured device obtains the second target network configuration information, the configured device establishes communication connection with the routing device according to the second target network configuration information, so that the configured device can access the external network through the routing device. Therefore, the main configuration equipment can be utilized to send the first target network configuration information to the matched equipment, so that the matched equipment obtains the second target network configuration information according to the first target network configuration information and establishes communication connection with the routing equipment according to the second target network configuration information, the problem of operation burden of a user is reduced, convenience of network configuration is effectively improved, and further efficiency of network configuration is improved.
Some embodiments of the present application are described in detail below with reference to the accompanying drawings. The following embodiments and features of the embodiments may be combined with each other without conflict.
Referring to fig. 1, fig. 1 is a block diagram of a communication system according to an embodiment of the present application.
As shown in fig. 1, a communication system 100 provided by the present invention includes a master device 10, a slave device 20, and a routing device 30. The host device 10 may be a mobile terminal including, but not limited to, a cell phone, tablet, notebook, smart wearable device, or the like. The provisioned device 20 may be a smart device including, but not limited to, a smart television, a smart speaker, a smart camera, etc. The matched device 20 accesses a network through the routing device 30, and needs to provide a wireless network name and a password, where the wireless network name is an identity for identifying an access point in the routing device 30, and may include, but is not limited to, a WiFi SSID, a WiFi password, a WiFi encryption mode, a network IP acquisition mode, a network static IP address, a DNS server address, and the like. The WiFi SSID and WiFi password are used by the provisioned device 20 to connect with the routing device 30 in the network configuration information that the master device 10 transmits to the provisioned device 20.
For example, when the matched device 20 needs to be connected to the Internet, when the matched device 20 is detected in the communication coverage area of the main matched device 10, the main matched device 10 actively transmits first target network configuration information to the matched device 20, the matched device 20 decrypts the first target network configuration information according to preset certificate information, and after the decryption is successful, second target network configuration information can be obtained, so that the matched device 20 accesses the routing device 30 according to the second target network configuration information to perform network access through the routing device 30; when the decryption fails, it indicates that the device 20 is not the target device type of the master device 10, and further the device 20 cannot obtain the second target network configuration information after the decryption is successful from the first target network configuration information.
Referring to fig. 2, fig. 2 is a network configuration method provided in an embodiment of the present application.
As shown in fig. 2, the network configuration method is applied to the aforementioned communication system 100, and the network configuration method includes steps S1 to S5.
Step S1: when the master device 10 detects the communication trigger operation, a communication connection request is transmitted to the routing device 30 in response to the communication trigger operation, so that the routing device 30 establishes a communication connection with the master device 10 in response to the communication connection request.
For example, when the master device 10 connects to the router device 30 for the first time, a communication trigger operation needs to be detected, where the communication trigger operation carries a wireless network name and a password of the router 30, so that after the master device 10 detects the communication trigger operation, the wireless network name and the password of the router 30 are obtained by responding to the analysis of the communication trigger operation, and then a communication connection is established with the router device 30 according to the wireless network name and the password of the router 30.
Optionally, the wireless network name is an identity for identifying an access point in the routing device 30, and may include, but is not limited to, a WiFi SSID, a WiFi password, a WiFi encryption mode, a network IP acquisition mode, a network static IP address, a DNS server address, and the like.
For example, the display screen of the master device 10 displays the to-be-selected routing device that the master device 10 can connect at this time, so that the user selects the target routing device from the to-be-selected routing devices by operating in the display screen of the master device 10, inputs the password corresponding to the target routing device, clicks the confirm button to generate the communication triggering operation, and then the master device 10 detects the communication triggering operation, and sends the communication connection request to the target routing device in response to the communication triggering operation, so that the target routing device establishes communication connection with the master device 10 in response to the communication connection request.
Step S2: after the routing device 30 and the master device 10 establish communication connection, the master device 10 obtains its own network configuration information, encrypts the network configuration information by using a preset encryption policy, obtains first target network configuration information, and stores the first target network configuration information.
Illustratively, after the master device 10 establishes a communication connection with the routing device 30, it indicates that the master device 10 accurately obtains the network configuration information of the routing device 30, and therefore, the master device 10 encrypts the network configuration information corresponding to the routing device 30 with the public key of the matched device 20 to obtain the first target network configuration information, and stores the first target network configuration information.
