US20170257475A1 - Communication systems and methods - Google Patents

Communication systems and methods Download PDF

Info

Publication number
US20170257475A1
US20170257475A1 US15/151,619 US201615151619A US2017257475A1 US 20170257475 A1 US20170257475 A1 US 20170257475A1 US 201615151619 A US201615151619 A US 201615151619A US 2017257475 A1 US2017257475 A1 US 2017257475A1
Authority
US
United States
Prior art keywords
terminal
multicast packets
multicast
password
wireless
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/151,619
Inventor
Liang ZONG
Yangcun CHEN
Chao He
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Xiaoyi Technology Co Ltd
Original Assignee
Shanghai Xiaoyi Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Xiaoyi Technology Co Ltd filed Critical Shanghai Xiaoyi Technology Co Ltd
Assigned to XIAOLI TECHNOLOGY CO., LTD. reassignment XIAOLI TECHNOLOGY CO., LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HE, CHAO, CHEN, YANGCUN, ZONG, Liang
Assigned to XIAOYI TECHNOLOGY CO., LTD. reassignment XIAOYI TECHNOLOGY CO., LTD. CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAME PREVIOUSLY RECORDED AT REEL: 038549 FRAME: 0444. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT. Assignors: HE, CHAO, CHEN, YANGCUN, ZONG, Liang
Priority to US15/414,313 priority Critical patent/US10038772B2/en
Priority to US15/418,968 priority patent/US10038773B2/en
Priority to US15/419,366 priority patent/US10178215B2/en
Publication of US20170257475A1 publication Critical patent/US20170257475A1/en
Assigned to SHANGHAI XIAOYI TECHNOLOGY CO., LTD. reassignment SHANGHAI XIAOYI TECHNOLOGY CO., LTD. CORRECTIVE ASSIGNMENT TO CORRECT THE RECEIVING PARTY NAME PREVIOUSLY RECORDED AT REEL: 038549 FRAME: 0444. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT . Assignors: HE, CHAO, CHEN, YANGCUN, ZONG, Liang
Abandoned legal-status Critical Current

