M360392 ,五、新型說明: 【新型所屬之技術領域】 本創作係有關-種網路通訊裝置,特別是關於—種免輸人網路設定參 數之網路通訊裝置。 【先前技術】 ,網際網路的發展日益普及,掀起了新一波的產業革命風潮 ,而網際網 路不但可傳遞文字資料,舉凡多媒體資訊、視訊會議、遠距離教學、及各 籲種郵購業務等在網際網路架構下皆可極易實行。因此,許多重要的資料皆 是透過電腦及網路來達到快速傳遞之目的。 但疋要安裝-般的網路農置並非容易之事,尤其網際網路現在更包含 了有線網路與無線醜’為了配合無義路,網路裝置的安餘序比起有 線網路更加麻煩’另外網路裝置還有必須配合有線、無線網路的其他硬體, 也有複雜的相關設定。 以網路攝影機為例’絲者必須知道各項網路組態的相關參數,如網 _路魏方式、紐連_轉蚊削碼(SSID) /延伸服務奴識別碼 (ESSID)有線等效力〇後、(呢p)密鑰,並在作業系統中網路設定的搁位, 將上述參數--填入。然而,對於一般不太懂電腦網路的使用者而言,要 瞭解上述參數並加以設定其實不是件容易的事。另外,若在遠端之使用者 電腦處設有防火麟,則欲與網路攝影機轉連線也更加不容易。 有鍛於此,本創作遂針對上述習知技術之缺失,提出一種免輸入網路 設定參數之網路通訊裝置,以有效克服上述之該等問題。 【新型内容】 M360392 要目的’在於提供-翻路通絲置,錢湘-存有網 裝置之執行程式的隨轉轉置替此網路裝置在_細上自動執行所有 、、’ 數又疋以免除使用者必須手動輸入各項複雜的網路設定參數, 並達到簡易絲設定果,且隨身存取裝置與_裝聽彼此綑綁 的序號而X互敎,以麵使用者在網路上傳朗資訊不會鶴取破譯, 進而提高網路之安全性。 另目的,在於&供一種網路通訊裝置,其隨身存取裝置裝 設於-電腦上時’可利用簡單穿越網路位址轉換器之用戶資料報協定 (STUN ’ Si_eTraversalGfUDp_NAT)的方式與網路妓連線,並使 其提供使用者服務,如此便可不受到防火腾的阻礙。 為逹上述目的,本創作提供—種網路通訊裝置,包含至少—設有一第 -序號之轉裝置與—至少隨身存取裝置,此隨身存取裝置設有與第一序 號+應之帛一序號,並存有一執行程式,當隨身存取裝置裝設於一使用 者電腦上時,制者電腦係自動執行此執行程式,並透過第_、第二序號 與網路裝置連線,以提供—組網路設定參數給網路裝置。之後隨身存取裝 置裝設於另-使用者電腦上時,此電腦更可利用·的方式,並透過第一、 第二序號與娜奴參數取得轉裝㈣崎職財(IP, Inte贈 ΡΙΌ⑽D紐,贿網路裝«錢絲道,麟雜贿財服務。 嫌貴審查委員對本創作之結構特徵及所達成之功效更有進一步 之瞭解與賴,紐峨叙魏觸及配合翻之_,說明 【實施方式】 < · 且其分别於出廠時即 本創作主要包含-隨身存取裝置與—網路裝置, M360392 互相綑綁蚊有第-序號與第二序號,換言之,隨身存取裝置與網路裝置 由於序號而交互鎖定,以確保使用者在網路上傳遞的資訊不會被竊取破 譯’進而綠敎娜。增她__脑在不需通過 通訊協定賴_前提τ,彼鱗錢線,另相職置_一初始 識別碼,以作為無線設定之服務設定識別石馬⑽_剛。以下為了說 明本實施例,因此隨身存取裝置係以随息 心仔取展直制隨身碟為例,網路裝置係以網路攝影 機為例。 • 首先請參閱第1圖,本創作之隨身碟1〇具有通用串列匯流排_ 介面,並設有-執行檔案區12、一設定參數樓案區14、一儲存區μ與一 擴充界面17。其巾錄行齡區12係存有—絲網賴職π之執行程 式,奴參數檔龍14 __存欲奴之鴨蚊參數,齡區Μ係 用來儲存使用者其他檔案,擴充界面17可用來裝設各種介面卡,如無線網 路介面卡。 明同時參閲第1圖至第2圖,本實施例之第—使用者電腦2G與網路攝 籲影機IS係處於同-個無線區域網路中,本創作於首次使用時,可將隨身碟 10藉USB介_設於第—使用者電腦2〇上。接下來由於網路攝影機財 -自行網路偵測下發現自己所存的並無現在環境_«訊,所以此時本創 作先執行安裝模式,即第—使用者電腦20會自動尋找隨身碟Μ裡的執行 程气並開始執行之。在執行的過程中,網路攝影機係先透過初始識別 ^(Default SSID)與使用者電腦2〇連線,網路攝影機18的無線介面扮演 存取點(AP ’ Access point) 22的角色,使用者電腦2〇執行的安裝模式, 取得無線區網(M,Wireless L〇cal虹扮此她^之存取點Μ的相關 M360392 資訊後’透紗—網簡_ 18粒魏,除了儲存並將相 關資訊傳遞給網路攝影機,則網路攝影機18可儲存此相關資訊並藉此轉 取點2謙。減-贿統_細冑鳩则酬網路設定 參數’並達綱安_的效果。當此程式執行完成,即完成網路攝影 機㈣安裝模式後’此時若欲操控網路攝影機18,則可進行執行模式,即 直接讓第者電腦20操控網路攝频18提供使用者服務。 電腦上皆會進行此流程圖之 請參閱第1圖與第3圖,使用在任何一台M360392, V. New Description: [New Technology Field] This creation is related to a kind of network communication device, especially the network communication device for setting parameters of the input-free network. [Previous technology] The development of the Internet has become more and more popular, setting off a new wave of industrial revolution, and the Internet can not only transmit text information, but also multimedia information, video conferencing, distance learning, and various mail order business. It can be easily implemented under the Internet architecture. Therefore, many important materials are transmitted through computers and the Internet for fast delivery. However, it is not easy to install a network-like farm. In particular, the Internet now includes wired networks and wireless ugly. In order to cooperate with the unscrupulous road, the security of the network device is more than that of the wired network. Trouble' In addition to the network devices, there are other hardware that must be used in conjunction with wired and wireless networks, as well as complex related settings. Take a webcam as an example. 'The silker must know the relevant parameters of each network configuration, such as the net _ Lu Wei way, New Zealand _ repetitive mosquito repetitive code (SSID) / extended service slave identification code (ESSID) cable and other effects. After the 、, (呢 p) key, and the network set the shelf in the operating system, fill in the above parameters. However, for users who don't really understand the computer network, it is not easy to understand the above parameters and set them up. In addition, if there is a fire protection lining at the remote user's computer, it is even more difficult to connect to the network camera. In view of the lack of the