Optionally, the preset encryption policy may include multiple sets of public keys of the configured devices 20, so as to obtain multiple sets of encryption results, and the multiple sets of encryption results together form the first target configuration information.
For example, the master device 10 stores a public key a of the slave device 20, and the master device 10 encrypts the network configuration information of the router device 30 by using the public key a to obtain the first target network configuration information.
Alternatively, as shown in fig. 3, the master device 10 stores A, B, C public keys of multiple groups of matched devices 20, and the master device 10 encrypts the network configuration information of the routing device 30 by using the public key a, the public key B, and the public key C to obtain A1, B1, and C1, and then forms the first target network configuration information together by the A1, B1, and C1.
Referring to fig. 4, in some embodiments, the master device 10 obtains its own network configuration information, encrypts the network configuration information with a preset encryption policy to obtain first target network configuration information, and step S2 includes steps S21 to S22.
Step S21: when receiving the key setting instruction, the master equipment 10 responds to the key setting instruction to obtain the key information adopted in encryption, and stores the key information into a key database;
step S22: the master device 10 encrypts the network configuration information according to the key information, thereby obtaining first target network configuration information.
Illustratively, the master device 10 responds according to the received key setting instruction to obtain public key information adopted when encrypting the network configuration information, and stores the public key information in a key database, and when the master device 10 receives the network configuration information of the routing device 30, the public key information in the key database is used for encryption to obtain the first target network configuration information.
For example, after the master device 10 obtains the network configuration information of the routing device 30, the network configuration information is encrypted according to the public key information in the key database, so as to obtain the first target network configuration information. If the master device 10 receives the key setting instruction at this time, the key information is updated to the key database in response to the key setting instruction, where the key setting instruction may include adding, deleting, and modifying the key information; and the master equipment re-encrypts the network configuration information according to the updated key database information, so as to obtain updated first target network configuration information.
For example, before the master device 10 receives the key setting instruction, the public key a and the public key B are stored in the key database. Thus, the first target network configuration information obtained at this time is obtained by combining the public key a and the public key B after being encrypted respectively. If the key setting instruction includes deleting the public key a and adding the public key C, after the master device 10 receives the key setting instruction, the public key C and the public key B are stored in the key database, so after the key database is updated, the first target network configuration information is updated again, and updated first target network configuration information corresponding to the updated key database is obtained.
Optionally, when the master device 10 includes multiple sets of first target network configuration information, all the multiple sets of first target network configuration information are updated.
In some embodiments, the key database is provided at the master device 10 or at a cloud server communicatively connected to the master device 10.
The key database may be disposed in a memory card carried by the master device 10, or may be stored in a cloud server communicatively connected to the master device 10.
In step S3, when the master device 10 detects that the slave device 20 enters the communication coverage area of the master device 10, the master device 10 sends the first target network configuration information to the slave device 20.
Illustratively, the bluetooth of the master device 10 and the slave device 20 are both in an on state, and the master device 10 transmits the first target network configuration information to the slave device 20 when the slave device 20 is present within the bluetooth communication range of the master device 10.
Referring to fig. 5, in some embodiments, when the master device 10 detects that the provisioned device 20 is within the communication coverage area of the master device 10, the master device 10 transmits first target network configuration information to the provisioned device 20, and step S3 includes steps S31 to S32.
Step S31: the configured device 20 sends a network configuration request to the master device 10, and the master device detects the network configuration request sent by the configured device 20;
step S32: when the master device 10 receives the network configuration request, the master device 10 transmits the first target network configuration information to the provisioned device 20.
For example, to reduce the workload of the master device 10, the master device 10 may not need to verify and agree with the request of the slave device 20 after receiving the network configuration request sent by the slave device 20, but only need to send the first target network configuration information to the slave device 20 when judging that the network configuration request is sent by the slave device 20, so that after reducing the workload of the master device 10, the user operation is saved.
Step S4, after receiving the first target network configuration information, the configured device 20 decrypts the first target network configuration information according to the preset certificate information to obtain second target network configuration information, where the second target network configuration information is generated after the first target network configuration information is successfully decrypted according to the certificate information.