Links

Images

Classifications

    • H04M1/72533
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72415User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/185Arrangements for providing special services to substations for broadcast or conference, e.g. multicast with management of multicast group membership
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1881Arrangements for providing special services to substations for broadcast or conference, e.g. multicast with schedule organisation, e.g. priority, sequence management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/189Arrangements for providing special services to substations for broadcast or conference, e.g. multicast in combination with wireless systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1069Session establishment or de-establishment
    • H04L65/4076
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/61Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio
    • H04L65/611Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for multicast or broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/10Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • H04W76/021
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/06Details of telephonic subscriber devices including a wireless LAN interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/43Security arrangements using identity modules using shared identity modules, e.g. SIM sharing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/14Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/40Connection management for selective distribution or broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the present disclosure relates generally to the field of communication technologies, and more particularly, to systems and methods for establishing communication between a smart device and a terminal.
  • a smart camera may be installed at a user's home and connected to the Internet through a network, such as a Wi-Fi (Wireless Fidelity) network.
  • a network such as a Wi-Fi (Wireless Fidelity) network.
  • the smart camera may stream images and videos to the mobile phone.
  • the user may monitor the home condition from a remote place, such as in the office.
  • the user may use the mobile phone to remotely control the smart camera, such as changing the focus or shooting direction of the smart camera.
  • a smart device To establish communication with a terminal, a smart device needs to obtain the local Wi-Fi connection information, which may contain a network identity and a password, and connect to the Wi-Fi according to the network connection information. Then the smart device also needs to form a binding relationship with the terminal. For a device with a user interface, such as a mobile phone or a tablet computer, a user may input the network connection information and complete the binding operations on the user interface.
  • a smart devices such as smart cameras, have no user interface or only have limited capabilities for user-machine interaction and thus the setup of communication between a smart devices and a terminal may be troublesome.
  • a method for establishing communication between a device and a terminal.
  • the method includes receiving a plurality of multicast packets from the terminal.
  • the method also includes determining, according to the multicast packets, wireless connection information of a wireless network.
  • the method further includes connecting to the wireless network according to the wireless connection information.
  • the method further includes generating a notification indicating a password associated with the device.
  • a method for establishing communication between a device and a terminal.
  • the method includes generating, by the terminal, a graphic code, according to wireless connection information of a wireless network and a UID.
  • the method also includes displaying the code by the terminal.
  • the method also includes scanning the code by the device.
  • the method further includes decoding, by the device, the code to extract the wireless connection information and the UID.
  • the method further includes connecting, by the device, to the wireless network according to the wireless connection information.
  • a method for establishing communication between a terminal and a device.
  • the method includes determining that a condition has occurred.
  • the method also includes retrieving, from a memory of the terminal, a user name, and a password of the device.
  • the method also includes forming a P2P connection between the terminal and the device.
  • the method further includes sending the user name and password to the device for verification.
  • the method further includes, if the verification fails, obtaining from a server an updated password of the device.
  • FIG. 1 is a schematic diagram illustrating a system for establishing communication between a terminal and a smart device, according to an exemplary embodiment.
  • FIG. 2 is a flowchart of a method for establishing communication between a terminal and a smart device, according to an exemplary embodiment.
  • FIG. 3 is a flowchart of a method for establishing communication between a terminal and a smart device, according to an exemplary embodiment.
  • FIG. 4 is a flowchart of a method for establishing communication between a terminal and a smart device, according to an exemplary embodiment.
  • FIG. 5 is a schematic diagram illustrating an implementation of the method shown in FIG. 4 , according to an exemplary embodiment.
  • FIG. 6 is a flowchart of a method for establishing communication between a terminal and a smart device that has been bound to the terminal, according to an exemplary embodiment.
  • FIG. 7 is a block diagram of a device for establishing communication between a terminal and a smart device, according to an exemplary embodiment.
  • FIG. 1 is a schematic diagram illustrating a system 100 for establishing a binding relationship between a terminal and a smart device, according to an exemplary embodiment.
  • system 100 may include a smart device 110 , a terminal 120 , a router 130 , and a cloud server 140 .
  • Smart device 110 may be a device with certain computing capabilities, such as a smart camera, a smart wearable device (e.g., a wrist band), a smart air conditioner, a smart air purifier, a smart refrigerator, a smart socket, a smart door bell, etc. Smart device 110 may be configured to form wireless or wired communications with other devices, including terminal 120 , router 130 , and cloud server 140 .
  • smart device 110 may include a built-in Wi-Fi module for wireless connection.
  • smart device 110 may include a Universal Serial Bus (USB) interface by which router 130 may be connected.
  • USB Universal Serial Bus
  • Terminal 120 may be an electronic device for receiving user input, such as a mobile phone, a tablet computer, a personal computer, a personal digital assistant (PDA), a remote controller, a medical device, exercise equipment, an ebook reader, a MP3 (Moving Picture Experts Group Audio Layer III) player, a MP4 player, etc.
  • Terminal 120 may be configured to form wireless or wired communications with other devices, including smart device 110 , router 130 , and cloud server 140 .
  • Terminal 120 may include a user interface through which a user may enter various commands and data. For example, the user may use the user interface to initiate an application for connecting smart device 110 to a Wi-Fi network and binding smart device 110 to terminal 120 , and to enter passwords associated with the connection and binding.
  • Router 130 may be configured to establish a Wi-Fi network and facilitate information exchange between smart device 110 and terminal 120 .
  • Router 130 may be connected to smart device 110 and/or terminal 120 in a wireless or wired manner.
  • Cloud server 140 may be a general purpose computer, a mainframe computer, or any combination of these components. Cloud server 140 may be implemented as a server, a server cluster consisting of a plurality of servers, or a cloud computing service center. Cloud server 140 may be operated by a third party service provider, or a manufacturer or a seller of smart device 110 .
  • Router 130 and cloud server 140 may be connected to each other through a wired or wireless network. Smart device 110 and terminal 120 may communicate with cloud server 140 via router 130 .
  • Terminal 120 may also communicate with cloud server 140 via other networks, without using router 130 .
  • FIG. 2 is a flowchart of a method 200 for establishing communication between a terminal and a smart device, according to an exemplary embodiment.
  • method 200 may be used in system 100 .
  • method 200 may include the following steps 202 - 210 .
  • terminal 120 obtains information for connecting to a Wi-Fi network and connects to the Wi-Fi network according to the information.
  • the Wi-Fi connection information may include a service set identifier (SSID) and a password.
  • Terminal 120 may have a user interface that allows a user to enter various commands and data for connecting to the Wi-Fi network.
  • a mobile phone may have a keyboard or a touch screen by which a user can enter a password of the Wi-Fi network.
  • terminal 120 encodes the Wi-Fi connection information and transmits the encoded information to smart device 110 .
  • terminal 120 may encode the Wi-Fi connection information into sound signals, light signals, radio signals, etc., and transmit these signals to smart device 110 .
  • smart device 110 decodes the received Wi-Fi connection information and connects to the Wi-Fi network according to the Wi-Fi connection information.
  • smart terminal 110 may execute a corresponding decoding method to extract the SSID and password of the Wi-Fi network from the received information. Smart device 110 may then connect to the Wi-Fi network according to the SSID and password.
  • cloud server 140 verifies the identities of smart device 110 and terminal 120 .
  • Smart device 110 and/or terminal 120 may send one or more unique identifiers (UIDs) and passwords to cloud sever 140 . These UIDs and passwords are associated with smart device 110 and/or terminal 120 .
  • Cloud server 140 may query a database to determine whether the received UIDs and passwords match predetermined information. If the matching is successful, cloud server 140 verifies the identities of smart device 110 and terminal 120 for binding purpose. Otherwise, cloud server 140 refuses to bind smart device 110 to terminal 120 .
  • UIDs unique identifiers
  • Cloud server 140 may query a database to determine whether the received UIDs and passwords match predetermined information. If the matching is successful, cloud server 140 verifies the identities of smart device 110 and terminal 120 for binding purpose. Otherwise, cloud server 140 refuses to bind smart device 110 to terminal 120 .
  • cloud server 140 forms a binding relationship between the smart device 110 and terminal 120 .
  • Cloud server 140 may form the binding relationship between an identification of smart device 110 and an identification of terminal 120 .
  • the identification of smart device 110 may be, for example, a media control access (MAC) address of a Bluetooth module in smart device 110 .
  • the identification of the terminal 120 may be, for example, a MAC address of a Bluetooth module or an International Mobile Equipment Identity (IMEI) code of terminal 120 .
  • IMEI International Mobile Equipment Identity
  • each of smart device 110 , terminal 120 , router 130 , and cloud server 140 may run one or more applications to execute one or more steps of method 200 .
  • Method 200 may be used for a smart device 110 that has no user interface or only has limited capabilities for user-machine interactions.
  • a smart camera may only be equipped with signal lights and/or a speaker configured to indicate the operating status of the smart camera, but may have no keyboard, touch pad, or touch screen for a user to enter a command.
  • terminal 120 may acquire the Wi-Fi connection information and user commands through a user interface of terminal 120 .
  • method 200 provides a convenient solution to establish communication between smart device 110 and terminal 120 .
  • the user experience may be improved.
  • FIG. 3 is a flowchart of a method 300 for establishing communication between a terminal and a smart device, according to an exemplary embodiment.
  • method 300 may be used in system 100 .
  • smart device 110 and terminal 120 may have IP multicast functions.
  • method 300 may include the following steps 302 - 332 .
  • terminal 120 detects a Wi-Fi network.
  • the Wi-Fi network may be established by router 130 .
  • terminal 120 may search for available Wi-Fi networks in the vicinity of terminal 120 and generate a Wi-Fi network list including one or more Wi-Fi networks provided by one or more routers. If multiple Wi-Fi networks are detected, terminal 120 may allow a user to select a network/router for connection.
  • Terminal 120 may be configured to periodically scan the vicinity for the available Wi-Fi networks.
  • terminal 120 may be installed with an application for establishing communication with smart device 110 . After a user starts the application, terminal 120 may be instructed by the application to scan the vicinity for any available Wi-Fi networks.
  • terminal 120 obtains information for connecting to the Wi-Fi network.
  • the Wi-Fi connection information may include a SSID and a password.
  • the SSID may be broadcast by router 130 .
  • terminal 120 may automatically detect the SSID.
  • terminal 120 may prompt the user to manually enter the SSID through the user interface of terminal 120 .
  • the network password may be entered by the user through the user interface of terminal 120 .
  • the network password may be pre-stored in terminal 120 .
  • terminal 120 connects to the Wi-Fi network according to the Wi-Fi connection information.
  • Terminal 120 may send a certification request carrying the SSID and password to router 130 . If router 130 successfully verifies the SSID and password.
  • Router 130 may record terminal 120 and return an authorization response to terminal 110 . After receiving the authorization response, terminal 120 may send a request to router 130 to establish a connection, and router 130 may enable terminal 120 to access the Wi-Fi network based on the request.
  • terminal 120 writes the Wi-Fi connection information into one or more first multicast packets and one or more second multicast packets.
  • the one or more first multicast packets are multicast datagrams including at least information about the identification of terminal 120 and lengths of the Wi-Fi SSID and password.
  • the one or more second multicast packets are multicast datagrams including at least the Wi-Fi SSID and password.
  • Terminal 120 may encrypt the information carried by the first and second multicast packets using any method known in the art. Details of generating the first and second multicast packets are described below.
  • Each multicast packet may use a multicast IP address to identify the packet as a multicast packet.
  • a mapping relationship exists between multicast IP addresses and multicast MAC addresses. The rule of mapping follows Internet Protocol Version 4 (IPv4) or IPv6. The following description assumes the multicast addresses are IPv4 addresses. However, it will be readily apparent to those skilled in the art that the principles of the present disclosure may be applied to IPv6 address. Under IPv4, a multicast IP address may contain 4 bytes (32 bits), and a multicast MAC address may contain 6 bytes (48 bits). The higher 25 bits of a multicast MAC address are fixed by the Institute of Electrical and Electronic Engineers (IEEE), while the lower 23 bits (i.e., lower 3 bytes) of the multicast MAC address are editable.
  • IEEE Institute of Electrical and Electronic Engineers
  • the lower 23 bits of a multicast IP address can be mapped into the lower 23 bits (i.e., lower 3 bytes) of a corresponding multicast MAC address.
  • terminal 120 may write the Wi-Fi connection information in the 3 lower bytes of the multicast MAC address, which is contained in the header of a multicast packet.
  • smart device 110 may read the multicast MAC address and determine the Wi-Fi connection information.
  • terminal 120 may use each of the lower 3 bytes in a multicast MAC address to carry different types of information. For example, terminal 120 may use a first byte for a serial number of the multicast packet, a second byte for an identification of terminal 120 , and a third byte for a part of the Wi-Fi connection information.
  • Terminal 120 may write an identification of terminal 120 in the first multicast packets.
  • the identification of terminal 120 may be a preset UID associated with terminal 120 .
  • the identification may be used by smart device 110 to determine whether a multicast packet is originated from terminal 120 .
  • the identification may be a MAC address of terminal 120 .
  • the identification may be a code preset by a manufacturer of smart device 110 .
  • the identification may be a random synchronous code generated by terminal 120 , configured to initiate synchronization between smart device 110 and terminal 120 .
  • each second multicast packet may also include the identification of terminal 120 .
  • Terminal 120 may also write lengths of the Wi-Fi SSID and password in the first multicast packets. “Length” refers to the number of bytes. For example, if the password is 1234, then the length of the password is 4.
  • terminal 120 may use reserved serial numbers for the first multicast packets, to distinguish them from the second multicast packets and to indicate the type of information carried by each first multicast packet. For example, a first multicast packet with serial number 0 may indicate that the packet carries information about the length of the Wi-Fi password.
  • Terminal 120 may write at least one byte of the Wi-Fi SSID or password in each second multicast packet. For example, if the Wi-Fi password is 30 bytes long, terminal 120 may generate 30 second multicast packets for carrying the password. Terminal 120 may also insert a serial number into each second multicast packet. Each serial number corresponds to one byte of Wi-Fi SSID or password. In the above example, the nth second multicast packet carries the nth byte of the Wi-Fi password.
  • terminal 120 sends the one or more first multicast packets and the one or more second multicast packets to smart device 120 .
  • smart device 110 scans a plurality of multicast channels.
  • smart device 100 may divide all the available multicast channels into at least two groups. The first group of channels is historically used more frequently than the second group of channels. Smart device 110 may first scan the first group of channels. If no multicast packets are detected on the first group of channels, smart device 110 may continue to scan the second group of channels. Smart device 110 may scan each group of channels multiple times to ensure scanning accuracy. For example, the multicast channels 1 , 6 , and 11 may be more frequently used than other channels. Thus, smart device 110 may first scan these three channels for one or more times. If no multicast packets are detected on the three channels, smart device 110 may continue to scan the rest of multicast channels.
  • smart device 110 obtains the one or more first multicast packets on one or more multicast channels and locks the one or more multicast channels. Smart device 110 may decode and decrypt the information carried by a multicast packet using methods consistent with the methods employed by terminal 120 to generate the multicast packet. If the identification of terminal contained in the first multicast packets matches the identification of terminal 120 , smart device 110 locks the channels on which the first multicast packets are received. For example, after receiving on channel 6 a first multicast packet containing identification matching the identification of terminal 120 , smart device 110 may lock channel 6 .
  • smart device 110 obtains at least one second multicast packet on the locked multicast channels.
  • Smart device 120 may choose to receive only the multicast packets labeled with the identification of terminal 120 .
  • Smart device 110 may extract the serial number, identification of terminal, and the Wi-Fi SSID or password information carried by the second multicast packets.
  • smart device 110 determines, based on the serial numbers of the received second multicast packets and the lengths of the Wi-Fi SSID and/or password, whether to obtain additional second multicast packets. For example, if a second multicast packet carries one byte of Wi-Fi SSID or password and the combined length of the SSID and password is 50 bytes long, smart device 110 needs to obtain at least 50 second multicast packets to determine the SSID and password. When smart device 110 has only received the first 45 second multicast packets, smart device 110 may determine that 5 more second multicast packets are needed. In contrast, after receiving 50 second multicast packets, smart device 110 may determine that no more second multicast packets are needed. If additional second multicast packets are needed to determine the Wi-Fi SSID and/or password, smart device 110 returns to step 316 . Otherwise, smart device 110 proceeds to step 320 .
  • smart device 110 determines the Wi-Fi SSID and password according to the received second multicast packets. Smart device 110 may arrange the byte(s) of Wi-Fi connection information carried by each second multicast packet in an order consistent with the corresponding serial number to assemble the correct Wi-Fi SSID and password.
  • step 322 smart device 110 connects to the Wi-Fi network according to the Wi-Fi SSID and password. This step is similar to step 306 .
  • smart device 110 connects to cloud server 140 through the Wi-Fi network.
  • smart device 110 may report a password associated with smart device 110 to cloud server. Such password may be preset by the manufacturer of smart device 110 .
  • cloud server 140 may assign a password to smart device 110 .
  • terminal 120 searches for smart device 110 in the Wi-Fi network, and acquires an IP address and a UID of smart device 110 .
  • the UID may be a MAC address of smart device 110 .
  • Terminal 120 may use the UID to query cloud server 140 as to whether a binding relationship has been formed between smart device 110 and terminal 120 . If no binding relationship has been formed, terminal 120 may prompt the user to bind smart device 110 to terminal 120 .
  • terminal 120 triggers smart device 110 to generate a notification indicating the password associated with smart device 110 .
  • terminal 120 may use the IP address of smart device 110 to run a common gateway (CGI) script on smart device 110 to trigger the broadcasting of the password by smart device 110 in a voice form.
  • CGI common gateway
  • terminal 120 sends the password associated with smart device 110 to cloud server 140 for verification. After hearing the password, the user may enter the password in terminal 120 , which then passes the password to cloud server 140 for verification.
  • step 332 cloud server 140 verifies the password received from terminal 120 and forms a binding relationship between smart device 110 and terminal 120 .
  • This step is similar to steps 208 and 210 shown in FIG. 2 .
  • cloud server 140 may instruct smart device 110 to stop the notification of the password, e.g., stop broadcasting the password.
  • method 300 enables smart device 110 to obtain the Wi-Fi connection information and to further connect to the Wi-Fi network.
  • Method 300 does not require a user to directly operate on smart device 110 , and thus is particularly suitable for smart devices that have no user interface or only have limited capabilities for user-machine interaction.
  • method 300 does not require a wired connection for smart device 110 and is largely automated, and thus provides a fast and convenient solution to establish communication between smart device 110 and terminal 120 .
  • FIG. 4 is a flowchart of a method 400 for establishing communication between a terminal and a smart device, according to an exemplary embodiment.
  • method 400 may be used in system 100 .
  • smart device 110 may have capabilities to acquire and analyze image information.
  • smart device 110 may be a smart camera or a device equipped with a camera.
  • method 400 may include the following steps 402 - 424 .
  • step 402 terminal 120 detects a Wi-Fi network.
  • step 404 terminal 120 obtains information for connecting to the Wi-Fi network.
  • step 406 terminal 120 connects to the Wi-Fi network according to the Wi-Fi connection information.
  • steps 402 - 406 are similar to steps 302 - 306 shown in FIG. 3 .
  • terminal 120 obtains a unique identifier (UID) from cloud server 140 .
  • the UID may be used for identifying a binding relationship to be formed between a smart device 110 and a terminal 130 .
  • terminal 120 may be installed with an application for establishing communication between smart device 110 and terminal 120 . After connecting to the Wi-Fi network, the application may instruct terminal 120 to send a request to cloud server 140 for generating the UID.
  • Cloud server 140 may set a time limit for the UID, so that the UID will expire after a predetermined time.
  • the UID may include a time stamp indicating when the UID is generated and for how long it is valid.
  • terminal 120 In step 410 , terminal 120 generates a graphic code, such as a two-dimensional quick response (QR) code, according to the Wi-Fi connection information and the UID.
  • the SSIDs and passwords associated with different routers may be set by the router manufacturers according to different formats, such as UTF-8, GB 2312, ASCII, etc. Some formats may introduce special characters into the QR code, later causing failures during decoding of the QR code.
  • terminal 120 may convert the SSID and password into a uniform format. Terminal 120 may then use the converted SSID and password to generate the QR code according to any method known in the art.
  • an encryption method may be used in generating the QR code to prevent an unauthorized device from deciphering the QR code.
  • terminal 120 displays the QR code on a screen of terminal 120 .
  • the size of the displayed QR code may be adjustable. For example, if terminal 120 has a touch screen, the user may enlarge or shrink the QR code by pinch two fingers together or move the fingers apart on the screen.
  • FIG. 5 is a schematic diagram illustrating an implementation of method 400 , according to an exemplary embodiment.
  • the user may hold terminal 120 in front of smart device 110 and facing the QR code to the imaging direction of smart device 110 .
  • Several methods may be used to increase the success rate of the scanning.
  • the user may separate smart device 110 and terminal 120 in a distance approximately equal to the height of terminal 120 .
  • a tablet computer may be kept from smart device 110 in a longer distance than a mobile phone, because the tablet computer is usually bigger than the mobile phone.
  • the user may adjust the size of the displayed QR code to enable smart device 110 to take a clear image of the full QR code.
  • Smart device 110 may have signal lights or a speaker configured to inform the user whether the scanning is successful. For example, smart device 110 may use a certain color of signal lights or a prompting sound to inform the user that the scanning is unsuccessful. Based on this feedback, the user may further adjust the distance, the height, and the size of the displayed QR code until the scanning succeeds.
  • smart device 110 decodes the scanned QR code to extract the Wi-Fi connection information and UID.
  • the QR code may be generated from SSIDs and passwords that are pre-converted into a uniform format.
  • smart device 110 may use the same decoding method for SSIDs and passwords that are originally in different formats. This way, the compatibility of smart device 110 may be improved.
  • step 418 smart device 110 connects to the Wi-Fi network according to the Wi-Fi connection information. This step is similar to step 306 shown in FIG. 3 .
  • step 420 smart device 110 sends the UID to cloud server 140 .
  • cloud server 140 determines whether the UID is invalid or has expired. After receiving the UID from smart device 110 , cloud server 140 may analyze the time stamp associated the UID to determine whether the UID is timely.
  • step 424 if the UID is valid and timely, cloud server 140 forms a binding relationship between smart device 110 and terminal 120 . If the UID is invalid or has expired, cloud server 140 may inform terminal 120 that the binding has failed. Smart device 110 may then generate an error message, e.g., flashing a signal lights or making a beeping sound, indicating the binding has failed. Steps 408 - 424 need to be executed again to establish the communication between smart device 110 and terminal 120
  • Method 400 can quickly establish communication between smart device 110 and terminal 120 because it is easy to use and the success rate of scanning a QR code is high. Moreover, because the QR code is not transmitted over the Wi-Fi network, method 400 may be used under an unstable Wi-Fi condition and to reduce the probability of unauthorized interception.
  • one terminal may be bound with a plurality of smart devices, and one smart device may also be bound with a plurality of terminals. After smart device 110 is bound to terminal 120 , terminal 120 may connect to smart device 110 and exchange data with smart device 110 .
  • FIG. 6 is a flowchart of a method 600 for establishing communication between a terminal and a smart device that has been bound to the terminal, according to an exemplary embodiment.
  • method 600 may be used in system 100 .
  • a binding relationship has already been formed between smart device 110 and terminal 120 .
  • Method 600 may be used at any time when terminal 120 decides to exchange information with smart device 110 .
  • method 600 may include the following steps 602 - 610 .
  • terminal 120 retrieves a UID, a user name, and a password associated with smart device 110 .
  • terminal 120 may save in its memory a list of devices that have been bound with terminal 120 .
  • the device list may include the UID, the user name, and the password associated with each device.
  • step 604 terminal 120 connects to cloud server 140 and inquires about a current operating status of smart device 110 .
  • Cloud server 140 may be configured as a peer-to-peer (P2P) server to facilitate the forming of a P2P connection between smart device 110 and terminal 120 using any method known in the art.
  • Cloud server 140 may also be configured to store and manage the user names and passwords associated with smart device 110 .
  • terminal 120 may send the UID associated with smart device 110 to cloud 140 for status verification.
  • Cloud server 140 may detect whether smart device 110 is connected to a network.
  • Cloud server may also determine whether smart device 110 is operating normally and available for make a connection with terminal 120 . If smart device 110 is available, terminal 120 may proceed to step 606 . Otherwise, terminal 120 may end method 600 .
  • terminal 120 forms a P2P connection to smart device 110 .
  • terminal 120 sends the user name and password to smart device for verification. If the verification is successful, terminal 120 may start to exchange information with smart device 110 and method 600 ends. In many situations, however, cloud server 140 may periodically change the password associated with smart device 110 to ensure data security. If the password used by smart device 110 has expired, the verification will be unsuccessful and terminal 110 proceeds to step 610 .
  • step 610 if the verification is unsuccessful, terminal 120 obtains from cloud server 140 an updated password associated with smart device 110 and sends the updated password to smart device 110 for re-validation. While still maintaining the P2P connection to smart device 110 , terminal 120 may request cloud server 140 to send the updated password. If the smart device 110 verifies the updated password, terminal 120 may start to exchange information with smart device 110 . Moreover, terminal 120 may save the updated password in its memory for future use.
  • terminal 120 may initiate method 600 when a user turns on terminal 120 , when terminal 120 connects to a network, or when terminal 120 starts an application for managing one or more devices that are bound to terminal 120 .
  • Terminal 120 may perform method 600 for each bound device so that terminal 120 can be ready for communicating with these devices. This way, a user may later use terminal 120 to exchange information with smart device 110 without experiencing significant system delay. For example, if smart device 110 is a smart camera bound to terminal 120 , terminal 120 may perform method 600 once the terminal is turned on. When a user later runs a smart camera application, terminal 120 may immediately obtain and display real-time video information captured by the smart camera, without spending time establishing communication with the smart camera.
  • FIG. 7 is a block diagram of a device 700 for establishing communication between a terminal and a smart device, according to an exemplary embodiment.
  • device 700 may be implemented as smart device 110 or terminal 120 .
  • device 700 may include one or more of the following components: a processing component 702 , a memory 704 , a power component 706 , a multimedia component 708 , an audio component 710 , an input/output (I/O) interface 712 , a sensor component 714 , and a communication component 716 .
  • a processing component 702 a memory 704 , a power component 706 , a multimedia component 708 , an audio component 710 , an input/output (I/O) interface 712 , a sensor component 714 , and a communication component 716 .
  • I/O input/output
  • Processing component 702 may be configured to control overall operations of device 700 , such as the operations associated with display, telephone calls, data communications, camera operations, and recording operations. Processing component 702 may include one or more processors 720 to execute instructions to perform all or part of the steps in the above described methods. Moreover, processing component 702 may include one or more modules which facilitate the interaction between processing component 702 and other components. For instance, processing component 702 may include a multimedia module to facilitate the interaction between multimedia component 708 and processing component 702 .
  • Memory 704 may be configured to store various types of data to support the operation of device 700 . Examples of such data include instructions for any applications or methods operated on device 700 , contact data, phonebook data, messages, pictures, video, etc. Memory 704 may be implemented using any type of volatile or non-volatile memory devices, or a combination thereof, such as a static random access memory (SRAM), an electrically erasable programmable read-only memory (EEPROM), an erasable programmable read-only memory (EPROM), a programmable read-only memory (PROM), a read-only memory (ROM), a magnetic memory, a flash memory, or a magnetic or optical disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EPROM erasable programmable read-only memory
  • PROM programmable read-only memory
  • ROM read-only memory
  • magnetic memory a magnetic memory
  • flash memory or a magnetic or optical disk.
  • Power component 706 may provide power to various components of device 700 .
  • Power component 706 may include a power management system, one or more power sources, and any other components associated with the generation, management, and distribution of operating power in device 700 .
  • Multimedia component 708 may include a screen providing an output interface between device 700 and the user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes the touch panel, the screen may be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensors may not only sense a boundary of a touch or swipe action, but also sense a period of time and a pressure associated with the touch or swipe action.
  • multimedia component 708 may include a front camera and/or a rear camera. The front camera and/or the rear camera may receive external multimedia data while device 700 is in an operation mode, such as a photographing mode or a video mode. Each of the front camera and the rear camera may be a fixed optical lens system or have focus and optical zoom capability.
  • Audio component 710 may be configured to output and/or input audio signals.
  • audio component 710 may include a microphone configured to receive an external audio signal when device 700 is in an operation mode, such as a call mode, a recording mode, and a voice recognition mode.
  • the received audio signal may be further stored in memory 704 or transmitted via communication component 716 .
  • audio component 710 may further include a speaker to output audio signals.
  • I/O interface 712 may provide an interface between processing component 702 and peripheral interface modules, such as a keyboard, a click wheel, buttons, and the like.
  • the buttons may include, but are not limited to, a home button, a volume button, a starting button, and a locking button.
  • Sensor component 714 may include one or more sensors to provide status assessments of various aspects of device 700 .
  • sensor component 714 may detect an on/off status of device 700 , relative positioning of components, e.g., the display and the keypad, of device 700 , a change in position of device 700 or a component of device 700 , a presence or absence of user contact with device 700 , an orientation or an acceleration/deceleration of device 700 , and a change in temperature of device 700 .
  • Sensor component 714 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • Sensor component 714 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • sensor component 714 may also include an accelerometer, a gyroscope, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • Communication component 716 may be configured to facilitate communication, wired or wirelessly, between the device 700 and other devices.
  • Device 700 may access a wireless network based on one or more communication standard, such as Wi-Fi, LTE, 2G, 3G, 4G, 5G, etc.
  • communication component 716 may receive a broadcast signal or broadcast associated information from an external broadcast management system via a broadcast channel
  • communication component 716 may further include a near field communication (NFC) module to facilitate short-range communications.
  • NFC near field communication
  • communication component 716 may be implemented based on a radio frequency identification (RFID) technology, an infrared data association (IrDA) technology, an ultra-wideband (UWB) technology, a Bluetooth (BT) technology, or other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • BT Bluetooth
  • device 700 may be implemented with one or more application-specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gate arrays (FPGAs), controllers, micro-controllers, microprocessors, or other electronic components, for performing the above described methods.
  • ASICs application-specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGAs field programmable gate arrays
  • controllers micro-controllers, microprocessors, or other electronic components, for performing the above described methods.
  • non-transitory computer-readable storage medium including instructions, such as included in memory 704 , executable by processor 720 in the device 700 , for performing the above-described methods.
  • the non-transitory computer-readable storage medium may be a read-only memory (ROM), a random access memory (RAM), a CD-ROM, a magnetic tape, a memory chip (or integrated circuit), a hard disc, a floppy disc, an optical data storage device, or the like.

Abstract

Systems and methods for establishing communication between a terminal and a device are disclosed. According to certain embodiments, a method used in the device includes receiving a plurality of multicast packets from the terminal. The method also includes determining, according to the multicast packets, wireless connection information of a wireless network. The method further includes connecting to the wireless network according to the wireless connection information. The method further includes generating a notification indicating a password associated with the device.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is based upon and claims priority to Chinese Patent Application No. 201610117954.X, filed Mar. 2, 2016, the entire contents of which are incorporated herein by reference.
  • TECHNICAL FIELD
  • The present disclosure relates generally to the field of communication technologies, and more particularly, to systems and methods for establishing communication between a smart device and a terminal.
  • BACKGROUND
  • Many smart devices have a need to establish communication with a terminal. For example, a smart camera may be installed at a user's home and connected to the Internet through a network, such as a Wi-Fi (Wireless Fidelity) network. After forming a binding relationship with a mobile phone, the smart camera may stream images and videos to the mobile phone. In this manner, the user may monitor the home condition from a remote place, such as in the office. Moreover, the user may use the mobile phone to remotely control the smart camera, such as changing the focus or shooting direction of the smart camera.
  • To establish communication with a terminal, a smart device needs to obtain the local Wi-Fi connection information, which may contain a network identity and a password, and connect to the Wi-Fi according to the network connection information. Then the smart device also needs to form a binding relationship with the terminal. For a device with a user interface, such as a mobile phone or a tablet computer, a user may input the network connection information and complete the binding operations on the user interface. However, many smart devices, such as smart cameras, have no user interface or only have limited capabilities for user-machine interaction and thus the setup of communication between a smart devices and a terminal may be troublesome.
  • The disclosed methods and systems address one or more of the problems listed above.
  • SUMMARY
  • Consistent with one disclosed embodiment of the present disclosure, a method is provided for establishing communication between a device and a terminal. The method includes receiving a plurality of multicast packets from the terminal. The method also includes determining, according to the multicast packets, wireless connection information of a wireless network. The method further includes connecting to the wireless network according to the wireless connection information. The method further includes generating a notification indicating a password associated with the device.
  • Consistent with another disclosed embodiment of the present disclosure, a method is provided for establishing communication between a device and a terminal. The method includes generating, by the terminal, a graphic code, according to wireless connection information of a wireless network and a UID. The method also includes displaying the code by the terminal. The method also includes scanning the code by the device. The method further includes decoding, by the device, the code to extract the wireless connection information and the UID. The method further includes connecting, by the device, to the wireless network according to the wireless connection information.
  • Consistent with yet another disclosed embodiment of the present disclosure, a method is provided for establishing communication between a terminal and a device. The method includes determining that a condition has occurred. The method also includes retrieving, from a memory of the terminal, a user name, and a password of the device. The method also includes forming a P2P connection between the terminal and the device. The method further includes sending the user name and password to the device for verification. The method further includes, if the verification fails, obtaining from a server an updated password of the device.
  • It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the principles of the present disclosure.
  • FIG. 1 is a schematic diagram illustrating a system for establishing communication between a terminal and a smart device, according to an exemplary embodiment.
  • FIG. 2 is a flowchart of a method for establishing communication between a terminal and a smart device, according to an exemplary embodiment.
  • FIG. 3 is a flowchart of a method for establishing communication between a terminal and a smart device, according to an exemplary embodiment.
  • FIG. 4 is a flowchart of a method for establishing communication between a terminal and a smart device, according to an exemplary embodiment.
  • FIG. 5 is a schematic diagram illustrating an implementation of the method shown in FIG. 4, according to an exemplary embodiment.
  • FIG. 6 is a flowchart of a method for establishing communication between a terminal and a smart device that has been bound to the terminal, according to an exemplary embodiment.
  • FIG. 7 is a block diagram of a device for establishing communication between a terminal and a smart device, according to an exemplary embodiment.
  • DETAILED DESCRIPTION
  • Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. The following description refers to the accompanying drawings in which the same numbers in different drawings represent the same or similar elements unless otherwise represented. The implementations set forth in the following description of exemplary embodiments do not represent all implementations consistent with the invention. Instead, they are merely examples of devices and methods consistent with aspects related to the invention as recited in the appended claims.
  • FIG. 1 is a schematic diagram illustrating a system 100 for establishing a binding relationship between a terminal and a smart device, according to an exemplary embodiment. Referring to FIG. 1, system 100 may include a smart device 110, a terminal 120, a router 130, and a cloud server 140.
  • Smart device 110 may be a device with certain computing capabilities, such as a smart camera, a smart wearable device (e.g., a wrist band), a smart air conditioner, a smart air purifier, a smart refrigerator, a smart socket, a smart door bell, etc. Smart device 110 may be configured to form wireless or wired communications with other devices, including terminal 120, router 130, and cloud server 140. For example, smart device 110 may include a built-in Wi-Fi module for wireless connection. Also for example, smart device 110 may include a Universal Serial Bus (USB) interface by which router 130 may be connected.
  • Terminal 120 may be an electronic device for receiving user input, such as a mobile phone, a tablet computer, a personal computer, a personal digital assistant (PDA), a remote controller, a medical device, exercise equipment, an ebook reader, a MP3 (Moving Picture Experts Group Audio Layer III) player, a MP4 player, etc. Terminal 120 may be configured to form wireless or wired communications with other devices, including smart device 110, router 130, and cloud server 140. Terminal 120 may include a user interface through which a user may enter various commands and data. For example, the user may use the user interface to initiate an application for connecting smart device 110 to a Wi-Fi network and binding smart device 110 to terminal 120, and to enter passwords associated with the connection and binding.
  • Router 130 may be configured to establish a Wi-Fi network and facilitate information exchange between smart device 110 and terminal 120. Router 130 may be connected to smart device 110 and/or terminal 120 in a wireless or wired manner. Cloud server 140 may be a general purpose computer, a mainframe computer, or any combination of these components. Cloud server 140 may be implemented as a server, a server cluster consisting of a plurality of servers, or a cloud computing service center. Cloud server 140 may be operated by a third party service provider, or a manufacturer or a seller of smart device 110. Router 130 and cloud server 140 may be connected to each other through a wired or wireless network. Smart device 110 and terminal 120 may communicate with cloud server 140 via router 130. Terminal 120 may also communicate with cloud server 140 via other networks, without using router 130.
  • FIG. 2 is a flowchart of a method 200 for establishing communication between a terminal and a smart device, according to an exemplary embodiment. For example, method 200 may be used in system 100. Referring to FIG. 2, method 200 may include the following steps 202-210.
  • In step 202, terminal 120 obtains information for connecting to a Wi-Fi network and connects to the Wi-Fi network according to the information. The Wi-Fi connection information may include a service set identifier (SSID) and a password. Terminal 120 may have a user interface that allows a user to enter various commands and data for connecting to the Wi-Fi network. For example, a mobile phone may have a keyboard or a touch screen by which a user can enter a password of the Wi-Fi network.
  • In step 204, terminal 120 encodes the Wi-Fi connection information and transmits the encoded information to smart device 110. For example, terminal 120 may encode the Wi-Fi connection information into sound signals, light signals, radio signals, etc., and transmit these signals to smart device 110.
  • In step 206, smart device 110 decodes the received Wi-Fi connection information and connects to the Wi-Fi network according to the Wi-Fi connection information. Depending on the manner in which the Wi-Fi connection information is encoded and transmitted, smart terminal 110 may execute a corresponding decoding method to extract the SSID and password of the Wi-Fi network from the received information. Smart device 110 may then connect to the Wi-Fi network according to the SSID and password.
  • In step 208, cloud server 140 verifies the identities of smart device 110 and terminal 120. Smart device 110 and/or terminal 120 may send one or more unique identifiers (UIDs) and passwords to cloud sever 140. These UIDs and passwords are associated with smart device 110 and/or terminal 120. Cloud server 140 may query a database to determine whether the received UIDs and passwords match predetermined information. If the matching is successful, cloud server 140 verifies the identities of smart device 110 and terminal 120 for binding purpose. Otherwise, cloud server 140 refuses to bind smart device 110 to terminal 120.
  • In step 210, cloud server 140 forms a binding relationship between the smart device 110 and terminal 120. Cloud server 140 may form the binding relationship between an identification of smart device 110 and an identification of terminal 120. The identification of smart device 110 may be, for example, a media control access (MAC) address of a Bluetooth module in smart device 110. The identification of the terminal 120 may be, for example, a MAC address of a Bluetooth module or an International Mobile Equipment Identity (IMEI) code of terminal 120. Once the binding relationship is formed, cloud server 140 may facilitate information exchange between smart device 110 and terminal 120.
  • In exemplary embodiments, each of smart device 110, terminal 120, router 130, and cloud server 140 may run one or more applications to execute one or more steps of method 200. Method 200 may be used for a smart device 110 that has no user interface or only has limited capabilities for user-machine interactions. For example, a smart camera may only be equipped with signal lights and/or a speaker configured to indicate the operating status of the smart camera, but may have no keyboard, touch pad, or touch screen for a user to enter a command. However, terminal 120 may acquire the Wi-Fi connection information and user commands through a user interface of terminal 120. By enabling terminal 120 to send the acquired information to smart device 110, method 200 provides a convenient solution to establish communication between smart device 110 and terminal 120. Thus, the user experience may be improved.
  • FIG. 3 is a flowchart of a method 300 for establishing communication between a terminal and a smart device, according to an exemplary embodiment. For example, method 300 may be used in system 100. In particular, smart device 110 and terminal 120 may have IP multicast functions. Referring to FIG. 3, method 300 may include the following steps 302-332.
  • In step 302, terminal 120 detects a Wi-Fi network. The Wi-Fi network may be established by router 130. In exemplary embodiments, terminal 120 may search for available Wi-Fi networks in the vicinity of terminal 120 and generate a Wi-Fi network list including one or more Wi-Fi networks provided by one or more routers. If multiple Wi-Fi networks are detected, terminal 120 may allow a user to select a network/router for connection. Terminal 120 may be configured to periodically scan the vicinity for the available Wi-Fi networks. Alternatively, terminal 120 may be installed with an application for establishing communication with smart device 110. After a user starts the application, terminal 120 may be instructed by the application to scan the vicinity for any available Wi-Fi networks.
  • In step 304, terminal 120 obtains information for connecting to the Wi-Fi network. The Wi-Fi connection information may include a SSID and a password. The SSID may be broadcast by router 130. Thus, terminal 120 may automatically detect the SSID. However, if the broadcast function of router 130 is disabled, terminal 120 may prompt the user to manually enter the SSID through the user interface of terminal 120. Moreover, the network password may be entered by the user through the user interface of terminal 120. Alternatively, the network password may be pre-stored in terminal 120.
  • In step 306, terminal 120 connects to the Wi-Fi network according to the Wi-Fi connection information. Terminal 120 may send a certification request carrying the SSID and password to router 130. If router 130 successfully verifies the SSID and password. Router 130 may record terminal 120 and return an authorization response to terminal 110. After receiving the authorization response, terminal 120 may send a request to router 130 to establish a connection, and router 130 may enable terminal 120 to access the Wi-Fi network based on the request.
  • In step 308, terminal 120 writes the Wi-Fi connection information into one or more first multicast packets and one or more second multicast packets. The one or more first multicast packets are multicast datagrams including at least information about the identification of terminal 120 and lengths of the Wi-Fi SSID and password. The one or more second multicast packets are multicast datagrams including at least the Wi-Fi SSID and password. Terminal 120 may encrypt the information carried by the first and second multicast packets using any method known in the art. Details of generating the first and second multicast packets are described below.
  • Each multicast packet may use a multicast IP address to identify the packet as a multicast packet. A mapping relationship exists between multicast IP addresses and multicast MAC addresses. The rule of mapping follows Internet Protocol Version 4 (IPv4) or IPv6. The following description assumes the multicast addresses are IPv4 addresses. However, it will be readily apparent to those skilled in the art that the principles of the present disclosure may be applied to IPv6 address. Under IPv4, a multicast IP address may contain 4 bytes (32 bits), and a multicast MAC address may contain 6 bytes (48 bits). The higher 25 bits of a multicast MAC address are fixed by the Institute of Electrical and Electronic Engineers (IEEE), while the lower 23 bits (i.e., lower 3 bytes) of the multicast MAC address are editable. The lower 23 bits of a multicast IP address can be mapped into the lower 23 bits (i.e., lower 3 bytes) of a corresponding multicast MAC address. By changing the multicast IP address, terminal 120 may write the Wi-Fi connection information in the 3 lower bytes of the multicast MAC address, which is contained in the header of a multicast packet. After sniffing the multicast packet, smart device 110 may read the multicast MAC address and determine the Wi-Fi connection information.
  • In exemplary embodiments, terminal 120 may use each of the lower 3 bytes in a multicast MAC address to carry different types of information. For example, terminal 120 may use a first byte for a serial number of the multicast packet, a second byte for an identification of terminal 120, and a third byte for a part of the Wi-Fi connection information.
  • Terminal 120 may write an identification of terminal 120 in the first multicast packets. The identification of terminal 120 may be a preset UID associated with terminal 120. The identification may be used by smart device 110 to determine whether a multicast packet is originated from terminal 120. For example, the identification may be a MAC address of terminal 120. Also for example, the identification may be a code preset by a manufacturer of smart device 110. Yet for another example, the identification may be a random synchronous code generated by terminal 120, configured to initiate synchronization between smart device 110 and terminal 120. Similarly, each second multicast packet may also include the identification of terminal 120.
  • Terminal 120 may also write lengths of the Wi-Fi SSID and password in the first multicast packets. “Length” refers to the number of bytes. For example, if the password is 1234, then the length of the password is 4.
  • In some embodiments, terminal 120 may use reserved serial numbers for the first multicast packets, to distinguish them from the second multicast packets and to indicate the type of information carried by each first multicast packet. For example, a first multicast packet with serial number 0 may indicate that the packet carries information about the length of the Wi-Fi password.
  • Terminal 120 may write at least one byte of the Wi-Fi SSID or password in each second multicast packet. For example, if the Wi-Fi password is 30 bytes long, terminal 120 may generate 30 second multicast packets for carrying the password. Terminal 120 may also insert a serial number into each second multicast packet. Each serial number corresponds to one byte of Wi-Fi SSID or password. In the above example, the nth second multicast packet carries the nth byte of the Wi-Fi password.
  • In step 310, terminal 120 sends the one or more first multicast packets and the one or more second multicast packets to smart device 120.
  • In step 312, smart device 110 scans a plurality of multicast channels. To improve the scanning efficiency, smart device 100 may divide all the available multicast channels into at least two groups. The first group of channels is historically used more frequently than the second group of channels. Smart device 110 may first scan the first group of channels. If no multicast packets are detected on the first group of channels, smart device 110 may continue to scan the second group of channels. Smart device 110 may scan each group of channels multiple times to ensure scanning accuracy. For example, the multicast channels 1, 6, and 11 may be more frequently used than other channels. Thus, smart device 110 may first scan these three channels for one or more times. If no multicast packets are detected on the three channels, smart device 110 may continue to scan the rest of multicast channels.
  • In step 314, smart device 110 obtains the one or more first multicast packets on one or more multicast channels and locks the one or more multicast channels. Smart device 110 may decode and decrypt the information carried by a multicast packet using methods consistent with the methods employed by terminal 120 to generate the multicast packet. If the identification of terminal contained in the first multicast packets matches the identification of terminal 120, smart device 110 locks the channels on which the first multicast packets are received. For example, after receiving on channel 6 a first multicast packet containing identification matching the identification of terminal 120, smart device 110 may lock channel 6.
  • In step 316, smart device 110 obtains at least one second multicast packet on the locked multicast channels. Smart device 120 may choose to receive only the multicast packets labeled with the identification of terminal 120. Smart device 110 may extract the serial number, identification of terminal, and the Wi-Fi SSID or password information carried by the second multicast packets.
  • In step 318, smart device 110 determines, based on the serial numbers of the received second multicast packets and the lengths of the Wi-Fi SSID and/or password, whether to obtain additional second multicast packets. For example, if a second multicast packet carries one byte of Wi-Fi SSID or password and the combined length of the SSID and password is 50 bytes long, smart device 110 needs to obtain at least 50 second multicast packets to determine the SSID and password. When smart device 110 has only received the first 45 second multicast packets, smart device 110 may determine that 5 more second multicast packets are needed. In contrast, after receiving 50 second multicast packets, smart device 110 may determine that no more second multicast packets are needed. If additional second multicast packets are needed to determine the Wi-Fi SSID and/or password, smart device 110 returns to step 316. Otherwise, smart device 110 proceeds to step 320.
  • In step 320, smart device 110 determines the Wi-Fi SSID and password according to the received second multicast packets. Smart device 110 may arrange the byte(s) of Wi-Fi connection information carried by each second multicast packet in an order consistent with the corresponding serial number to assemble the correct Wi-Fi SSID and password.
  • In step 322, smart device 110 connects to the Wi-Fi network according to the Wi-Fi SSID and password. This step is similar to step 306.
  • In step 324, smart device 110 connects to cloud server 140 through the Wi-Fi network. In one embodiment, smart device 110 may report a password associated with smart device 110 to cloud server. Such password may be preset by the manufacturer of smart device 110. In another embodiment, cloud server 140 may assign a password to smart device 110.
  • In step 326, terminal 120 searches for smart device 110 in the Wi-Fi network, and acquires an IP address and a UID of smart device 110. In one embodiment, the UID may be a MAC address of smart device 110. Terminal 120 may use the UID to query cloud server 140 as to whether a binding relationship has been formed between smart device 110 and terminal 120. If no binding relationship has been formed, terminal 120 may prompt the user to bind smart device 110 to terminal 120.
  • In step 328, terminal 120 triggers smart device 110 to generate a notification indicating the password associated with smart device 110. For example, if the user instructs terminal 120 to form a binding relationship between smart device 110 and terminal 120, terminal 120 may use the IP address of smart device 110 to run a common gateway (CGI) script on smart device 110 to trigger the broadcasting of the password by smart device 110 in a voice form.
  • In step 330, terminal 120 sends the password associated with smart device 110 to cloud server 140 for verification. After hearing the password, the user may enter the password in terminal 120, which then passes the password to cloud server 140 for verification.
  • In step 332, cloud server 140 verifies the password received from terminal 120 and forms a binding relationship between smart device 110 and terminal 120. This step is similar to steps 208 and 210 shown in FIG. 2. After the binding relationship is formed, cloud server 140 may instruct smart device 110 to stop the notification of the password, e.g., stop broadcasting the password.
  • By using IP multicast, method 300 enables smart device 110 to obtain the Wi-Fi connection information and to further connect to the Wi-Fi network. Method 300 does not require a user to directly operate on smart device 110, and thus is particularly suitable for smart devices that have no user interface or only have limited capabilities for user-machine interaction. Moreover, method 300 does not require a wired connection for smart device 110 and is largely automated, and thus provides a fast and convenient solution to establish communication between smart device 110 and terminal 120.
  • FIG. 4 is a flowchart of a method 400 for establishing communication between a terminal and a smart device, according to an exemplary embodiment. For example, method 400 may be used in system 100. In particular, smart device 110 may have capabilities to acquire and analyze image information. For example, smart device 110 may be a smart camera or a device equipped with a camera. Referring to FIG. 4, method 400 may include the following steps 402-424.
  • In step 402, terminal 120 detects a Wi-Fi network.
  • In step 404, terminal 120 obtains information for connecting to the Wi-Fi network.
  • In step 406, terminal 120 connects to the Wi-Fi network according to the Wi-Fi connection information.
  • In exemplary embodiments, steps 402-406 are similar to steps 302-306 shown in FIG. 3.
  • In step 408, terminal 120 obtains a unique identifier (UID) from cloud server 140. The UID may be used for identifying a binding relationship to be formed between a smart device 110 and a terminal 130. In exemplary embodiments, terminal 120 may be installed with an application for establishing communication between smart device 110 and terminal 120. After connecting to the Wi-Fi network, the application may instruct terminal 120 to send a request to cloud server 140 for generating the UID. Cloud server 140 may set a time limit for the UID, so that the UID will expire after a predetermined time. For example, the UID may include a time stamp indicating when the UID is generated and for how long it is valid.
  • In step 410, terminal 120 generates a graphic code, such as a two-dimensional quick response (QR) code, according to the Wi-Fi connection information and the UID. The SSIDs and passwords associated with different routers may be set by the router manufacturers according to different formats, such as UTF-8, GB 2312, ASCII, etc. Some formats may introduce special characters into the QR code, later causing failures during decoding of the QR code. Thus, before generating the QR code, terminal 120 may convert the SSID and password into a uniform format. Terminal 120 may then use the converted SSID and password to generate the QR code according to any method known in the art. Moreover, an encryption method may be used in generating the QR code to prevent an unauthorized device from deciphering the QR code.
  • In step 412, terminal 120 displays the QR code on a screen of terminal 120. The size of the displayed QR code may be adjustable. For example, if terminal 120 has a touch screen, the user may enlarge or shrink the QR code by pinch two fingers together or move the fingers apart on the screen.
  • In step 414, smart device 110 scans the QR code displayed by terminal 120. FIG. 5 is a schematic diagram illustrating an implementation of method 400, according to an exemplary embodiment. Referring to FIG. 5, the user may hold terminal 120 in front of smart device 110 and facing the QR code to the imaging direction of smart device 110. Several methods may be used to increase the success rate of the scanning. The user may separate smart device 110 and terminal 120 in a distance approximately equal to the height of terminal 120. For example, a tablet computer may be kept from smart device 110 in a longer distance than a mobile phone, because the tablet computer is usually bigger than the mobile phone. Furthermore, as described above, the user may adjust the size of the displayed QR code to enable smart device 110 to take a clear image of the full QR code. Smart device 110 may have signal lights or a speaker configured to inform the user whether the scanning is successful. For example, smart device 110 may use a certain color of signal lights or a prompting sound to inform the user that the scanning is unsuccessful. Based on this feedback, the user may further adjust the distance, the height, and the size of the displayed QR code until the scanning succeeds.
  • In step 416, smart device 110 decodes the scanned QR code to extract the Wi-Fi connection information and UID. As described in step 404, the QR code may be generated from SSIDs and passwords that are pre-converted into a uniform format. Thus, smart device 110 may use the same decoding method for SSIDs and passwords that are originally in different formats. This way, the compatibility of smart device 110 may be improved.
  • In step 418, smart device 110 connects to the Wi-Fi network according to the Wi-Fi connection information. This step is similar to step 306 shown in FIG. 3.
  • In step 420, smart device 110 sends the UID to cloud server 140.
  • In step 422, cloud server 140 determines whether the UID is invalid or has expired. After receiving the UID from smart device 110, cloud server 140 may analyze the time stamp associated the UID to determine whether the UID is timely.
  • In step 424, if the UID is valid and timely, cloud server 140 forms a binding relationship between smart device 110 and terminal 120. If the UID is invalid or has expired, cloud server 140 may inform terminal 120 that the binding has failed. Smart device 110 may then generate an error message, e.g., flashing a signal lights or making a beeping sound, indicating the binding has failed. Steps 408-424 need to be executed again to establish the communication between smart device 110 and terminal 120
  • Method 400 can quickly establish communication between smart device 110 and terminal 120 because it is easy to use and the success rate of scanning a QR code is high. Moreover, because the QR code is not transmitted over the Wi-Fi network, method 400 may be used under an unstable Wi-Fi condition and to reduce the probability of unauthorized interception.
  • By using methods 200-400, one terminal may be bound with a plurality of smart devices, and one smart device may also be bound with a plurality of terminals. After smart device 110 is bound to terminal 120, terminal 120 may connect to smart device 110 and exchange data with smart device 110.
  • FIG. 6 is a flowchart of a method 600 for establishing communication between a terminal and a smart device that has been bound to the terminal, according to an exemplary embodiment. For example, method 600 may be used in system 100. In particular, a binding relationship has already been formed between smart device 110 and terminal 120. Method 600 may be used at any time when terminal 120 decides to exchange information with smart device 110. Referring to FIG. 6, method 600 may include the following steps 602-610.
  • In step 602, terminal 120 retrieves a UID, a user name, and a password associated with smart device 110. In exemplary embodiments, terminal 120 may save in its memory a list of devices that have been bound with terminal 120. The device list may include the UID, the user name, and the password associated with each device.
  • In step 604, terminal 120 connects to cloud server 140 and inquires about a current operating status of smart device 110. Cloud server 140 may be configured as a peer-to-peer (P2P) server to facilitate the forming of a P2P connection between smart device 110 and terminal 120 using any method known in the art. Cloud server 140 may also be configured to store and manage the user names and passwords associated with smart device 110. After connecting to cloud server 140, terminal 120 may send the UID associated with smart device 110 to cloud 140 for status verification. Cloud server 140 may detect whether smart device 110 is connected to a network. Cloud server may also determine whether smart device 110 is operating normally and available for make a connection with terminal 120. If smart device 110 is available, terminal 120 may proceed to step 606. Otherwise, terminal 120 may end method 600.
  • In step 606, terminal 120 forms a P2P connection to smart device 110.
  • In step 608, terminal 120 sends the user name and password to smart device for verification. If the verification is successful, terminal 120 may start to exchange information with smart device 110 and method 600 ends. In many situations, however, cloud server 140 may periodically change the password associated with smart device 110 to ensure data security. If the password used by smart device 110 has expired, the verification will be unsuccessful and terminal 110 proceeds to step 610.
  • In step 610, if the verification is unsuccessful, terminal 120 obtains from cloud server 140 an updated password associated with smart device 110 and sends the updated password to smart device 110 for re-validation. While still maintaining the P2P connection to smart device 110, terminal 120 may request cloud server 140 to send the updated password. If the smart device 110 verifies the updated password, terminal 120 may start to exchange information with smart device 110. Moreover, terminal 120 may save the updated password in its memory for future use.
  • In exemplary embodiments, terminal 120 may initiate method 600 when a user turns on terminal 120, when terminal 120 connects to a network, or when terminal 120 starts an application for managing one or more devices that are bound to terminal 120. Terminal 120 may perform method 600 for each bound device so that terminal 120 can be ready for communicating with these devices. This way, a user may later use terminal 120 to exchange information with smart device 110 without experiencing significant system delay. For example, if smart device 110 is a smart camera bound to terminal 120, terminal 120 may perform method 600 once the terminal is turned on. When a user later runs a smart camera application, terminal 120 may immediately obtain and display real-time video information captured by the smart camera, without spending time establishing communication with the smart camera.
  • FIG. 7 is a block diagram of a device 700 for establishing communication between a terminal and a smart device, according to an exemplary embodiment. For example, device 700 may be implemented as smart device 110 or terminal 120. Referring to FIG. 7, device 700 may include one or more of the following components: a processing component 702, a memory 704, a power component 706, a multimedia component 708, an audio component 710, an input/output (I/O) interface 712, a sensor component 714, and a communication component 716.
  • Processing component 702 may be configured to control overall operations of device 700, such as the operations associated with display, telephone calls, data communications, camera operations, and recording operations. Processing component 702 may include one or more processors 720 to execute instructions to perform all or part of the steps in the above described methods. Moreover, processing component 702 may include one or more modules which facilitate the interaction between processing component 702 and other components. For instance, processing component 702 may include a multimedia module to facilitate the interaction between multimedia component 708 and processing component 702.
  • Memory 704 may be configured to store various types of data to support the operation of device 700. Examples of such data include instructions for any applications or methods operated on device 700, contact data, phonebook data, messages, pictures, video, etc. Memory 704 may be implemented using any type of volatile or non-volatile memory devices, or a combination thereof, such as a static random access memory (SRAM), an electrically erasable programmable read-only memory (EEPROM), an erasable programmable read-only memory (EPROM), a programmable read-only memory (PROM), a read-only memory (ROM), a magnetic memory, a flash memory, or a magnetic or optical disk.
  • Power component 706 may provide power to various components of device 700. Power component 706 may include a power management system, one or more power sources, and any other components associated with the generation, management, and distribution of operating power in device 700.
  • Multimedia component 708 may include a screen providing an output interface between device 700 and the user. In some embodiments, the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes the touch panel, the screen may be implemented as a touch screen to receive input signals from the user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensors may not only sense a boundary of a touch or swipe action, but also sense a period of time and a pressure associated with the touch or swipe action. In some embodiments, multimedia component 708 may include a front camera and/or a rear camera. The front camera and/or the rear camera may receive external multimedia data while device 700 is in an operation mode, such as a photographing mode or a video mode. Each of the front camera and the rear camera may be a fixed optical lens system or have focus and optical zoom capability.
  • Audio component 710 may be configured to output and/or input audio signals. For example, audio component 710 may include a microphone configured to receive an external audio signal when device 700 is in an operation mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signal may be further stored in memory 704 or transmitted via communication component 716. In some embodiments, audio component 710 may further include a speaker to output audio signals.
  • I/O interface 712 may provide an interface between processing component 702 and peripheral interface modules, such as a keyboard, a click wheel, buttons, and the like. The buttons may include, but are not limited to, a home button, a volume button, a starting button, and a locking button.
  • Sensor component 714 may include one or more sensors to provide status assessments of various aspects of device 700. For instance, sensor component 714 may detect an on/off status of device 700, relative positioning of components, e.g., the display and the keypad, of device 700, a change in position of device 700 or a component of device 700, a presence or absence of user contact with device 700, an orientation or an acceleration/deceleration of device 700, and a change in temperature of device 700. Sensor component 714 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact. Sensor component 714 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, sensor component 714 may also include an accelerometer, a gyroscope, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • Communication component 716 may be configured to facilitate communication, wired or wirelessly, between the device 700 and other devices. Device 700 may access a wireless network based on one or more communication standard, such as Wi-Fi, LTE, 2G, 3G, 4G, 5G, etc. In one exemplary embodiment, communication component 716 may receive a broadcast signal or broadcast associated information from an external broadcast management system via a broadcast channel In one exemplary embodiment, communication component 716 may further include a near field communication (NFC) module to facilitate short-range communications. In other embodiments, communication component 716 may be implemented based on a radio frequency identification (RFID) technology, an infrared data association (IrDA) technology, an ultra-wideband (UWB) technology, a Bluetooth (BT) technology, or other technologies.
  • In exemplary embodiments, device 700 may be implemented with one or more application-specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gate arrays (FPGAs), controllers, micro-controllers, microprocessors, or other electronic components, for performing the above described methods.
  • In exemplary embodiments, there is also provided a non-transitory computer-readable storage medium including instructions, such as included in memory 704, executable by processor 720 in the device 700, for performing the above-described methods. For example, the non-transitory computer-readable storage medium may be a read-only memory (ROM), a random access memory (RAM), a CD-ROM, a magnetic tape, a memory chip (or integrated circuit), a hard disc, a floppy disc, an optical data storage device, or the like.
  • Other embodiments of the present disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the present disclosure. This application is intended to cover any variations, uses, or adaptations of the present disclosure following the general principles thereof and including such departures from the present disclosure as come within known or customary practice in the art. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
  • It will be appreciated that the present invention is not limited to the exact constructions that are described above and illustrated in the accompanying drawings, and that various modifications and changes can be made without departing from the scope thereof. It is intended that the scope of the invention should only be limited by the appended claims.

Claims (49)

1. A method for establishing communication between a device and a terminal, comprising:
receiving a plurality of multicast packets from the terminal;
determining, according to the multicast packets, wireless connection information of a wireless network;
connecting to the wireless network according to the wireless connection information; and
generating a notification indicating a password associated with the device.
2. The method according to claim 1, wherein receiving the multicast packets from the terminal comprises:
scanning a plurality of multicast channels;
receiving, on one or more of the multicast channels, one or more first multicast packets from the terminal;
determining, according to the one or more first multicast packets, an identification of the terminal; and
if the identification of the terminal matches a predetermined identification, locking the one or more multicast channels.
3. The method according to claim 2, further comprising:
determining, according to the one or more first multicast packets, a length of a wireless password associated with the wireless network.
4. The method according to claim 3, further comprising:
receiving, on the one or more locked multicast channels, one or more second multicast packets from the terminal, each second multicast packet, comprising a serial number and at least a part of the wireless password corresponding to the serial number;
determining, according to the length of the wireless password and the serial numbers in the received second multicast packets, whether to receive additional second multicast packets; and
if no additional second multicast packets need to be received, determining the wireless password according to the received second multicast packets.
5. The method according to claim 2, wherein scanning the multicast channels further comprises:
if the multicast channels have different usage frequencies, first scanning multicast channels with usage frequencies that are above a predetermined frequency.
6. A device for communication with a terminal, comprising:
a memory storing instructions; and
a processor configured to execute the instructions to:
receive a plurality of multicast packets from the terminal;
determine, according to the multicast packets, wireless connection information of a wireless network;
connect to the wireless network according to the wireless connection information; and
generate a notification indicating a password associated with the device.
7. The device according to claim 6, wherein the processor is further configured to execute the instructions to:
scan a plurality of multicast channels;
receive, on one or more of the multicast channels, one or more first multicast packets from the terminal;
determine, according to the received first multicast packets, an identification of the terminal; and
if the identification of the terminal matches a predetermined identification, lock the one or more multicast channels.
8. The device according to claim 7, wherein the processor is further configured to execute the instructions to:
determine, according to the received first multicast packets, a length of a wireless password associated with the wireless network.
9. The device according to claim 8, wherein the processor is further configured to execute the instructions to:
receive, on the one or more locked multicast channels, one or more second multicast packets from the terminal, each second multicast packet comprising a serial number and at least a part of the wireless password corresponding to the serial number;
determine, according to the length of the wireless password and the serial numbers in the received second multicast packets, whether to receive additional second multicast packets; and
if no additional second multicast packets need to be received, determine the wireless password according to the second multicast packets.
10. The device according to claim 7, wherein the processor is further configured to execute the instructions to:
if the multicast channels have different usage frequencies, first scan multicast channels with usage frequencies that are above a predetermined frequency.
11. A non-transitory computer-readable storage medium storing instructions for establishing communication between a device and a terminal, the instructions causing a processor to perform operations comprising:
receiving a plurality of multicast packets from the terminal;
determining, according to the multicast packets, wireless connection information of a wireless network;
connecting to the wireless network according to the wireless connection information; and
generating a notification indicating a password associated with the device.
12. The non-transitory computer-readable storage medium of claim 11, wherein receiving the multicast packets from the terminal comprises:
scanning a plurality of multicast channels;
receiving, on one or more of the multicast channels, one or more first multicast packets from the terminal;
determining, according to the one or more first multicast packets, an identification of the terminal; and
if the identification of the terminal matches a predetermined identification, locking the one or more multicast channels.
13. The non-transitory computer-readable storage medium of claim 12, wherein the operations further comprise:
determining, according to the received first multicast packets, a length of a wireless password associated with the wireless network.
14. The non-transitory computer-readable storage medium of claim 13, wherein the operations further comprise:
receiving, on the one or more locked multicast channels, one or more second multicast packets from the terminal, each second multicast packet comprising a serial number and at least a part of the wireless password corresponding to the serial number;
determining, according to the length of the wireless password and the serial numbers in the received second multicast packets, whether to receive additional second multicast packets; and
if no additional second multicast packets need to be received, determining the wireless password according to the received second multicast packets.
15. The non-transitory computer-readable storage medium of claim 12, wherein scanning the multicast channels further comprises:
if the multicast channels have different usage frequencies, first scanning multicast channels with usage frequencies that are above a predetermined frequency.
16. A method for establishing communication between a device and a terminal, comprising:
obtaining wireless connection information of a wireless network;
generating a plurality of multicast packets including wireless connection information of the wireless network;
sending the multicast packets to the device; and
after the device is connected to the wireless network, trigger the device to generate a notification indicating a password associated with the device.
17. The method according to claim 16, wherein
the plurality of multicast packets comprise one or more first multicast packets and one or more second multicast packets; and
generating the plurality of multicast packets further comprises:
writing into the one or more first multicast packets an identification of the terminal and a length of a wireless password associated with the wireless network; and
writing into each second multicast packet a serial number and at least a part of the wireless password corresponding to the serial number.
18. The method according to claim 16, wherein generating the plurality of multicast packets further comprises:
encrypting the information included in the plurality of multicast packets.
19. A terminal, comprising:
a memory storing instructions; and
a processor configured to execute the instructions to:
obtain wireless connection information of a wireless network;
generate a plurality of multicast packets including wireless connection information of the wireless network;
send the multicast packets to a device; and
after the device is connected to the wireless network, trigger the device to generate a notification indicating a password associated with the device.
20. The terminal according to claim 19, wherein
the plurality of multicast packets comprise one or more first multicast packets and one or more second multicast packets; and
the processor is further configured to execute the instructions to:
write into the one or more first multicast packets an identification of the terminal and a length of a wireless password associated with the wireless network; and
write into each second multicast packet a serial number and at least a part of the wireless password corresponding to the serial number.
21. The terminal according to claim 19, wherein the processor is further configured to:
encrypting the information included in the multicast packets.
22. A non-transitory computer-readable storage medium storing instructions for establishing communication between a device and a terminal, the instructions causing a processor to perform operations comprising:
obtaining wireless connection information of a wireless network;
generating a plurality of multicast packets including wireless connection information of the wireless network;
sending the multicast packets to the device; and
after the device is connected to the wireless network, trigger the device to generate a notification indicating a password associated with the device.
23. The non-transitory computer-readable storage medium of claim 22, wherein
the plurality of multicast packets comprise one or more first multicast packets and one or more second multicast packets; and
the operations further comprise:
writing into the one or more first multicast packets an identification of the terminal and a length of a wireless password associated with the wireless network; and
writing into each second multicast packet a serial number and at least a part of the wireless password corresponding to the serial number.
24. The non-transitory computer-readable storage medium of claim 22, wherein the operations further comprise:
encrypting the information included in the multicast packets.
25. A method for establishing communication between a device and a terminal, comprising:
receiving, by the terminal, wireless connection information of a wireless network and a UID, the wireless connection information being associated with a format set;
determining, by the terminal, whether the format set introduces special characters into a graphic code;
converting the wireless connection information into a uniform format when the format set introduces special characters;
generating, by the terminal, the graphic code according to the wireless connection information and the UID;
displaying the code by the terminal;
scanning the code by the device;
decoding, by the device, the code to extract the wireless connection information and the UID; and
connecting, by the device, to the wireless network according to the wireless connection information.
26. The method according to claim 25, wherein the code comprises a QR code.
27. The method according to claim 25, wherein generating the code further comprises:
encrypting the wireless connection information and UID; and
generating the code, according to the encrypted wireless connection information and UID.
28. The method according to claim 25, wherein the UID is a server-generated UID, the method further comprising:
sending, by the device, the UID to the server;
determining, by the server, whether the UID has expired; and
if the UID has not expired, establishing, by the server, a binding relationship between the device and the terminal.
29. The method according to claim 28, further comprising:
if the UID has expired, generating, by the device, an error message indicating that the binding between the device and the terminal has failed.
30. The method according to claim 25, wherein the device comprises a camera.
31. The method according to claim 25, wherein the terminal comprises a display
32. A device for communication with a terminal, comprising:
a camera configured to scan a QR code displayed by the terminal;
a memory storing instructions; and
a processor configured to execute the instructions to:
decode the QR code to extract the wireless connection information; and
connect to the wireless network according to the wireless connection information,
wherein,
the terminal generates the QR code according to converted wireless connection information of a wireless network,
the converted wireless connection information being wireless connection information converted into a uniform format when the terminal determines a format associated with the wireless connection information introduces special characters into the QR code.
33. The device according to claim 32, wherein:
the QR code is further coded according to a UID; and
the processor is further configured to execute the instructions to decode the QR code to extract the UID.
34. The device according to claim 33, wherein the processor is further configured to execute the instructions to:
receive, from a server, a notification that the UID has expired; and
if the UID has expired, generate an error message indicating that the binding between the device and the terminal has failed.
35. A non-transitory computer-readable storage medium storing instructions for establishing communication between a device and a terminal, the instructions causing a processor to perform operations comprising:
receiving a QR code displayed by the terminal, the QR code being coded by the terminal according to converted wireless connection information of a wireless network, the converted wireless connection information being wireless connection information converted into a uniform format when the terminal determines a format associated with the wireless connection information introduces special characters into the QR code;
decode the QR code to extract the wireless connection information; and
connect to the wireless network according to the wireless connection information.
36. The non-transitory computer-readable storage medium of claim 35, wherein:
the QR code is further coded according to a UID; and
the operations further comprises decoding the QR code to extract the UID.
37. The non-transitory computer-readable storage medium of claim 36, wherein the operations further comprise:
receiving, from a server, a notification that the UID has expired; and
if the UID has expired, generating an error message indicating that the binding between the device and the terminal has failed.
38. A method for establishing communication between a terminal and a device, comprising:
determining that a condition has occurred;
retrieving, from a memory of the terminal, a user name, and a password of the device;
forming a P2P connection between the terminal and the device;
sending the user name and password to the device for verification; and
if the verification fails, obtaining from a server an updated password of the device.
39. The method according to claim 38, further comprising:
saving the updated password in the memory.
40. The method according to claim 38, wherein the condition comprises at least one of:
the terminal is turned on;
the terminal is connected to a network; or
the terminal has started an application for managing a device bound to the terminal.
41. The method according to claim 38, further comprising:
retrieving, from the memory, a UID of the device;
querying, based on the UID, the server regarding availability status of the device; and
if the device is available for connection, forming the P2P connection.
42. A terminal, comprising:
a memory storing:
instructions, and
a UID, a user name, and a password for a device; and
a processor configured to execute the instructions to:
determine that a condition has occurred;
retrieve the user name, and the password of the device;
form a P2P connection to the device;
send the user name and password to the device for verification; and
if the verification fails, obtain from a server an updated password of the device.
43. The terminal according to claim 42, wherein the processor is further configured to execute the instructions to:
save the updated password in the memory.
44. The terminal according to claim 42, wherein the condition comprises at least one of:
the terminal is turned on;
the terminal is connected to a network; or
the terminal has started an application for managing a device bound to the terminal.
45. The terminal according to claim 42, wherein the processor is further configured to execute the instructions to:
retrieve the UID of the device;
query, based on the UID, the server regarding availability status of the device; and
if the device is available for connection, form the P2P connection.
46. A non-transitory computer-readable storage medium storing instructions for establishing communication between a device and a terminal, the instructions causing a processor to perform operations comprising:
determining that a condition has occurred;
retrieving, from a memory of the terminal, a user name and a password of the device;
forming a P2P connection between the terminal and the device;
sending the user name and password to the device for verification; and
if the verification fails, obtaining from a server an updated password of the device.
47. The non-transitory computer-readable storage medium of claim 46, wherein the operations further comprise:
saving the updated password in the memory.
48. The non-transitory computer-readable storage medium of claim 46, wherein the condition comprises at least one of:
the terminal is turned on;
the terminal is connected to a network; or
the terminal has started an application for managing one or more devices bound to the terminal.
49. The non-transitory computer-readable storage medium of claim 46, wherein the operations further comprise:
retrieving, from the memory, a UID of the device;
querying, based on the UID, the server regarding availability status of the device; and
if the device is available for connection, forming the P2P connection.
US15/151,619 2016-03-02 2016-05-11 Communication systems and methods Abandoned US20170257475A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US15/414,313 US10038772B2 (en) 2016-03-02 2017-01-24 Communication systems and methods
US15/418,968 US10038773B2 (en) 2016-03-02 2017-01-30 Communication systems and methods
US15/419,366 US10178215B2 (en) 2016-03-02 2017-01-30 Communication systems and methods

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610117954.XA CN105682253A (en) 2016-03-02 2016-03-02 Method and equipment for communication establishment, terminal and computer readable storage medium
CN201610117954.X 2016-03-02

Related Child Applications (3)

Application Number Title Priority Date Filing Date
US15/414,313 Division US10038772B2 (en) 2016-03-02 2017-01-24 Communication systems and methods
US15/419,366 Division US10178215B2 (en) 2016-03-02 2017-01-30 Communication systems and methods
US15/418,968 Division US10038773B2 (en) 2016-03-02 2017-01-30 Communication systems and methods

Publications (1)

Publication Number Publication Date
US20170257475A1 true US20170257475A1 (en) 2017-09-07

Family

ID=56306503

Family Applications (4)

Application Number Title Priority Date Filing Date
US15/151,619 Abandoned US20170257475A1 (en) 2016-03-02 2016-05-11 Communication systems and methods
US15/414,313 Active US10038772B2 (en) 2016-03-02 2017-01-24 Communication systems and methods
US15/419,366 Active US10178215B2 (en) 2016-03-02 2017-01-30 Communication systems and methods
US15/418,968 Active US10038773B2 (en) 2016-03-02 2017-01-30 Communication systems and methods

Family Applications After (3)

Application Number Title Priority Date Filing Date
US15/414,313 Active US10038772B2 (en) 2016-03-02 2017-01-24 Communication systems and methods
US15/419,366 Active US10178215B2 (en) 2016-03-02 2017-01-30 Communication systems and methods
US15/418,968 Active US10038773B2 (en) 2016-03-02 2017-01-30 Communication systems and methods

Country Status (2)

Country Link
US (4) US20170257475A1 (en)
CN (2) CN109391634A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180034772A1 (en) * 2016-07-29 2018-02-01 Beijing Xiaomi Mobile Software Co., Ltd. Method and apparatus for bluetooth-based identity recognition
WO2018175395A1 (en) * 2017-03-20 2018-09-27 Carrier Corporation A method of provisioning headless devices of a wireless communication system
US20180357870A1 (en) * 2017-06-07 2018-12-13 Amazon Technologies, Inc. Behavior-aware security systems and associated methods
EP3425994A1 (en) * 2017-07-04 2019-01-09 Shanghai Xiaoyi Technology Co., Ltd. Device-pairing method and system therefor
US20190141614A1 (en) * 2016-05-13 2019-05-09 Huawei Technologies Co., Ltd. Wi-Fi Configuration Method, Wi-Fi Mobile Terminal, And Wi-Fi Device
US20190174310A1 (en) * 2016-08-10 2019-06-06 Canon Kabushiki Kaisha Communication device, communication method, and storage medium
EP3882778A4 (en) * 2018-11-14 2022-06-22 Connectfree Corporation Information processing method, information processing program, information processing device, and information processing system
US20220286577A1 (en) * 2021-03-04 2022-09-08 Seiko Epson Corporation Image reader and method of setting wireless setup information for image reader

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106211359B (en) * 2016-07-18 2020-01-03 上海小蚁科技有限公司 Method and device for enabling device to obtain service
CN106571986B (en) * 2016-10-09 2021-01-26 美的智慧家居科技有限公司 Network distribution method and system of household appliance, household appliance and router
CN106454812A (en) * 2016-10-24 2017-02-22 深圳创维数字技术有限公司 Method and device for receiving data
CN107426725A (en) * 2017-04-12 2017-12-01 深圳市友悦机器人科技有限公司 Radio network configuration device, intelligent terminal and internet of things equipment
CN107426798B (en) * 2017-05-10 2020-08-14 广东美的制冷设备有限公司 WIFI module network distribution method and device
MX2019003707A (en) * 2017-08-15 2019-07-01 Gen Electric Method and apparatus for device finding after network configuration.
CN107749813B (en) * 2017-09-13 2020-11-06 珠海格力电器股份有限公司 Account management method, device, storage medium, equipment, server and terminal
CN107770835B (en) * 2017-09-26 2022-05-17 上海尚往网络科技有限公司 Method, equipment and computer storage medium for connecting wireless access point
CN108306938B (en) * 2017-12-29 2021-08-24 青岛海尔科技有限公司 Method and device for automatically accessing internet of things product and gateway
JP2019125079A (en) * 2018-01-15 2019-07-25 株式会社リコー Information processing system, information processing apparatus, information processing method, and program
CN110661640A (en) * 2018-06-29 2020-01-07 北京小米移动软件有限公司 Network setting method, device and system
CN110830336A (en) * 2019-10-30 2020-02-21 青岛海信智慧家居系统股份有限公司 WiFi equipment management method and device for smart home
CN111372297B (en) * 2020-03-17 2022-02-22 展讯通信(上海)有限公司 Odd-even packet-based WiFi network distribution method, equipment, device and storage medium
US11204975B1 (en) * 2020-08-10 2021-12-21 Coupang Corp. Program interface remote management and provisioning
US20230084235A1 (en) * 2021-09-13 2023-03-16 Cisco Technology, Inc. Concealing low power mobile device address during advertisement

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120136698A1 (en) * 2010-06-02 2012-05-31 Kent Carl E Barcode enabled coupon search, retrieval, presentation and redemption via telecommunications devices
US20150154592A1 (en) * 2012-06-08 2015-06-04 James Ioannidis Authorizing a transaction between a client device and a server using a scannable code
US20150269331A1 (en) * 2014-03-24 2015-09-24 Nimbus Technologies Inc. System and method for securing, and providing secured access to encrypted global identities embedded in a qr code
US20160012465A1 (en) * 2014-02-08 2016-01-14 Jeffrey A. Sharp System and method for distributing, receiving, and using funds or credits and apparatus thereof
US9373204B1 (en) * 2012-04-26 2016-06-21 Motio, Inc. System and method for ticket validation
US20170124441A1 (en) * 2013-11-07 2017-05-04 Scantrust Sa Two dimensional barcode and method of authentication of such barcode

Family Cites Families (56)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006042223A (en) 2004-07-30 2006-02-09 Hitachi Communication Technologies Ltd Packet transport unit
KR100566296B1 (en) 2004-10-08 2006-03-30 삼성전자주식회사 Method for accessing subscriber identity module in complex mobile terminal
US7467302B2 (en) 2004-11-19 2008-12-16 Alpha Networks Inc. Secure connection mechanism capable of automatically negotiating password between wireless client terminal and wireless access terminal
US8614833B2 (en) 2005-07-21 2013-12-24 Fuji Xerox Co., Ltd. Printer, printer driver, printing system, and print controlling method
US8255753B2 (en) * 2007-12-04 2012-08-28 Intel Corporation Encoding/decoding technique for rebroadcasting lost packets
US9357352B1 (en) 2008-01-10 2016-05-31 Wireless Discovery Llc Location-based discovery of network members by personal attributes using dynamic and static location data
US8879994B2 (en) 2009-10-02 2014-11-04 Blackberry Limited Methods and devices for facilitating Bluetooth pairing using a camera as a barcode scanner
CN101902476B (en) * 2010-07-27 2013-04-24 浙江大学 Method for authenticating identity of mobile peer-to-peer user
US10586227B2 (en) 2011-02-16 2020-03-10 Visa International Service Association Snap mobile payment apparatuses, methods and systems
US10223691B2 (en) 2011-02-22 2019-03-05 Visa International Service Association Universal electronic payment apparatuses, methods and systems
US20120214416A1 (en) 2011-02-23 2012-08-23 Jonathan Douglas Kent Methods and apparatuses for communication between devices
US8903978B2 (en) 2011-06-14 2014-12-02 Sonifi Solutions, Inc. Method and apparatus for pairing a mobile device to an output device
US20130217333A1 (en) * 2012-02-22 2013-08-22 Qualcomm Incorporated Determining rewards based on proximity of devices using short-range wireless broadcasts
CN102710612B (en) 2012-05-11 2016-06-29 张伟 Realize method and the device of interactive communication application in many ways
US8752757B2 (en) 2012-06-14 2014-06-17 General Electric Company Device pairing using digital barcoding
WO2014037980A1 (en) 2012-09-07 2014-03-13 Necカシオモバイルコミュニケーションズ株式会社 Wireless communication system, wireless communication method, mobile terminal, information processing device, and program
US9338130B2 (en) 2013-02-11 2016-05-10 Broadcom Corporation Apparatus and method to register Wi-Fi clients on a Wi-Fi network
US9576286B1 (en) 2013-03-11 2017-02-21 Groupon, Inc. Consumer device based point-of-sale
US10735408B2 (en) * 2013-03-14 2020-08-04 Samsung Electronics Co., Ltd. Application connection for devices in a network
US9100942B2 (en) 2013-03-14 2015-08-04 Qualcomm Incorporated WiFi Direct connection using machine-readable labels
TWI489900B (en) 2013-03-20 2015-06-21 瑞昱半導體股份有限公司 Wireless network system and connecting method thereof
US20140364151A1 (en) 2013-06-10 2014-12-11 Michael Aron Schiff Location based mobile device linking system using short link codes
US10069679B2 (en) 2013-06-14 2018-09-04 Tencent Technology (Shenzhen) Company Limited Method, system, and device for initializing a media equipment
CN103326867B (en) * 2013-07-15 2019-03-29 上海果壳电子有限公司 A kind of intelligent ring with short distance authentication ability
CN103414881B (en) * 2013-08-15 2016-06-08 中国科学院软件研究所 A kind of Active Eyes quickly configuration method
CA3130169A1 (en) * 2013-10-07 2015-04-16 Google Llc Smart home device facilitating user-friendly setup experience
US9226119B2 (en) * 2013-11-20 2015-12-29 Qualcomm Incorporated Using sensor data to provide information for proximally-relevant group communications
CN104144034B (en) 2013-12-04 2016-04-13 腾讯科技(深圳)有限公司 Password is shared and acquisition methods and device
US9240982B2 (en) 2013-12-27 2016-01-19 Canon Information And Imaging Solutions, Inc. Method for associating an image-forming device, a mobile device, and a user
JP5733444B1 (en) 2014-03-12 2015-06-10 富士ゼロックス株式会社 Image processing apparatus and program
US10158536B2 (en) 2014-05-01 2018-12-18 Belkin International Inc. Systems and methods for interaction with an IoT device
US20150312240A1 (en) 2014-04-29 2015-10-29 Altek Corporation Wireless automatic pairing method, method of establishing connection, and wireless access point device
CN105242126B (en) * 2014-07-07 2018-08-07 中国科学院空间科学与应用研究中心 A kind of high orbit satellite static discharge monitoring device
US9544636B2 (en) 2014-07-07 2017-01-10 Google Inc. Method and system for editing event categories
US9374365B2 (en) 2014-08-20 2016-06-21 Vmware, Inc. Pushing a virtual desktop session from an authenticated device using image scanning
US10374819B2 (en) 2014-09-19 2019-08-06 Xiaomi Inc. Methods and devices of accessing wireless network
CN104283885B (en) * 2014-10-14 2017-07-28 中国科学院信息工程研究所 A kind of implementation method of many SP secure bindings based on intelligent terminal local authentication
CN104375497B (en) * 2014-12-15 2017-09-29 广东美的厨房电器制造有限公司 Smart home and its control method, control system and electronic equipment
US20170061018A1 (en) 2015-01-02 2017-03-02 Timothy Reynard Isaac MetaSpace: augmented data propagation through speech communication
US9998434B2 (en) * 2015-01-26 2018-06-12 Listat Ltd. Secure dynamic communication network and protocol
US9794784B2 (en) 2015-01-29 2017-10-17 Qualcomm Incorporated Techniques for preventing unauthorized users from controlling modem of mobile device
CN104684106B (en) * 2015-02-02 2018-04-13 上海小蚁科技有限公司 The method and device of network connection
US20160260319A1 (en) 2015-03-04 2016-09-08 Aquimo, Llc Method and system for a control device to connect to and control a display device
US9762392B2 (en) 2015-03-26 2017-09-12 Eurotech S.P.A. System and method for trusted provisioning and authentication for networked devices in cloud-based IoT/M2M platforms
TWI564745B (en) 2015-03-27 2017-01-01 物聯智慧科技(深圳)有限公司 Peer-to-peer (p2p) connecting and establishing method and communication system using the same
CN104735260B (en) * 2015-04-01 2017-06-16 深圳市蜂联科技有限公司 A kind of correlating method for being applied to intelligent terminal
JP2016218600A (en) 2015-05-18 2016-12-22 富士ゼロックス株式会社 Information processing device, image forming device, terminal device, information processing system, and program
US9338638B1 (en) * 2015-05-26 2016-05-10 Nokia Technologies Oy Method, apparatus, and computer program product for wireless device and service discovery
CN104994073B (en) * 2015-05-29 2019-03-19 北京奇虎科技有限公司 Mobile phone terminal, server and its account number and apparatus bound control execute method
CN104936304B (en) * 2015-06-01 2018-09-18 小米科技有限责任公司 Smart machine binding method, smart machine and server
US9854425B2 (en) * 2015-06-16 2017-12-26 Google Inc. Remote alarm hushing
CN105227433A (en) * 2015-07-11 2016-01-06 深圳市美贝壳科技有限公司 Connection method between a kind of mobile terminal and smart machine
US10332096B2 (en) 2015-07-27 2019-06-25 Paypal, Inc. Wireless communication beacon and gesture detection system
US20170054770A1 (en) 2015-08-23 2017-02-23 Tornaditech Llc Multimedia teleconference streaming architecture between heterogeneous computer systems
US9819674B2 (en) 2015-10-29 2017-11-14 Ricoh Company, Ltd. System, apparatus and method for secure operation of image forming device
KR102483832B1 (en) 2016-02-19 2023-01-03 삼성전자주식회사 Method and apparatus for connectiong between electronic devices using authentication based on biometric information

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120136698A1 (en) * 2010-06-02 2012-05-31 Kent Carl E Barcode enabled coupon search, retrieval, presentation and redemption via telecommunications devices
US9373204B1 (en) * 2012-04-26 2016-06-21 Motio, Inc. System and method for ticket validation
US20150154592A1 (en) * 2012-06-08 2015-06-04 James Ioannidis Authorizing a transaction between a client device and a server using a scannable code
US20170124441A1 (en) * 2013-11-07 2017-05-04 Scantrust Sa Two dimensional barcode and method of authentication of such barcode
US20160012465A1 (en) * 2014-02-08 2016-01-14 Jeffrey A. Sharp System and method for distributing, receiving, and using funds or credits and apparatus thereof
US20150269331A1 (en) * 2014-03-24 2015-09-24 Nimbus Technologies Inc. System and method for securing, and providing secured access to encrypted global identities embedded in a qr code

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190141614A1 (en) * 2016-05-13 2019-05-09 Huawei Technologies Co., Ltd. Wi-Fi Configuration Method, Wi-Fi Mobile Terminal, And Wi-Fi Device
US10880817B2 (en) * 2016-05-13 2020-12-29 Huawei Technologies Co., Ltd. Wi-fi configuration method, Wi-Fi mobile terminal, and Wi-Fi device
US20180034772A1 (en) * 2016-07-29 2018-02-01 Beijing Xiaomi Mobile Software Co., Ltd. Method and apparatus for bluetooth-based identity recognition
US10608988B2 (en) * 2016-07-29 2020-03-31 Beijing Xiaomi Mobile Software Co., Ltd. Method and apparatus for bluetooth-based identity recognition
US20190174310A1 (en) * 2016-08-10 2019-06-06 Canon Kabushiki Kaisha Communication device, communication method, and storage medium
US11259177B2 (en) * 2016-08-10 2022-02-22 Canon Kabushiki Kaisha Communication device, communication method, and storage medium
WO2018175395A1 (en) * 2017-03-20 2018-09-27 Carrier Corporation A method of provisioning headless devices of a wireless communication system
US20180357870A1 (en) * 2017-06-07 2018-12-13 Amazon Technologies, Inc. Behavior-aware security systems and associated methods
US10936655B2 (en) 2017-06-07 2021-03-02 Amazon Technologies, Inc. Security video searching systems and associated methods
EP3425994A1 (en) * 2017-07-04 2019-01-09 Shanghai Xiaoyi Technology Co., Ltd. Device-pairing method and system therefor
EP3882778A4 (en) * 2018-11-14 2022-06-22 Connectfree Corporation Information processing method, information processing program, information processing device, and information processing system
US20220286577A1 (en) * 2021-03-04 2022-09-08 Seiko Epson Corporation Image reader and method of setting wireless setup information for image reader

Also Published As

Publication number Publication date
US10038772B2 (en) 2018-07-31
US10038773B2 (en) 2018-07-31
CN105682253A (en) 2016-06-15
US20170257893A1 (en) 2017-09-07
US10178215B2 (en) 2019-01-08
US20170257896A1 (en) 2017-09-07
CN109391634A (en) 2019-02-26
US20170257765A1 (en) 2017-09-07

Similar Documents

Publication Publication Date Title
US10038772B2 (en) Communication systems and methods
US20190014459A1 (en) Device-pairing method and system therefor
US11418388B2 (en) Method for network configuration, and electronic device
EP3823329B1 (en) Network configuration method and device
CN104869612A (en) Method and device for accessing network
CN110389738B (en) Screen projection method, device, terminal and storage medium
CN106211359B (en) Method and device for enabling device to obtain service
EP3200421B1 (en) Method, apparatus and system for accessing wireless local area network
US8542665B2 (en) System and method for network setup of wireless device through a single interface
CN110769485A (en) Method for making target terminal access target wireless network provided by wireless access point
CN105243318A (en) User equipment control right determining method and apparatus and terminal device
US10305900B2 (en) Establishing a secure connection between a master device and a slave device
US9723486B2 (en) Method and apparatus for accessing network
CN110855677B (en) Distribution network method and device, electronic equipment and storage medium
WO2016176962A1 (en) Wireless communication device and wireless communication method
US20190089693A1 (en) Systems and methods for authenticating internet-of-things devices
US20170171794A1 (en) Method and apparatus for acquiring routing information
US20210153208A1 (en) Downlink control information sending method and receiving method, apparatus, and storage medium
US10673611B2 (en) Data transmission method, device, and system
CN112383532B (en) Device networking method and device, electronic device and storage medium
US20190037612A1 (en) Connecting method to an information capture device
CN112512097A (en) Information processing method and device, electronic equipment and storage medium
CN117296351A (en) Relay communication method, relay communication device, relay communication apparatus, and storage medium
CN116889002A (en) Information processing method, apparatus, communication device and storage medium
CN117795915A (en) Application program interface API authentication method, device, communication equipment and storage medium

Legal Events

Date Code Title Description
AS Assignment

Owner name: XIAOLI TECHNOLOGY CO., LTD., CHINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ZONG, LIANG;HE, CHAO;CHEN, YANGCUN;SIGNING DATES FROM 20160425 TO 20160427;REEL/FRAME:038549/0444

AS Assignment

Owner name: XIAOYI TECHNOLOGY CO., LTD., CHINA

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAME PREVIOUSLY RECORDED AT REEL: 038549 FRAME: 0444. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNORS:ZONG, LIANG;HE, CHAO;CHEN, YANGCUN;SIGNING DATES FROM 20160425 TO 20160427;REEL/FRAME:041359/0210

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: SHANGHAI XIAOYI TECHNOLOGY CO., LTD., CHINA

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE RECEIVING PARTY NAME PREVIOUSLY RECORDED AT REEL: 038549 FRAME: 0444. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNORS:ZONG, LIANG;HE, CHAO;CHEN, YANGCUN;SIGNING DATES FROM 20160425 TO 20160427;REEL/FRAME:045195/0554