above-mentioned prior art, the present invention proposes a network communication device that is free of input network setting parameters to effectively overcome the above problems. [New Content] The purpose of M360392 is to provide - turn-over wire, and Qian Xiang - the transfer of the execution program of the network device to automatically perform all the operations on the network device. In order to avoid the user having to manually input various complicated network setting parameters, and to achieve the simple silk setting effect, and the portable access device and the number of the binding device are bundled with each other, X is mutually exclusive, and the user is uploaded on the Internet. Information will not be translated, which will improve the security of the network. Another purpose is to provide a network communication device with a user access protocol (STUN 'Si_eTraversalGfUDp_NAT) that can easily traverse the network address converter when the portable access device is installed on the computer. The link is connected and provides user service so that it is not hindered by fire. For the above purposes, the present invention provides a network communication device including at least a first-numbered transfer device and at least a portable access device, and the portable access device is provided with a first serial number and a corresponding one. Serial number, and an executable program is provided. When the portable access device is installed on a user's computer, the maker computer automatically executes the execution program and connects to the network device through the first and second serial numbers to provide - The group network sets parameters to the network device. After the portable access device is installed on another user's computer, the computer can be used in the way, and through the first and second serial numbers and the Nanu parameter to get the reloading (4) Saki Shiki (IP, Inte gift (10)D New Zealand, bribery network installed «Qian Sidao, Lin mixed bribe service. The suspected review committee has a further understanding of the structural characteristics of the creation and the effects achieved, and New Zealand and Wei Wei touched and cooperated with it. [Embodiment] < · And at the time of shipment, the present invention mainly includes a portable access device and a network device, and the M360392 is mutually bundled with a first serial number and a second serial number. In other words, the portable access device and the network The road device is interlocked due to the serial number to ensure that the information transmitted by the user on the network will not be stolen and deciphered. Further, the green 敎 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ In addition, the initial identification code is used as a service setting for wireless setting to identify the stone horse (10)_gang. In order to explain the present embodiment, the portable access device is an example of a free-standing portable disk. Network installation Take the network camera as an example. • First, please refer to Figure 1. The pen drive 1 of this creation has a universal serial bus _ interface, and has an execution file area 12 and a set parameter building area. A storage area μ and an expansion interface 17. The towel recording age area 12 is stored in the system of the screen 赖 赖 π π, the slave parameter file 龙 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 To store other files of the user, the expansion interface 17 can be used to install various interface cards, such as a wireless network interface card. See also Figures 1 to 2, the user computer 2G and network of this embodiment The AV system of the camera is in the same wireless local area network. When this creation is used for the first time, the USB flash drive 10 can be set on the user computer 2 by USB. Next, due to the network camera - Self-network detection found that there is no current environment _«, so this creation first executes the installation mode, that is, the user computer 20 will automatically find the execution process in the flash drive and start executing. In the process of implementation, the network camera first passes the initial identification ^ ( The default SSID is connected to the user's computer 2, and the wireless interface of the network camera 18 acts as an access point 22, and the user computer 2 performs the installation mode to obtain the wireless area network (M, Wireless L〇cal Rainbow plays the relevant M360392 information of the access point of this ^'s access point ' '透透—网简_ _ 18 Wei, in addition to storing and transmitting relevant information to the webcam, the webcam 18 can store this Related information and use this to transfer points to 2 mode. The reduction-bribery system _ fine-tuning network to set the parameters 'and the effect of the gang _. When the program is completed, that is, after completing the network camera (four) installation mode' At this time, if the network camera 18 is to be operated, the execution mode can be performed, that is, the first computer 20 is directly controlled to operate the network camera 18 to provide user service. This flowchart will be performed on the computer. Please refer to Figure 1 and Figure 3, using it on any one.
流程。首先如步驟SH)所示,隨身碟1Q安裝至使用者電腦。接著如步驟犯 所示,個者電腦會觸隨身碟1G與網路攝频18是否連線,若是,則 如步驟S14所示’進行執行模式,使網路攝影機18提供使用者服務;若否, 則如步_戶标’進行安賴式,網路攝職18自練得網路設定參數 以安裝之。之後,_者《魏行執行模式,使·攝職18提供使 用者服務。町將以上述流财法為基礎,並翻實際裝置架構來說明整 個運作流程。 在本幻作於首-人女裝儿成後,若欲從另一遠端處操控網路攝影機μ, 使其提供使用者服務,係說明如下。請參閱第3圖與第4 ^,此時遠端處 的第二使用者電腦26與第―使用者電腦20係處於不同的區域網路,為了 避免受到防域的_,可纖身㈣·㈣介面插設於第二使用者電 ㈣中,此步驟即步驟sl〇。接著第二使用者電腦26便可利用簡單穿越網 (STUN , Simple Traversal ofUDP over NAT) 的方式’並透過第一序號與隨身碟l〇之安裝識別碼(SSID)形成的第一帳 號及第一序號與網路攝影機18之安裝識別碼形成的第二帳號取得網路攝 M360392 影機18的網際通訊協定(IP ’ Internet Pr〇t〇c〇1)位址以與網路攝影 機18建立通訊管道。接著如步驟S12所示,第二使用者電腦26判斷隨身 碟10與網路攝影機18是否連線,其結果發現已連線,此時如步驟犯所 示,使網路攝影機18提供使用者服務。 此種STUN的方式即姻—郵件伺縣,網路攝影機18依序透過存取 點22、路由器24、網際網路28傳送相關資訊至郵件鑛器中的第二帳號, 第二使用者電腦26則傳送相關資訊至郵件伺服器3()中的第—帳號,郵件 伺服器在接收後,網路攝影機18與第二使用者電腦26即可取得對方之斤 位址及相關資訊。 但若在翻欲雜攝細8, _路攝韻Μ此時卻已離開原本 的網路環境’或已解除安裝,抑或⑽機時,則隨身碟職 2 第二帳號與網路攝影機18進行連線。 '' ㈣—、 且在上述判斷網路攝影機18與隨身碟2〇是否連線之判斷步驟中,網 路攝影機18若已離開原本 18在自行__下,“6 把解除女«,由_路攝影機 魏自6所存的絲翻碼無法絲娜攝影機18 ::::重連線’所W如步驟⑽所㈣身碟1〇 ·第二 攝細。重新替網賴賴Μ齡絲赋,村_操控網路 路中電腦20與鱗攝職18雜糊—麵線區域網 線器心域網路㈣,則與網路攝影機18連線轉介就由华 線盗㈣)代替存取點22,且“就由集 線。 iaUlt SSiD即可與集線器連 M360392 綜上所述,本創作不但可免除使用者必須手動輸入各項複雜的網路設 定參數,達到簡易安裝設定的效果,且網路裝置與隨身存取裝置皆設有互 相對應之序號,讓兩裝置在傳遞資訊時,不容易被竊取,以提高網路之安 全性。 以上所述者,僅為本創作一較佳實施例而已,並非用來限定本創作實 、 施之範圍’故舉凡依本創作申請專利範圍所述之形狀、構造、特徵及精神 所為之均等變化與修飾,均應包括於本創作之申請專利範圍内。 _ 【圖式簡單說明】 第1圖為本創作之通訊裝置示意圖。 第2圖為本創作在同一區域網路進行安裝、執行模式時之裝置架構示意圖。 第3圖為本創作之方法流程示意圖。 第4圖為本創作在不同區域網路進行執行模式時之裝置架構示意圖。 【主要元件符號說明】 12執行檔案區 16儲存區 18網路攝影機 22存取點 26第二使用者電腦 10隨身碟 φ 14設定參數檔案區 17擴充介面 20第一使用者電腦 24路由器 28網際網路Process. First, as shown in step SH), the flash drive 1Q is installed to the user's computer. Then, as shown in the step, the computer will touch whether the USB flash drive 1G and the network video frequency 18 are connected. If yes, the execution mode is performed as shown in step S14, so that the network camera 18 provides user service; , then step by step _ household standard to carry out the accompaniment, network take-up 18 self-practice network settings parameters to install. After that, the _ "Weihang executive mode, so that the job 18 provides user service. The town will use the above-mentioned flow method as the basis, and turn the actual device structure to explain the entire operation process. After the illusion is made in the first-person, if you want to control the network camera μ from the other end to provide user service, the explanation is as follows. Please refer to FIG. 3 and FIG. 4 ^. At this time, the second user computer 26 and the user computer 20 at the far end are in different regional networks, and in order to avoid being protected from the domain, the body can be slimmed (4). (4) The interface is inserted in the second user power (4), and this step is step sl1. Then, the second user computer 26 can use the Simple Traversal of UDP over NAT (STUN) and the first account number and the first number formed by the first serial number and the installation identifier (SSID) of the flash drive. The second account number formed by the serial number and the installation identifier of the network camera 18 obtains the Internet Protocol (IP 'Internet Pr〇t〇c〇1) address of the network camera M360392 to establish a communication channel with the network camera 18. . Then, as shown in step S12, the second user computer 26 determines whether the flash drive 10 and the network camera 18 are connected. As a result, it is found that the connection has been made. At this time, as shown in the step, the network camera 18 is provided with user service. . The STUN method is the marriage-mail server, and the network camera 18 sequentially transmits the relevant information to the second account in the mail miner through the access point 22, the router 24, and the Internet 28, and the second user computer 26 Then, the relevant information is transmitted to the first account in the mail server 3(), and after receiving the mail server, the network camera 18 and the second user computer 26 can obtain the address of the other party and related information. However, if you are in the middle of the scam, you will have to leave the original network environment or have been uninstalled, or (10), then the second account of the portable disk 2 and the webcam 18 Connected. '' (4) -, and in the above judgment step of judging whether the network camera 18 and the flash drive 2 are connected, the network camera 18 has left the original 18 under the self__, "6 to release the female «, by _ Road camera Wei Wei 6 stored silk code can not be Sina camera 18 :::: re-wire 'W) Step (10) (four) body plate 1 〇 · second camera. Re-network 赖 Μ Μ 丝 丝 silk, Village _ control network road computer 20 and scales to work 18 miscellaneous - noodle area network cable network (4), then connect with the network camera 18 to replace the access point by the Chinese line (4)) 22, and "just by the line. iaUlt SSiD can be connected to the hub with the M360392. In addition, this creation not only eliminates the need for the user to manually input various complex network setting parameters, but also achieves the effect of simple installation settings, and the network device and the portable access device are provided. There are mutually corresponding serial numbers, so that the two devices are not easily stolen when transmitting information, so as to improve the security of the network. The above is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention, and the scope, structure, characteristics and spirit described in the scope of the patent application are equally varied. And modifications should be included in the scope of the patent application of this creation. _ [Simple description of the diagram] The first diagram is a schematic diagram of the communication device of the creation. Figure 2 is a schematic diagram of the device architecture when the author installs and executes the same local area network. Figure 3 is a schematic diagram of the flow of the method of creation. Figure 4 is a schematic diagram of the device architecture when the author performs the execution mode in different regional networks. [Main component symbol description] 12 execution file area 16 storage area 18 network camera 22 access point 26 second user computer 10 flash drive φ 14 setting parameter file area 17 expansion interface 20 first user computer 24 router 28 internet road