Illustratively, the preset certificate information stores a decryption password corresponding to the first target network configuration information when the first target network configuration information is encrypted, so that the configured device 20 can obtain the decryption password from the preset certificate information, and further decrypt the first target network configuration information by using the decryption password, and further obtain the second target network configuration information.
In some embodiments, decrypting the first target network configuration information according to preset certificate information to obtain second target network configuration information includes: the matched equipment 20 obtains private key information corresponding to the matched equipment 20 according to preset certificate information; the configured device 20 decrypts the first target network configuration information according to the private key information, thereby obtaining second target network configuration information.
Illustratively, after receiving the first target network configuration information sent by the master device 10, the configured device 20 obtains the certificate information carried by itself, obtains the private key of itself from the certificate information, decrypts the first target network configuration information by using the private key, and when the private key of the configured device 20 is consistent with the public key when the first target network configuration information is obtained by encrypting, the configured device 20 can correctly decrypt the first target network configuration information by using the private key carried by itself, so as to obtain the second target network configuration information.
For example, if the public key E and the private key F are corresponding key pairs, and the first target network configuration information is obtained by encrypting the public key E, if the private key of the configured device 20 is F, the configured device 20 may correctly decrypt the first target network configuration information to obtain the second target network configuration information.
In some embodiments, the preset credential information includes: the matched device 20 burns the private key information into the certificate information through the upper computer, so that the matched device 20 decrypts through the private key information.
Illustratively, before the matched device 20 leaves the factory, the private key information of the matched device 20 is burned by using the upper computer and stored in the certificate information, so that when the information needs to be sent to the matched device 20, the public key corresponding to the matched device 20 can be used for encryption, so that the matched device 20 can decrypt through the private key information of the matched device, and the safety of information transmission is ensured.
Step S5, after obtaining the second target network configuration information, the configured device 20 establishes a communication connection with the routing device 30 according to the second target network configuration information, so that the configured device 20 may access the external network through the routing device 30.
Illustratively, the provisioned device 20, after obtaining the second target network configuration information, includes therein the wireless network name and password required to connect to the router 30. Accordingly, the provisioned device 20 may be connected to the router 30 by a wireless network name and password so that the provisioned device 20 may access an external network through the routing device 30.
Optionally, the wireless network name is an identity for identifying an access point in the routing device 30, and may include, but is not limited to, a WiFi SSID, a WiFi password, a WiFi encryption mode, a network IP acquisition mode, a network static IP address, a DNS server address, and the like.
In some embodiments, the method further comprises: when the configured device 20 fails to decrypt the first target network configuration information according to the certificate information, the configured device 20 displays an information prompt on the display interface.
For example, when the private key information carried in the configured device 20 is inconsistent with the public key information when the first target network configuration information is encrypted, the configured device 20 may fail to decrypt the first target network configuration information, and at this time, an information prompt may be displayed on the display interface of the configured device 20, so as to inform the user that the network configuration information of the connection routing device 30 cannot be acquired through the master configuration device 10.
In some embodiments, after the provisioned device displays the information prompt on the display interface, the method further comprises: the matched equipment 20 sends feedback information to the main equipment 10 according to the information prompt; after receiving the feedback information, the master device 10 obtains the reason of the decryption failure of the device 20 according to the feedback information, and when the reason of the decryption failure matches with the preset reason, the master device records and stores the identification information of the device and the decryption failure frequency.
Illustratively, the device 20 sends feedback information to the device 10, and after receiving the feedback information, the device 10 obtains the reason for the failure of the device 20 according to the feedback information, and when the reason for the failure of the device 20 is that the private key is not matched, the device 10 records the identification information of the device 20 and the frequency of the failure.
For example, the reasons for failure of the devices in the master device 10 include: the reason 1 is that the private key is wrong; the reason 2 is version error; the reason 3 is other errors, if the reason that the main equipment 10 fails to obtain the equipment 20 to be matched is the reason 1 after receiving the feedback information, the identification information of the equipment 20 to be matched and the decryption failure frequency are recorded; when the master device 10 receives the decryption failure cause of the matched device 20 again for the reason 1, the decryption failure frequency corresponding to the identification information of the matched device 20 is increased by 1.
In some embodiments, the method further comprises: when the master device 10 detects that the decryption failure frequency of the matched device 20 exceeds the preset times, the identification information corresponding to the matched device is stored in the communication blacklist, wherein when the matched device located in the communication blacklist enters the communication coverage range of the master device again, the master device 10 refuses to send the first target network configuration information to the matched device 20.
Illustratively, when the master device 10 detects that the decryption failure frequency of the slave device 20 exceeds the preset number of times, the identification information corresponding to the slave device 20 is placed in the blacklist set by the master device 10, so that the master device 10 can directly reject or ignore the network communication request even when the slave device 20 sends the network communication request to the master device 10 when the slave device 10 is within the communication coverage range of the master device 10, thereby reducing the malicious interference of the slave device 20 and also reducing the workload of the master device 10.
Referring to fig. 1, the embodiment of the present application further provides a communication system 100, where the communication system 100 includes a master device 10, a slave device 20, and a routing device 30.
When the master device 10 detects a communication trigger operation, the communication trigger operation is responded to send a communication connection request to the routing device 30, so that the routing device 30 responds to the communication connection request to establish communication connection with the master device 10;
after the routing device 30 and the master device 10 establish communication connection, the master device 10 obtains its own network configuration information, encrypts the network configuration information by using a preset encryption policy to obtain first target network configuration information, and stores the first target network configuration information;
when the master device 10 detects that the matched device 20 enters the communication coverage range of the master device 10, the master device 10 sends first target network configuration information to the matched device 20;
the configured device 20 is configured to decrypt the first target network configuration information according to preset certificate information after receiving the first target network configuration information, to obtain second target network configuration information, where the second target network configuration information is generated after the first target network configuration information is successfully decrypted according to the certificate information;
and the matched device 20 establishes communication connection with the routing device 30 according to the second target network configuration information after obtaining the second target network configuration information, so that the matched device 20 can access the external network through the routing device 30.
In some embodiments, further comprising:
and when the configured device 20 fails to decrypt the first target network configuration information according to the certificate information, the configured device 20 displays an information prompt on a display interface.
In some embodiments, after the matched device 20 displays the information prompt on the display interface, the method further comprises:
the matched equipment 20 sends feedback information to the main matched equipment 10 according to the information prompt;
after receiving the feedback information, the master device 10 obtains the reason for the decryption failure of the device 20 according to the feedback information, and when the reason for the decryption failure matches with a preset reason, the master device 10 records and stores the identification information of the device 20 and the decryption failure frequency.
In some embodiments, further comprising:
when the master device 10 detects that the decryption failure frequency of the matched device 20 exceeds the preset frequency, the identification information corresponding to the matched device 20 is stored in a communication blacklist, wherein when the matched device 20 in the communication blacklist enters the communication coverage range of the master device 10 again, the master device 10 refuses to send the first target network configuration information to the matched device 20.
In some embodiments, the master device 10 obtains its own network configuration information, encrypts the network configuration information with a preset encryption policy, and obtains first target network configuration information, including:
when the master equipment 10 receives a key setting instruction, key information adopted in encryption is obtained in response to the key setting instruction, and the key information is stored in a key database;
the master device 10 encrypts the network configuration information according to the key information, so as to obtain first target network configuration information.
In some embodiments, the key database is disposed on the master device, or on a cloud server communicatively coupled to the master device.
In some embodiments, when the master device 10 detects that the provisioned device 20 is within the communication coverage area of the master device 10, the master device 10 sends the first target network configuration information to the provisioned device 20, including:
the configured device 20 sends a network configuration request to the master device 10, and the master device 10 detects the network configuration request sent by the configured device 20;
after the master device 10 receives the network configuration request, the master device 10 sends the first target network configuration information to the matched device 20.
In some embodiments, decrypting the first target network configuration information according to preset certificate information to obtain second target network configuration information includes:
the matched equipment 20 obtains private key information corresponding to the matched equipment 20 according to preset certificate information;
the configured device 20 decrypts the first target network configuration information according to the private key information, thereby obtaining the second target network configuration information.
In some embodiments, the preset credential information includes:
the device 20 to be matched burns the private key information into the certificate information through the upper computer, so that the device 20 to be matched decrypts through the private key information.
It should be noted that, for convenience and brevity of description, the specific operation of the communication system 100 described above may refer to the corresponding process in the foregoing network configuration method embodiment, which is not described herein.
The embodiments of the present application also provide a storage medium for computer readable storage, where the storage medium stores one or more programs, and the one or more programs are executable by one or more processors to implement the steps of any of the network configuration methods as provided in the embodiments of the present application.
It may be understood that the storage medium may be one or more, and may be disposed in at least one of the master device 10, the slave device 20, and the routing device 30, or may be independently disposed, so long as each device may be controlled to cooperate with each other to complete the preset operation.
The storage medium may be an internal storage unit of the device of the foregoing embodiment, for example, a memory of the master device. The storage medium may also be an external storage device of the host device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the host device.
Those of ordinary skill in the art will appreciate that all or some of the steps of the methods, functional modules/units in the apparatus disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware embodiment, the division between the functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed cooperatively by several physical components. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
It should be understood that the term "and/or" as used in this specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations. It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present application are merely for describing, and do not represent advantages or disadvantages of the embodiments. The foregoing is merely illustrative of the embodiments of the present application, but the scope of the present application is not limited thereto, and any equivalent modifications or substitutions will be apparent to those skilled in the art within the scope of the present application, and these modifications or substitutions are intended to be included in the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (11)

1. A network configuration method applied to a communication system, the communication system including a master device, a routing device, and a slave device, the method comprising:
when the master equipment detects a communication triggering operation, responding to the communication triggering operation and sending a communication connection request to the routing equipment so that the routing equipment responds to the communication connection request and establishes communication connection with the master equipment;
after the communication connection is established between the routing equipment and the main configuration equipment, the main configuration equipment acquires own network configuration information, encrypts the network configuration information by utilizing a preset encryption strategy to acquire first target network configuration information, and stores the first target network configuration information;
when the master equipment detects that the matched equipment enters the communication coverage range of the master equipment, the master equipment sends the first target network configuration information to the matched equipment;
after receiving the first target network configuration information, the configured device decrypts the first target network configuration information according to preset certificate information to obtain second target network configuration information, wherein the second target network configuration information is generated after the first target network configuration information is successfully decrypted according to the certificate information;
and after the matched equipment obtains the second target network configuration information, establishing communication connection with the routing equipment according to the second target network configuration information so that the matched equipment can access an external network through the routing equipment.
2. The method as recited in claim 1, wherein the method further comprises:
and when the configured equipment fails to decrypt the first target network configuration information according to the certificate information, the configured equipment displays an information prompt on a display interface.
3. The method of claim 2, wherein after the provisioned device displays an information prompt on a display interface, the method further comprises:
the matched equipment sends feedback information to the main equipment according to the information prompt;
after receiving the feedback information, the master equipment obtains the reason of decryption failure of the equipment to be matched according to the feedback information, and when the reason of decryption failure is matched with a preset reason, the master equipment records and stores the identification information of the equipment to be matched and the decryption failure frequency.
4. A method as claimed in claim 3, further comprising:
when the master equipment detects that the decryption failure frequency of the matched equipment exceeds the preset times, the identification information corresponding to the matched equipment is stored into a communication blacklist, wherein when the matched equipment positioned in the communication blacklist enters the communication coverage range of the master equipment again, the master equipment refuses to send the first target network configuration information to the matched equipment.
5. The method according to claim 1, wherein the master device obtains its own network configuration information, encrypts the network configuration information using a preset encryption policy, and obtains first target network configuration information, including:
when the master equipment receives a key setting instruction, key information adopted in encryption is obtained in response to the key setting instruction, and the key information is stored in a key database;
and the master equipment encrypts the network configuration information according to the key information so as to obtain first target network configuration information.
6. The method of claim 5, wherein the key database is disposed on the master device or on a cloud server communicatively coupled to the master device.
7. The method according to claim 1, wherein when the master device detects that the slave device enters the communication coverage area of the master device, the master device sends the first target network configuration information to the slave device, including:
the configured equipment sends a network configuration request to the main configuration equipment, and the main configuration equipment detects the network configuration request sent by the configured equipment;
and after the master equipment receives the network configuration request, the master equipment sends the first target network configuration information to the matched equipment.
8. The method of claim 1, wherein decrypting the first target network configuration information based on the preset certificate information to obtain second target network configuration information, comprises:
the matched equipment obtains private key information corresponding to the matched equipment according to preset certificate information;
and the matched equipment decrypts the first target network configuration information according to the private key information, so as to obtain the second target network configuration information.
9. The method of claim 8, wherein the preset credential information comprises:
and the matched equipment burns the private key information into the certificate information through the upper computer so that the matched equipment decrypts through the private key information.
10. A communication system, comprising a master device, a routing device, and a slave device;
when the master equipment detects a communication triggering operation, responding to the communication triggering operation and sending a communication connection request to the routing equipment so that the routing equipment responds to the communication connection request and establishes communication connection with the master equipment;
after the communication connection is established between the routing equipment and the main configuration equipment, the main configuration equipment acquires own network configuration information, encrypts the network configuration information by utilizing a preset encryption strategy to acquire first target network configuration information, and stores the first target network configuration information;
when the master equipment detects that the matched equipment enters the communication coverage range of the master equipment, the master equipment sends the first target network configuration information to the matched equipment;
the configured device is configured to decrypt the first target network configuration information according to preset certificate information after receiving the first target network configuration information, so as to obtain second target network configuration information, where the second target network configuration information is generated after the first target network configuration information is successfully decrypted according to the certificate information;
and after the configured device obtains the second target network configuration information, establishing communication connection with the routing device according to the second target network configuration information, so that the configured device can access an external network through the routing device.
11. A computer-readable storage medium, which when executed by one or more processors causes the one or more processors to perform the steps of the network configuration method of any one of claims 1 to 9.
CN202310518992.6A 2023-05-09 2023-05-09 Network configuration method, system and storage medium Pending CN116546523A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310518992.6A CN116546523A (en) 2023-05-09 2023-05-09 Network configuration method, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310518992.6A CN116546523A (en) 2023-05-09 2023-05-09 Network configuration method, system and storage medium

Publications (1)

Publication Number Publication Date
CN116546523A true CN116546523A (en) 2023-08-04

Family

ID=87451908

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310518992.6A Pending CN116546523A (en) 2023-05-09 2023-05-09 Network configuration method, system and storage medium

Country Status (1)

Country Link
CN (1) CN116546523A (en)

Similar Documents

Publication Publication Date Title
US11616775B2 (en) Network access authentication method, apparatus, and system
CN108768970B (en) Binding method of intelligent equipment, identity authentication platform and storage medium
US8099761B2 (en) Protocol for device to station association
RU2636679C2 (en) Communication control device, authentication device, central control device and communication system
CN109525989B (en) Data processing and identity authentication method and system, and terminal
US20120252405A1 (en) Connecting mobile devices, internet-connected hosts, and cloud services
US20100043056A1 (en) Portable device association
CN113055867A (en) Method and device for auxiliary network distribution of terminal and electronic equipment
US9967099B2 (en) Method and apparatus for providing information
US20160006762A1 (en) Method for creating a profile in a security domain of a secured element
JP2014509814A (en) Connection of mobile devices, internet connection means and cloud services
JP2014524073A (en) Service access authentication method and system
US20230344626A1 (en) Network connection management method and apparatus, readable medium, program product, and electronic device
US20170238236A1 (en) Mac address-bound wlan password
CN111726801B (en) Network security control method
CN111901303A (en) Device authentication method and apparatus, storage medium, and electronic apparatus
CN111405016A (en) User information acquisition method and related equipment
CN112512048B (en) Mobile network access system, method, storage medium and electronic device
US10671717B2 (en) Communication device, communication method and computer program
US20220295281A1 (en) System, module, circuitry and method
CN106878989B (en) Access control method and device
CN116546523A (en) Network configuration method, system and storage medium
CN112118210B (en) Authentication key configuration method, device, system and storage medium
JP2023509806A (en) MOBILE NETWORK ACCESS SYSTEM, METHOD, STORAGE MEDIUM AND ELECTRONIC DEVICE
CN110493785B (en) Login method of mobile client, SIM card and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination