WO2018152982A1 - 一种电力猫的配对方法以及电力猫 - Google Patents

一种电力猫的配对方法以及电力猫 Download PDF

Info

Publication number
WO2018152982A1
WO2018152982A1 PCT/CN2017/087675 CN2017087675W WO2018152982A1 WO 2018152982 A1 WO2018152982 A1 WO 2018152982A1 CN 2017087675 W CN2017087675 W CN 2017087675W WO 2018152982 A1 WO2018152982 A1 WO 2018152982A1
Authority
WO
WIPO (PCT)
Prior art keywords
power cat
power
cat
nmk
code
Prior art date
Application number
PCT/CN2017/087675
Other languages
English (en)
French (fr)
Inventor
汤云山
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201780008214.5A priority Critical patent/CN108886383B/zh
Publication of WO2018152982A1 publication Critical patent/WO2018152982A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B3/00Line transmission systems
    • H04B3/54Systems for transmission via power distribution lines

Definitions

  • the present application relates to the field of communications, and in particular, to a method for pairing a power cat and a power cat.
  • Power cats also known as power network bridges, use power line communication (PLC) technology to transmit data and media signals using power lines, and power cats are a way to modulate network signals onto wires, using existing A device that solves network cabling problems with wires.
  • PLC power line communication
  • Power Cat not only has the high-speed stability of the network cable, but also has the convenience of mobile wireless network. The application range is wide.
  • the use of power cats is actually a common name for the mode of broadband Internet access through power lines. Power cats can Convert any ordinary power socket in the user's home into a network interface, and you can access the Internet without additional wiring, and have data encryption protection function, and at the same time, it has the security of data transmission.
  • the power cat is usually an external power cat. It is necessary to plug a power cat into a power socket, connect it to the network incoming line through the network cable, and plug another computer cat into the power socket and connect it to the computer through the network cable.
  • NMK network membership key
  • the embodiment of the present application provides a pairing method of a power cat and a power cat for increasing the privacy and security of the network.
  • a first aspect of the present application provides a method for pairing a power cat, including: after the first power cat and the second power cat are powered on, the first power cat receives a networking request message sent by the second power cat, The first power cat further determines, according to the received networking request message, whether the first power cat and the second power cat satisfy the preset pairing condition, and when the first power cat determines that the first power cat and the second power cat satisfy the preset In the pairing condition, the first power cat and the second power cat determine the target NMK code, and complete the pairing of the first power cat and the second power cat according to the target NMK code.
  • the preset pairing condition is met, the first power cat and the second power cat determine the target NMK code to complete the pairing, and the connection is completed without the pairing in the prior art.
  • the first power cat determines, according to the networking request message, whether the first power cat and the second power cat meet the preset pairing condition.
  • the method includes: when the first power cat determines that the signal strength of the networking request message is greater than the first preset value, the first power cat and the second power cat satisfy a preset pairing condition; when the first power cat determines the networking request message When the signal strength is not greater than the first preset value, the first power The cat and the second power cat do not meet the preset pairing conditions.
  • the manner in which the first power cat determines whether the preset pairing condition is met according to the signal strength of the network request message is provided, and the implementation manner of the embodiment of the present application is added.
  • the first power cat determines, according to the networking request message, whether the first power cat and the second power cat meet the preset pairing condition.
  • the method includes: when the first power cat determines that the frequency of the network request message is a preset frequency, the first power cat and the second power cat satisfy a preset pairing condition; when the first power cat determines that the frequency of the network request message is not When the frequency is preset, the first power cat and the second power cat do not satisfy the preset pairing condition.
  • the manner in which the first power cat determines whether the preset pairing condition is met according to the frequency of the network request message is provided, and the implementation manner of the embodiment of the present application is added.
  • the first power cat and the second power cat determine the target NMK code
  • the first power cat determines the first power cat and the first
  • the first power cat and the second power cat determine that the NMK code of the first power cat is used as the NMK code shared by the two, that is, the target NMK code.
  • the determination manner of the target NMK code is refined, so that the embodiment of the present application is more operable.
  • the first power cat is paired with the second power cat according to the target NMK code, including: ensuring that the target NMK code is only by the first power The cat and the second power cat share, the first power cat and the second power cat generate a first key; the first power cat sends the NMK code of the first power cat, that is, the target NMK code, to the second power cat according to the first key Pairing is done such that the second power cat modifies its own NMK code to the target NMK code.
  • the pairing process of the first power cat and the second power cat is refined, and the first power cat encrypts and transmits the target NMK code to the second power cat, which enhances the implementation effect of the embodiment of the present application.
  • the method further includes: the first power The cat receives an access request message sent by the third power cat; and pairs with the third power cat, so that the third power cat modifies the NMK code of the third power cat to the target NMK code.
  • the operation when re-accessing a third power cat is added, so that the embodiment of the present application is applicable to more occasions.
  • the first power cat and the third power cat pairing include: to ensure the security of the target NMK code during transmission, the first The power cat and the third power cat generate a second key; the first power cat sends the NMK code of the first power cat, that is, the target NMK code, to the third power cat according to the second key, so that the third power cat will itself The NMK code is modified to the target NMK code to complete the pairing.
  • the pairing process of the first power cat and the third power cat is refined, and the first power cat encrypts and transmits the target NMK code to the third power cat, which enhances the implementation effect of the embodiment of the present application.
  • the method further includes: the first power cat Sending a prompt message to the user, the prompt message is used to prompt the user that the first power cat and the second power cat are successfully paired.
  • the first power cat sends a prompt message to the user to inform the user that the pairing is successful, and the user experience is improved.
  • the first power cat determines, according to the networking request message, whether the first power cat and the second power cat meet the preset pairing condition. After the first power cat and the second power cat determine the target NMK code, the power cat pairing method further includes: in response to the networking request message, the first power cat sends a networking confirmation message to the second power cat. In this implementation manner, after receiving the networking request message, the first power cat returns a network confirmation message to the second power cat.
  • a second aspect of the embodiments of the present application provides a method for pairing a power cat, comprising: after the first power cat and the second power cat are powered on, the second power cat broadcast networking request message causes the first power cat to receive the group The network request message, so that the first power cat determines, according to the networking request message, that the first power cat and the second power cat satisfy a preset pairing condition; and the second power cat and the first power cat determine a target NMK code; After the target NMK code, the second power cat modifies its own NMK code to the target NMK code to complete pairing with the first power cat.
  • the preset pairing condition is met, the first power cat and the second power cat determine the target NMK code to complete the pairing, and the connection is completed without the pairing in the prior art. The security of the network.
  • the second power cat and the first power cat determine the target NMK code, including: when the first power cat determines the first power cat and After the second power cat satisfies the preset pairing condition, the second power cat and the first power cat determine that the NMK code of the first power cat is used as the NMK code shared by the two, that is, the target NMK code.
  • the determination manner of the target NMK code is refined, so that the embodiment of the present application is more operable.
  • the method further includes: The power cat receives an access request message sent by the third power cat; and pairs with the third power cat, so that the third power cat modifies the NMK code of the third power cat to the target NMK code.
  • the operation when re-accessing a third power cat is added, so that the embodiment of the present application is applicable to more occasions.
  • the method further includes: the second power cat receives the network confirmation message sent by the first power cat.
  • the second power cat after the second power cat sends the networking request message, it receives the networking confirmation message of the first power cat response.
  • the second power cat modifies the NMK code of the second power cat to the target NMK code to complete the first power cat.
  • the method further includes: sending, by the second power cat, a prompt message to the user, the prompt message is used to prompt the user that the first power cat and the second power cat are successfully paired.
  • the second power cat sends a prompt message to the user to inform the user that the pairing is successful, and the user experience is improved.
  • a third aspect of the present application provides a power cat, which is a first power cat, including: a first receiving unit, configured to receive a networking request message sent by a second power cat; and a determining unit, configured to The networking request message determines whether the first power cat and the second power cat satisfy a preset pairing condition; and the determining unit, when the first power cat and the second power cat satisfy a preset pairing And a condition for determining a target network identifier NMK code with the second power cat; and a first pairing unit configured to pair with the second power cat according to the target NMK code.
  • the preset pairing condition is met
  • the first power cat and the second power cat determine the target NMK code to complete. Pairing, the connection is completed without the need for pairing in the prior art, and the embodiment of the present application increases the security of the network.
  • the determining unit includes: a first determining module, configured to determine whether a signal strength of the networking request message is greater than a a preset value; if yes, the first power cat and the second power cat satisfy the preset pairing condition.
  • the manner in which the first power cat determines whether the preset pairing condition is met according to the signal strength of the network request message is provided, and the implementation manner of the embodiment of the present application is added.
  • the determining unit includes: a second determining module, configured to determine whether a frequency of the networking request message is a preset a frequency; if so, the first power cat and the second power cat satisfy the preset pairing condition.
  • the manner in which the first power cat determines whether the preset pairing condition is met according to the frequency of the network request message is provided, and the implementation manner of the embodiment of the present application is added.
  • the determining unit includes: a determining module, configured to determine, by the second power cat, the first power cat
  • the NMK code is the target NMK code.
  • the determination manner of the target NMK code is refined, so that the embodiment of the present application is more operable.
  • the first pairing unit includes: a first generating module, configured to generate a first secret with the second power cat a first sending module, configured to send an NMK code of the first power cat to the second power cat according to the first key, so that the second power cat sends the second power cat
  • the NMK code is modified to the target NMK code to complete the pairing.
  • the pairing process of the first power cat and the second power cat is refined, and the first power cat encrypts and transmits the target NMK code to the second power cat, which enhances the implementation effect of the embodiment of the present application.
  • the power cat further includes: a second receiving unit, configured to receive an access request message sent by the third power cat; a second pairing unit configured to pair with the third power cat such that the third power cat modifies the NMK code of the third power cat to the target NMK code.
  • a second receiving unit configured to receive an access request message sent by the third power cat
  • a second pairing unit configured to pair with the third power cat such that the third power cat modifies the NMK code of the third power cat to the target NMK code.
  • the second pairing unit includes: a second generating module, configured to generate a second secret with the third power cat a second sending module, configured to send the target NMK code to the third power cat according to the second key to complete pairing.
  • the pairing process of the first power cat and the third power cat is refined, and the first power cat encrypts and transmits the target NMK code to the third power cat, which enhances the implementation effect of the embodiment of the present application.
  • the power cat further includes: a sending unit, configured to send a prompt message, where the prompt message is used to prompt that the pairing is successful.
  • the first power cat sends a prompt message to the user to inform the user that the pairing is successful, and the user experience is improved.
  • the power cat further includes: a response unit, configured to send to the second in response to the networking request message The power cat sends a network confirmation message.
  • the first power cat after receiving the networking request message, the first power cat returns a network confirmation message to the second power cat.
  • a fourth aspect of the present application provides a power cat, where the power cat is a second power cat, including: a first sending unit, configured to send a network request message, so that the first power cat according to the The networking request message determines that the first power cat and the second power cat satisfy a preset pairing condition; the determining unit is configured to determine a target NMK code with the first power cat; and the first pairing unit is configured to: The NMK code of the second power cat is modified to the target NMK code to complete pairing with the first power cat.
  • the preset pairing condition is met, the first power cat and the second power cat determine the target NMK code to complete the pairing, and the connection is completed without the pairing in the prior art. The security of the network.
  • the determining unit includes: a determining module, configured to determine, by the first power cat, the first power cat
  • the NMK code is the target NMK code.
  • the determination manner of the target NMK code is refined, so that the embodiment of the present application is more operable.
  • the power cat further includes: a first receiving unit, configured to receive an access request message sent by the third power cat; a second pairing unit configured to pair with the third power cat such that the third power cat modifies the NMK code of the third power cat to the target NMK code.
  • a first receiving unit configured to receive an access request message sent by the third power cat
  • a second pairing unit configured to pair with the third power cat such that the third power cat modifies the NMK code of the third power cat to the target NMK code.
  • the power cat further includes: a second receiving unit, configured to receive a network confirmation sent by the first power cat Message.
  • a second receiving unit configured to receive a network confirmation sent by the first power cat Message.
  • the power cat further includes: a second sending unit, configured to send a prompt message, where the prompt message is used to prompt pairing success.
  • the second power cat sends a prompt message to the user to inform the user that the pairing is successful, and the user experience is improved.
  • a fifth aspect of the present application provides a computer readable storage medium having stored therein instructions that, when executed on a computer, cause the computer to perform the methods described in the above aspects.
  • a sixth aspect of the present application provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the methods described in the various aspects above.
  • the first power cat receives the networking request message sent by the second power cat; the first power cat determines, according to the networking request message, the first power cat and the first The second power cat satisfies a preset pairing condition; when the first power cat and the second power cat satisfy a preset pairing condition, the first power cat and the second power cat determine a target network identifier An NMK code; the first power cat is paired with the second power cat according to the target NMK code.
  • the preset pairing condition is met, the first power cat and the second power cat determine the target NMK code to complete the pairing, which increases the privacy and security of the network.
  • FIG. 1 is a schematic diagram of a possible application scenario provided by an embodiment of the present application
  • FIG. 2 is a schematic diagram of an embodiment of a method for pairing a power cat according to an embodiment of the present application
  • FIG. 3 is a schematic diagram of an embodiment of a first power cat in the embodiment of the present application.
  • FIG. 4 is a schematic diagram of another embodiment of a first power cat in the embodiment of the present application.
  • FIG. 5 is a schematic diagram of an embodiment of a second power cat in the embodiment of the present application.
  • FIG. 6 is a schematic diagram of another embodiment of a second power cat in the embodiment of the present application.
  • FIG. 7 is a schematic diagram of another embodiment of a first power cat in the embodiment of the present application.
  • FIG. 8 is a schematic diagram of another embodiment of a second power cat in the embodiment of the present application.
  • power cats are widely used. They use wires to transmit high-frequency signals, modulate high-frequency signals carrying information on currents, and then transmit them by wires. The modems that receive the information then pass the high-frequency signals from the current. Demodulation can achieve signal transmission.
  • the embodiment of the present application is applied to the application scenario shown in FIG. 1 , in which one end of the power cat A is inserted into the power socket A, and one end of the power cat B is inserted into the power socket B, wherein the power socket A and the power socket B is located on the same power line, so that power cat A and power cat B are paired.
  • the other end of the power cat A is connected to the broadband interface through the network cable, and the other end of the power cat B is connected to the network cable interface of the computer through the network cable, so that the broadband connection can be shared. If the power cat A and the power cat B have the Wifi function, the power cat A and the power cat B can also transmit wireless signals.
  • the power cat can adopt a buttonless design, and each power cat can use the same network membership key (NMK), so that power cats accessing the same power line can transmit data to each other.
  • NMK network membership key
  • this kind of scheme can cause the networks between different users to access each other, and the security risks are high.
  • the embodiment of the present application provides a method for pairing a power cat.
  • a method for pairing a power cat For ease of understanding, the following description will be made in conjunction with a specific embodiment. Referring to FIG. 2, an implementation of a pairing method for a power cat in the embodiment of the present application is provided. Examples include:
  • the first power cat receives a networking request message sent by the second power cat.
  • the power sockets of the two power cats need to be within the circuit range of the same meter, otherwise the data transmission cannot be realized.
  • the power cat name of the network request message sent by the other party will be received first.
  • the power cat that sends the network request message is called the second power cat.
  • two power cats can be inserted in two power sockets that are close to each other, for example, the same plug.
  • the first power cat determines whether the signal strength of the network request message is greater than a first preset value; if not, executing Step 203; if yes, proceed to step 204;
  • the longer the distance of signal transmission the greater the noise interference and attenuation, and the signal strength will also decrease.
  • the present application is based on the recognition that the higher the signal strength of the networking request message, the smaller the physical spacing between the two power cats. Therefore, when the signal strength of the networking request message is sufficiently large, the two power cats can be considered. Close enough to each other, that is, the two power cats belong to the same user.
  • the first power cat detects the signal strength of the network request message, and compares the signal strength of the network request message with the first preset value, when the network request message When the signal strength is not greater than the first preset value, step 203 is performed; when the signal strength of the networking request message is greater than the first preset value, step 204 is performed.
  • detecting the signal strength of the network request message may include detecting a receiving level, a pilot strength, a voltage, or a receiving power of the network request message, which is not limited herein. It can be understood that the detected parameters are different, and the corresponding first preset values are also different.
  • the manner in which the first power cat determines the physical distance between the first power cat and the second power cat is different, except that according to the signal strength judgment of the network request message, the frequency of the signal is larger. The shorter the distance of the transmission, the limitation of the pairing process to the preset frequency band. If the frequency of the network request message is the preset frequency, step 204 is performed, and if the frequency of the network request message is not the preset frequency, Step 203 is performed, so the manner in which the first power cat determines the physical distance between the second power cat and the second power cat is not limited herein.
  • the first power cat and the second power cat are not paired;
  • the first power cat determines that the signal strength of the network request message is not greater than the first preset value, it can be understood that the distance between the first power cat and the second power cat is far, and cannot be determined to belong to the same user, so the first power The cat refuses the networking request of the second power cat and does not pair with the second power cat.
  • the first power cat and the second power cat determine that the NMK code of the first power cat is a target NMK code.
  • the signal strength of the first power cat determines that the network request message is greater than the first preset value, it can be understood that the distance between the first power cat and the second power cat is close enough to be considered as belonging to the same user, so the first power The cat responds to the network request to respond to the second power cat, and negotiates a common NMK code, that is, the target NMK code, with the second power cat to complete the pairing.
  • the two power cats can receive the network first.
  • the NMK code of the first power cat is requested as the target NMK code, and the NMK code of each power cat may be different from each other in the factory default configuration.
  • the first power cat and the second power cat may negotiate to generate a random one.
  • the NMK code is used as the target NMK code, which may be generated by the first power cat or the second power cat, for example, according to a random number generator, or according to the identifier of the first power cat and/or the NMK code of the second power cat.
  • the random NMK code can be composed of numbers, letters, and the like. Therefore, the determining manner, the generating manner, and the components of the target NMK code are not limited herein.
  • the first power cat generates a first key.
  • the target NMK code needs to be encrypted, so that only the first power cat and the second power cat Share the target NMK code. Therefore, the first power cat generates a random number FirstHashKey and sends the FirstHashKey to the second power. The cat receives the random number SecondHashKey generated by the second power cat. After obtaining the FirstHashKey and the SecondHashKey, the first key is calculated by a preset algorithm.
  • the second power cat generates a first key.
  • the second power cat generates a SecondHashKey, and sends the SecondHashKey to the first power cat, and receives a random number FirstHashKey generated by the first power cat.
  • the second power cat calculates the first through a preset algorithm. Key, it should be noted that the preset algorithm used by the second power cat to calculate the first key is consistent with the preset algorithm used by the first power cat to calculate the first key, so the two are obtained. The first key is also consistent.
  • step 205 may be performed first, or step 206 may be performed first, or may be performed at the same time, which is not limited herein.
  • the first power cat sends the target NMK code to the second power cat according to the first key.
  • the target NMK code that is, the NMK code of the first power cat
  • the encrypted target NMK code is sent to the second power cat.
  • the second power cat modifies the NMK code of the second power cat to the target NMK code.
  • the second power cat After receiving the encrypted target NMK code, the second power cat decrypts the generated first key to obtain the target NMK code, and pairs the first power cat to modify the second power cat's own NMK code to the target.
  • the NMK code is identical to the NMK code of the first power cat.
  • the target NMK code is a random NMK code generated by the first power cat and the second power cat
  • the first power cat will have its own NMK code. Modifying to the target NMK code, and transmitting the target NMK code to the second power cat by the first key, so that the second power cat decrypts the target NMK code by the first key, and modifying the NMK code of the second power cat a target NMK code; if the target NMK code is generated by the second power cat, the second power cat modifies its own NMK code to the target NMK code, and encrypts the target NMK code to the first power cat by the first key So that the first power cat decrypts the target NMK code by the first key, and modifies the NMK code of the first power cat as the target NMK code.
  • the first power cat sends a prompt message.
  • the pairing of the two is completed, and the first power cat sends a prompt message to prompt the user to successfully pair, and it should be noted that the first power cat prompts
  • the user prompts
  • the user to successfully pair. For example, through the preset lighting mode, during the pairing process between the first power cat and the second power cat, the indicator light on the first power cat periodically flashes, and the first power is successfully paired.
  • the indicator light on the cat becomes long bright; or in the process of pairing the first power cat with the second power cat, the first power cat emits a "drop-drop-drop" sound, and when the pairing is successful, the first power cat stops sounding, In order to prompt the user to successfully pair, the manner in which the user is prompted to pair successfully is not limited herein.
  • the second power cat may also send a prompt message, and the manner in which the second power cat sends the prompt message is similar to the manner in which the first power cat sends the prompt message, and details are not described herein again.
  • first power cat and the second power cat can both send the prompt message, or only one of the power cats sends the prompt message, which is not limited herein.
  • the first power cat receives an access request message sent by the third power cat.
  • the user can connect the first power cat to the broadband interface through the network cable, and unplug the second power cat to the power socket near the terminal, and the second power cat has one end.
  • the network cable is connected to the network cable of the terminal, so that the terminal can upload and download data.
  • the third power cat is inserted in the power socket near the first power cat or the second power cat.
  • the first power cat receives the access request message sent by the third power cat, and responds to the third power cat access request response, and the access request response carries the associated confirmation information.
  • the association confirmation information is used to notify the third power cat that the first power cat has been networked, so that the third power cat joins the network.
  • the first power cat determines whether the signal strength of the access request message is greater than the first preset value; if not, step 212 is performed; if yes, step 213 is performed;
  • the method for determining, by the first power cat, whether the signal strength of the access request message is greater than the first preset value in step 211 and the signal strength of the first power cat determining the network request message in step 202 is greater than the first The default value is similar, and will not be described here.
  • the first power cat and the third power cat are not paired;
  • step 212 is similar to step 203, and details are not described herein again.
  • the first power cat generates a second key.
  • the third power cat generates a second key.
  • the first power cat sends the target NMK code to the third power cat according to the second key.
  • the third power cat modifies the NMK code of the third power cat to the target NMK code.
  • the third power cat sends a reminder message.
  • the interaction process between the first power cat and the third power cat in steps 213 to 217 is similar to the steps 205 to 209, and details are not described herein again.
  • steps 210 to 217 are a process in which a third power cat joins the networking after the first power cat is paired with the second power cat, and in actual application, the third power cat
  • the number of the third power cat is 0, for example, there is no step 210 to step 217; when there are multiple third power cats, the third power cat can be repeated once. Step 210 to step 217, so the details are not limited herein.
  • the power cats automatically negotiate to change the NMK code to complete the pairing, and can be isolated from the neighboring network, thereby reducing the security risk, and the power cat automatically sends a networking request message to complete the negotiation networking after the power cat is powered on.
  • the user's experience, while the manufacturer does not need to design a separate physical pairing button for the power cat, can make the power cat size smaller and reduce the hardware cost.
  • an embodiment of the first power cat in the embodiment of the present application includes:
  • the first receiving unit 301 is configured to receive a networking request message sent by the second power cat.
  • the determining unit 302 is configured to determine, according to the networking request message, whether the first power cat and the second power cat satisfy a preset pairing condition
  • the determining unit 303 is configured to determine a target network identifier NMK code with the second power cat when the first power cat and the second power cat satisfy a preset pairing condition;
  • the first pairing unit 304 is configured to pair with the second power cat according to the target NMK code.
  • the determining unit and the second power cat determine the target NMK code to complete the pairing, which is unnecessary for the prior art.
  • the pairing completes the connection, and the embodiment of the present application increases the privacy and security of the network.
  • FIG. 4 is another implementation of the first power cat in the embodiment of the present application.
  • the first power cat includes: a first receiving unit 401, a determining unit 402, a determining unit 403, and a first pairing unit 404, wherein the determining unit 402 includes:
  • the first determining module 4021 is configured to determine whether the signal strength of the networking request message is greater than a first preset value
  • the first power cat and the second power cat satisfy the preset pairing condition.
  • the determining unit 302 includes:
  • the second determining module 4022 is configured to determine whether the frequency of the networking request message is a preset frequency
  • the first power cat and the second power cat satisfy the preset pairing condition.
  • the determining unit 403 includes:
  • the determining module 4031 is configured to determine, by the second power cat, that the NMK code of the first power cat is a target NMK code.
  • the first pairing unit 404 includes:
  • a first generating module 4041 configured to generate a first key with the second power cat
  • the first sending module 4042 is configured to send the NMK code of the first power cat to the second power cat according to the first key, so that the second power cat modifies the NMK code of the second power cat to the target NMK code to complete pair.
  • the first power cat may further include:
  • the second receiving unit 405 is configured to receive an access request message sent by the third power cat.
  • the second pairing unit 406 is configured to pair with the third power cat, so that the third power cat modifies the NMK code of the third power cat to the target NMK code.
  • the second pairing unit 406 may include:
  • a second generating module 4061 configured to generate a second key with the third power cat
  • the second sending module 4062 is configured to send the target NMK code to the third power cat according to the second key to complete the pairing.
  • the first power cat may further include:
  • the sending unit 407 is configured to send a prompt message, where the prompt message is used to prompt the pairing success.
  • the first power cat may further include:
  • the response unit 408 is configured to send a networking confirmation message to the second power cat in response to the networking request message.
  • the first determining module determines whether the first power cat and the second power cat satisfy the preset pairing condition by determining the signal strength of the networking request message, or the second determining module determines the networking request message by determining The frequency is used to determine whether the first power cat and the second power cat satisfy the preset pairing condition, and the implementation manner of the embodiment of the present application is added.
  • an embodiment of the second power cat in the embodiment of the present application includes:
  • the first sending unit 501 is configured to send a networking request message, so that the first power cat determines, according to the networking request message, that the first power cat and the second power cat meet the preset pairing condition;
  • a determining unit 502 configured to determine a target NMK code with the first power cat
  • the first pairing unit 503 is configured to modify the NMK code of the second power cat to the target NMK code to complete pairing with the first power cat.
  • the determining unit determines the target NMK code to complete the pairing, and the connection is completed without the pairing in the prior art.
  • the embodiment of the present application increases the security and privacy of the network. Sex.
  • FIG. 6 is another implementation of the second power cat in the embodiment of the present application.
  • the second power cat includes: a first sending unit 601, a determining unit 602, and a first pairing unit 603, where the determining unit 602 includes:
  • the determining module 6021 is configured to determine, by the first power cat, that the NMK code of the first power cat is a target NMK code.
  • the second power cat may further include:
  • the first receiving unit 604 is configured to receive an access request message sent by the third power cat.
  • the second pairing unit 605 is configured to pair with the third power cat, so that the third power cat modifies the NMK code of the third power cat to the target NMK code.
  • the second power cat may further include:
  • the second receiving unit 606 is configured to receive a network confirmation message sent by the first power cat.
  • the second power cat may further include:
  • the second sending unit 607 is configured to send a prompt message, where the prompt message is used to prompt the pairing success.
  • the first receiving unit receives the access request message sent by the third power cat, and the second sending unit sends the prompt message to prompt the user to successfully pair, and the implementation manner of the embodiment of the present application is added.
  • FIG. 7 is a schematic structural diagram of a first power cat according to an embodiment of the present application.
  • the first power cat 700 may have a large difference due to different configurations or performances, and may include one or one.
  • the above central processing units (CPU) 722 eg, one or more processors
  • memory 732 e.g., one or more storage media 730 storing application 742 or data 744 (eg, one or one storage device in Shanghai) ).
  • the memory 732 and the storage medium 730 may be short-term storage or persistent storage.
  • the program stored on the storage medium 730 may include one or more modules (not shown), each of which may include a series of instruction operations in the smart terminal.
  • central processor 722 can be configured to communicate with storage medium 730, executing a series of instruction operations in storage medium 730 on smart terminal 700.
  • the intelligent terminal 700 can also include one or more power sources 726, one or more wired or wireless network interfaces 750, one or more input and output interfaces 758, and/or one or more operating systems 741, such as Windows Server, Mac. OS X, Unix, Linux, FreeBSD, etc.
  • operating systems 741 such as Windows Server, Mac. OS X, Unix, Linux, FreeBSD, etc.
  • the storage medium 730 in the above embodiments may be any available medium that the computer can store or a data storage device such as a server, data center, or the like that includes one or more available media integrations.
  • the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (eg, a solid state hard disk) (solid state disk, SSD)) and so on.
  • the steps performed by the first power cat in the above embodiment may be based on the first power cat structure shown in FIG.
  • an embodiment of the second power cat in the embodiment of the present application includes:
  • FIG. 8 is a schematic structural diagram of a second power cat according to an embodiment of the present application.
  • the second power cat 800 may have a large difference due to different configurations or performances, and may include one or more central processing units (central processing). Units, CPUs 822 (eg, one or more processors) and memory 832, one or more storage media 830 that store application 842 or data 844 (eg, one or one storage device in Shanghai). Among them, the memory 832 and the storage medium 830 may be short-term storage or persistent storage.
  • the program stored on storage medium 830 may include one or more modules (not shown), each of which may include a series of instruction operations in a Wi-Fi access point. Still further, central processor 822 can be configured to communicate with storage medium 830 to perform a series of instruction operations in storage medium 830 on Wi-Fi access point 800.
  • the second power cat 800 may also include one or more power sources 826, one or more wired or wireless network interfaces 850, one or more input and output interfaces 858, and/or one or more operating systems 841, such as Windows Server , Mac OS X, Unix, Linux, FreeBSD, and more.
  • operating systems 841 such as Windows Server , Mac OS X, Unix, Linux, FreeBSD, and more.
  • the steps performed by the second power cat in the above embodiment may be based on the second power cat structure shown in FIG.
  • the storage medium 830 in the above embodiments may be any available medium that the computer can store or a data storage device such as a server, data center, or the like that includes one or more available media integrations.
  • the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (eg, a solid state disk (SSD)) or the like.
  • the computer program product includes one or more computer instructions.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transmission to another website site, computer, server or data center via wired (eg coaxial cable, fiber optic, digital subscriber line (DSL)) or wireless (eg infrared, wireless, microwave, etc.).
  • wired eg coaxial cable, fiber optic, digital subscriber line (DSL)
  • wireless eg infrared, wireless, microwave, etc.
  • the computer readable storage medium can be any available media that can be stored by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
  • the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a solid state disk (SSD)) or the like.
  • the disclosed system, apparatus, and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the display The mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be electrical, mechanical or otherwise.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • a computer readable storage medium A number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program code. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

本申请实施例公开了一种电力猫的配对方法以及电力猫,用于增加网络的私密性以及安全性。本申请实施例方法包括:第一电力猫接收第二电力猫发送的组网请求消息;所述第一电力猫根据所述组网请求消息判断所述第一电力猫与所述第二电力猫是否满足预置的配对条件;当所述第一电力猫与所述第二电力猫满足预置的配对条件时,所述第一电力猫与所述第二电力猫确定目标网络识别码NMK码;所述第一电力猫根据所述目标NMK码与所述第二电力猫配对。

Description

一种电力猫的配对方法以及电力猫
本申请要求于2017年02月22日提交中国专利局、申请号为201710097106.1、发明名称为“一种低成本快捷的电力猫配对组网方法和设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信领域,尤其涉及一种电力猫的配对方法以及电力猫。
背景技术
电力猫,又名电力网络桥接器,其采用的电力线通信(power line communication,PLC)技术利用电力线来传输数据和媒体信号,且电力猫是一种能把网络信号调制到电线上,利用现有电线来解决网络布线问题的设备。目前,电力猫作为第三代网络传输设备,不仅具有网线的高速稳定也具有无线网络的移动便捷,应用范围较广,使用电力猫上网其实就是通过电力线进行宽带上网的模式的俗称,电力猫可以将用户家中的任何一个普通的电源插座转换为网络接口,无须另外布线就可以上网,并具备数据加密保护功能,同时更兼具了数据传输的安全性。
目前,电力猫通常为外置电力猫,需要将一个电力猫插在电源插座上,并通过网线与网络进线处连接,且将另一个电脑猫插在电源插座上,通过网线与电脑连接。现有技术中,部分厂商设计所有电力猫使用同一个网络识别码(network membership key,NMK),取消了配对流程。
然而,当所有电力猫都使用相同的NMK码时,接入同一个电网的电力猫会在一个网络下,无法区分彼此,导致不同用户之间的网络可以互相访问,安全隐患高。
发明内容
本申请实施例提供了一种电力猫的配对方法以及电力猫,用于增加网络的私密性以及安全性。
本申请实施例的第一方面提供一种电力猫的配对方法,包括:第一电力猫与第二电力猫上电后,第一电力猫接收到来自第二电力猫发送的组网请求消息,第一电力猫再根据接收到的组网请求消息判断第一电力猫和第二电力猫是否满足预置的配对条件,当第一电力猫判断第一电力猫和第二电力猫满足预置的配对条件时,第一电力猫和第二电力猫确定目标NMK码,并根据该目标NMK码完成第一电力猫与第二电力猫的配对。本申请实施例中,当满足预置的配对条件时,第一电力猫与第二电力猫确定目标NMK码来完成配对,相对于现有技术的不需要配对即完成连接,本申请实施例增加了网络的私密性以及安全性。
在一种可能的设计中,在本申请实施例第一方面的第一种实现方式中,第一电力猫根据组网请求消息判断第一电力猫与第二电力猫是否满足预置的配对条件包括:当第一电力猫判断组网请求消息的信号强度大于第一预设值时,则第一电力猫与第二电力猫满足预置的配对条件;当第一电力猫判断组网请求消息的信号强度不大于第一预设值时,则第一电 力猫与第二电力猫不满足预置的配对条件。该实现方式中,提供了第一电力猫根据组网请求消息的信号强度来判断是否满足预置的配对条件的方式,增加了本申请实施例的实现方式。
在一种可能的设计中,在本申请实施例第一方面的第二种实现方式中,第一电力猫根据组网请求消息判断第一电力猫与第二电力猫是否满足预置的配对条件包括:当第一电力猫判断组网请求消息的频率为预设频率时,则第一电力猫与第二电力猫满足预置的配对条件;当第一电力猫判断组网请求消息的频率不是预设频率时,则第一电力猫与第二电力猫不满足预置的配对条件。该实现方式中,提供了第一电力猫根据组网请求消息的频率来判断是否满足预置的配对条件的方式,增加了本申请实施例的实现方式。
在一种可能的设计中,在本申请实施例第一方面的第三种实现方式中,第一电力猫与第二电力猫确定目标NMK码包括:第一电力猫确定第一电力猫与第二电力猫满足预置的配对条件后,则第一电力猫与第二电力猫确定将第一电力猫的NMK码作为两者共享的NMK码即目标NMK码。该实现方式中,细化了目标NMK码的确定方式,使本申请实施例更加具有可操作性。
在一种可能的设计中,在本申请实施例第一方面的第四种实现方式中,第一电力猫根据目标NMK码与第二电力猫配对包括:为保证目标NMK码仅由第一电力猫和第二电力猫共享,第一电力猫与第二电力猫生成第一密钥;第一电力猫根据第一密钥将第一电力猫的NMK码即目标NMK码发送至第二电力猫,以使得第二电力猫将其自身的NMK码修改为目标NMK码,来完成配对。该实现方式中,细化了第一电力猫与第二电力猫的配对流程,且第一电力猫将目标NMK码加密发送至第二电力猫,增强了本申请实施例的实现效果。
在一种可能的设计中,在本申请实施例第一方面的第五种实现方式中,第一电力猫根据所述目标NMK码与第二电力猫配对之后,本方法还包括:第一电力猫接收第三电力猫发送的接入请求消息;并与该第三电力猫配对,以使得第三电力猫将第三电力猫的NMK码修改为目标NMK码。该实现方式中,增加了再接入一个第三电力猫时的操作,使本申请实施例适用于更多场合。
在一种可能的设计中,在本申请实施例第一方面的第六种实现方式中,第一电力猫与第三电力猫配对包括:为保证目标NMK码在传输时的安全性,第一电力猫与第三电力猫生成第二密钥;第一电力猫根据第二密钥将第一电力猫的NMK码即目标NMK码发送至第三电力猫,以使得第三电力猫将其自身的NMK码修改为目标NMK码,来完成配对。该实现方式中,细化了第一电力猫与第三电力猫的配对流程,且第一电力猫将目标NMK码加密发送至第三电力猫,增强了本申请实施例的实现效果。
在一种可能的设计中,在本申请实施例第一方面的第七种实现方式中,第一电力猫根据目标NMK码与第二电力猫配对之后,所述方法还包括:第一电力猫向用户发送提示消息,该提示消息用于提示用户第一电力猫与第二电力猫配对成功。该实现方式中,在第一电力猫与第二电力猫成功配对后,第一电力猫向用户发送提示消息以告知用户配对成功,改善了用户的使用体验。
在一种可能的设计中,在本申请实施例第一方面的第八种实现方式中,第一电力猫根据组网请求消息判断第一电力猫与第二电力猫是否满足预置的配对条件之后,第一电力猫与第二电力猫确定目标NMK码之前,电力猫的配对方法还包括:为响应于该组网请求消息,第一电力猫向第二电力猫发送组网确认消息。该实现方式中,第一电力猫接收到组网请求消息后,向第二电力猫回复组网确认消息。
本申请实施例的第二方面提供一种电力猫的配对方法,包括:第一电力猫与第二电力猫上电后,第二电力猫广播组网请求消息使得第一电力猫接收到该组网请求消息,以使得第一电力猫根据该组网请求消息确定第一电力猫与第二电力猫满足预置的配对条件;且第二电力猫与第一电力猫确定目标NMK码;在确定目标NMK码后,第二电力猫将其自身的NMK码修改为目标NMK码,以完成与第一电力猫的配对。本申请实施例中,当满足预置的配对条件时,第一电力猫与第二电力猫确定目标NMK码来完成配对,相对于现有技术的不需要配对即完成连接,本申请实施例增加了网络的安全性。
在一种可能的设计中,在本申请实施例第二方面的第一种实现方式中,第二电力猫与第一电力猫确定目标NMK码包括:当第一电力猫确定第一电力猫与第二电力猫满足预置的配对条件后,则第二电力猫与第一电力猫确定将第一电力猫的NMK码作为两者共享的NMK码即目标NMK码。该实现方式中,细化了目标NMK码的确定方式,使本申请实施例更加具有可操作性。
在一种可能的设计中,在本申请实施例第二方面的第二种实现方式中,第二电力猫将第二电力猫的NMK码修改为目标NMK码之后,本方法还包括:第二电力猫接收第三电力猫发送的接入请求消息;并与该第三电力猫配对,以使得第三电力猫将第三电力猫的NMK码修改为目标NMK码。该实现方式中,增加了再接入一个第三电力猫时的操作,使本申请实施例适用于更多场合。
在一种可能的设计中,在本申请实施例第二方面的第三种实现方式中,第二电力猫发送组网请求消息之后,第二电力猫与第一电力猫确定目标NMK码之前,本方法还包括:第二电力猫接收第一电力猫发送的组网确认消息。该实现方式中,第二电力猫发送组网请求消息后,接收第一电力猫响应的组网确认消息。
在一种可能的设计中,在本申请实施例第二方面的第四种实现方式中,第二电力猫将第二电力猫的NMK码修改为目标NMK码,以完成与第一电力猫的配对之后,本方法还包括:第二电力猫向用户发送提示消息,该提示消息用于提示用户该第一电力猫与第二电力猫配对成功。该实现方式中,在第一电力猫与第二电力猫成功配对后,第二电力猫向用户发送提示消息以告知用户配对成功,改善了用户的使用体验。
本申请实施例的第三方面提供一种电力猫,该电力猫为第一电力猫,包括:第一接收单元,用于接收第二电力猫发送的组网请求消息;判断单元,用于根据所述组网请求消息判断所述第一电力猫与所述第二电力猫是否满足预置的配对条件;确定单元,当所述第一电力猫与所述第二电力猫满足预置的配对条件时,用于与所述第二电力猫确定目标网络识别码NMK码;第一配对单元,用于根据所述目标NMK码与所述第二电力猫配对。本申请实施例中,当满足预置的配对条件时,第一电力猫与第二电力猫确定目标NMK码来完成 配对,相对于现有技术的不需要配对即完成连接,本申请实施例增加了网络的安全性。
在一种可能的设计中,在本申请实施例第三方面的第一种实现方式中,所述判断单元包括:第一判断模块,用于判断所述组网请求消息的信号强度是否大于第一预设值;若是,则所述第一电力猫与所述第二电力猫满足所述预置的配对条件。该实现方式中,提供了第一电力猫根据组网请求消息的信号强度来判断是否满足预置的配对条件的方式,增加了本申请实施例的实现方式。
在一种可能的设计中,在本申请实施例第三方面的第二种实现方式中,所述判断单元包括:第二判断模块,用于判断所述组网请求消息的频率是否为预设频率;若是,则所述第一电力猫与所述第二电力猫满足所述预置的配对条件。该实现方式中,提供了第一电力猫根据组网请求消息的频率来判断是否满足预置的配对条件的方式,增加了本申请实施例的实现方式。
在一种可能的设计中,在本申请实施例第三方面的第三种实现方式中,所述确定单元包括:确定模块,用于与所述第二电力猫确定所述第一电力猫的NMK码为所述目标NMK码。该实现方式中,细化了目标NMK码的确定方式,使本申请实施例更加具有可操作性。
在一种可能的设计中,在本申请实施例第三方面的第四种实现方式中,所述第一配对单元包括:第一生成模块,用于与所述第二电力猫生成第一密钥;第一发送模块,用于根据所述第一密钥将所述第一电力猫的NMK码发送至所述第二电力猫,以使得所述第二电力猫将所述第二电力猫的NMK码修改为所述目标NMK码,以完成配对。该实现方式中,细化了第一电力猫与第二电力猫的配对流程,且第一电力猫将目标NMK码加密发送至第二电力猫,增强了本申请实施例的实现效果。
在一种可能的设计中,在本申请实施例第三方面的第五种实现方式中,所述电力猫还包括:第二接收单元,用于接收第三电力猫发送的接入请求消息;第二配对单元,用于与所述第三电力猫配对,以使得所述第三电力猫将所述第三电力猫的NMK码修改为所述目标NMK码。该实现方式中,增加了再接入一个第三电力猫时的操作,使本申请实施例适用于更多场合。
在一种可能的设计中,在本申请实施例第三方面的第六种实现方式中,所述第二配对单元包括:第二生成模块,用于与所述第三电力猫生成第二密钥;第二发送模块,用于根据所述第二密钥将所述目标NMK码发送至所述第三电力猫,以完成配对。该实现方式中,细化了第一电力猫与第三电力猫的配对流程,且第一电力猫将目标NMK码加密发送至第三电力猫,增强了本申请实施例的实现效果。
在一种可能的设计中,在本申请实施例第三方面的第七种实现方式中,所述电力猫还包括:发送单元,用于发送提示消息,所述提示消息用于提示配对成功。该实现方式中,在第一电力猫与第二电力猫成功配对后,第一电力猫向用户发送提示消息以告知用户配对成功,改善了用户的使用体验。
在一种可能的设计中,在本申请实施例第三方面的第八种实现方式中,所述电力猫还包括:响应单元,用于响应于所述组网请求消息,向所述第二电力猫发送组网确认消息。该实现方式中,第一电力猫接收到组网请求消息后,向第二电力猫回复组网确认消息。
本申请实施例的第四方面提供一种电力猫,所述电力猫为第二电力猫,包括:第一发送单元,用于发送组网请求消息,以使得所述第一电力猫根据所述组网请求消息确定所述第一电力猫与所述第二电力猫满足预置的配对条件;确定单元,用于与所述第一电力猫确定目标NMK码;第一配对单元,用于将所述第二电力猫的NMK码修改为所述目标NMK码,以完成与所述第一电力猫的配对。本申请实施例中,当满足预置的配对条件时,第一电力猫与第二电力猫确定目标NMK码来完成配对,相对于现有技术的不需要配对即完成连接,本申请实施例增加了网络的安全性。
在一种可能的设计中,在本申请实施例第四方面的第一种实现方式中,所述确定单元包括:确定模块,用于与所述第一电力猫确定所述第一电力猫的NMK码为所述目标NMK码。该实现方式中,细化了目标NMK码的确定方式,使本申请实施例更加具有可操作性。
在一种可能的设计中,在本申请实施例第四方面的第二种实现方式中,所述电力猫还包括:第一接收单元,用于接收第三电力猫发送的接入请求消息;第二配对单元,用于与所述第三电力猫配对,以使得所述第三电力猫将所述第三电力猫的NMK码修改为所述目标NMK码。该实现方式中,增加了再接入一个第三电力猫时的操作,使本申请实施例适用于更多场合。
在一种可能的设计中,在本申请实施例第四方面的第三种实现方式中,所述电力猫还包括:第二接收单元,用于接收所述第一电力猫发送的组网确认消息。该实现方式中,第二电力猫发送组网请求消息后,接收第一电力猫响应的组网确认消息。
在一种可能的设计中,在本申请实施例第四方面的第四种实现方式中,所述电力猫还包括:第二发送单元,用于发送提示消息,所述提示消息用于提示配对成功。该实现方式中,在第一电力猫与第二电力猫成功配对后,第二电力猫向用户发送提示消息以告知用户配对成功,改善了用户的使用体验。
本申请的第五方面提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行上述各方面所述的方法。
本申请的第六方面提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述各方面所述的方法。
本申请实施例提供的技术方案中,第一电力猫接收第二电力猫发送的组网请求消息;所述第一电力猫根据所述组网请求消息判断所述第一电力猫与所述第二电力猫满足预置的配对条件;当所述第一电力猫与所述第二电力猫满足预置的配对条件时,所述第一电力猫与所述第二电力猫确定目标网络识别码NMK码;所述第一电力猫根据所述目标NMK码与所述第二电力猫配对。本申请实施例中,当满足预置的配对条件时,第一电力猫与第二电力猫确定目标NMK码以完成配对,增加了网络的私密性以及安全性。
附图说明
图1为本申请实施例提供的一种可能的应用场景示意图;
图2为本申请实施例中电力猫的配对方法的一个实施例示意图;
图3为本申请实施例中第一电力猫的一个实施例示意图;
图4为本申请实施例中第一电力猫的另一实施例示意图;
图5为本申请实施例中第二电力猫的一个实施例示意图;
图6为本申请实施例中第二电力猫的另一实施例示意图;
图7为本申请实施例中第一电力猫的另一实施例示意图;
图8为本申请实施例中第二电力猫的另一实施例示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。
本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”、“第三”、“第四”等(如果存在)是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的实施例能够以除了在这里图示或描述的内容以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。
在电力线上网技术中,电力猫应用十分广泛,它利用电线传输高频信号,把载有信息的高频信号调制于电流上,然后用电线传输,接收信息的调制解调器再把高频信号从电流中解调出来,即可实现信号的传输。
本申请实施例应用于如图1所示的应用场景,该场景中将电力猫A的一端插在电源插座A上,电力猫B的一端插在电源插座B上,其中电源插座A和电源插座B位于同一条电力线上,使得电力猫A与电力猫B完成配对。且电力猫A的另一端通过网线与宽带接口连接,电力猫B的另一端通过网线与电脑的网线接口连接,即可实现宽带连接的共享。若电力猫A和电力猫B具备Wifi功能,则电力猫A和电力猫B还可以发射无线信号。
现有技术中,电力猫可以采用无按键设计,且每个电力猫可以都使用相同的网络识别码(network membership key,NMK),使得接入同一条电力线的电力猫之间能相互传输数据,但这种方案会导致不同用户之间的网络可以互相访问,安全隐患高。
有鉴于此,本申请实施例提供了一种电力猫的配对方法,为便于理解,下面将结合具体的实施例进行描述,请参阅图2,本申请实施例中电力猫的配对方法的一个实施例包括:
201、第一电力猫接收第二电力猫发送的组网请求消息;
将两个电力猫都插在电源插座上,可以理解的是,两个电力猫插的电源插座需要在同一个电表的电路范围内,否则不能实现数据的传输。接通电源的两个电力猫均通过电力线持续广播组网请求消息,直到接收到组网请求响应或者超过预置时长,为方便描述,将先收到对方发送的组网请求消息的电力猫称为第一电力猫,则发送该组网请求消息的电力猫称为第二电力猫。需要说明的是,实际应用中,为了减少干扰以及增加配对的成功率,可以将两个电力猫插在距离较近的两个电源插座上,例如同一个插排上。
202、第一电力猫判断组网请求消息的信号强度是否大于第一预设值;若否,则执行 步骤203;若是,则执行步骤204;
可以理解的是,信号传输的距离越长,其受到的噪声干扰和衰减也越大,故其信号强度也会递减。本申请基于这样的认识,组网请求消息的信号强度越高,则两个电力猫之间的物理间距越小,因此当组网请求消息的信号强度足够大时,便可认为两个电力猫之间足够靠近,即认为该两个电力猫属于同一个用户。
故第一电力猫接收到电力线上的组网请求消息后,检测该组网请求消息的信号强度,并将该组网请求消息的信号强度与第一预设值对比,当组网请求消息的信号强度不大于第一预设值时,则执行步骤203;当组网请求消息的信号强度大于第一预设值时,则执行步骤204。
另外,实际应用中,检测组网请求消息的信号强度可以包括检测组网请求消息的接收电平、导频强度、电压或者接收功率等,具体此处不做限定。可以理解的是,检测的参数不一样,对应的第一预设值也不一样。
可选的,本申请实施例中,第一电力猫判断其与第二电力猫之间物理间距的方式有多种,除了根据组网请求消息的信号强度判断外,由于信号的频率越大,其传输的距离越短,故可以将配对过程限制在预设频段,若组网请求消息的频率为该预设频率,则执行步骤204,若组网请求消息的频率不是该预设频率,则执行步骤203,故第一电力猫判断其与第二电力猫之间物理间距的方式具体此处不做限定。
203、第一电力猫与第二电力猫不进行配对;
当第一电力猫判断组网请求消息的信号强度不大于第一预设值时,则可以理解为第一电力猫与第二电力猫的距离较远,不能确定属于同一用户,故第一电力猫拒绝第二电力猫的组网请求,不与第二电力猫进行配对。
204、第一电力猫与第二电力猫确定第一电力猫的NMK码为目标NMK码;
当第一电力猫判断组网请求消息的信号强度大于第一预设值时,可以理解为第一电力猫与第二电力猫的距离足够靠近,认为属于两者同一个用户,故第一电力猫回复组网请求响应至第二电力猫,并与第二电力猫协商一个共用的NMK码即目标NMK码以完成配对,本申请实施例中,可以将两个电力猫中先接收到组网请求消息电力猫即第一电力猫的NMK码作为目标NMK码,其中每台电力猫的NMK码在出厂默认配置时可以互不相同。
需要说明的是,实际应用中,确定目标NMK码的方式有多种,除了将第一电力猫的NMK码作为目标NMK码外,还可以第一电力猫与第二电力猫协商生成一个随机的NMK码作为目标NMK码,该随机的NMK可以由第一电力猫或者第二电力猫生成,例如根据随机数产生器生成,或者根据第一电力猫的标识和/或第二电力猫的NMK码按照预置的算法生成,该随机的NMK码可以由数字、字母等组成,故目标NMK码的确定方式、生成方式以及组成部分具体此处不做限定。
205、第一电力猫生成第一密钥;
第一电力猫与第二电力猫确定目标NMK码后,为将该目标NMK码安全发送给第二电力猫,需对该目标NMK码进行加密,以使得只有第一电力猫和第二电力猫共享该目标NMK码。故第一电力猫生成一个随机数FirstHashKey,并将该FirstHashKey发送至第二电 力猫,且接收第二电力猫生成的随机数SecondHashKey,在获得FirstHashKey和SecondHashKey后,通过预置的算法计算得到第一密钥。
206、第二电力猫生成第一密钥;
第二电力猫生成SecondHashKey,并将该SecondHashKey发送至第一电力猫,且接收第一电力猫生成的随机数FirstHashKey,第二电力猫在获得FirstHashKey和SecondHashKey后,通过预置的算法计算得到第一密钥,需要说明的是,第二电力猫计算得到第一密钥所采用的预置的算法与第一电力猫计算得到第一密钥所采用的预置的算法一致,故二者得到的第一密钥也一致。
需要注意的是,本申请实施例中,第一电力猫通过步骤205生成第一密钥,第二电力猫通过步骤206生成第一密钥,而这两个过程之间并不存在步骤的先后顺序,可以先执行步骤205,也可以先执行步骤206,或者同时执行,具体此处不做限定。
207、第一电力猫根据第一密钥将目标NMK码发送至第二电力猫;
第一电力猫生成第一密钥后,通过该第一密钥对目标NMK码即第一电力猫的NMK码进行加密,并将加密后的目标NMK码发送给第二电力猫。
208、第二电力猫将第二电力猫的NMK码修改为目标NMK码;
第二电力猫接收到加密后的目标NMK码后,通过生成的第一密钥进行解密,得到目标NMK码,为与第一电力猫进行配对,将第二电力猫自身的NMK码修改为目标NMK码,以与第一电力猫的NMK码一致。
需要说明的是,当目标NMK码为第一电力猫和第二电力猫协商生成的一个随机的NMK码时,若目标NMK码由第一电力猫生成,则第一电力猫将自身的NMK码修改为目标NMK码,且通过第一密钥将目标NMK码加密发送至第二电力猫,以使得第二电力猫通过第一密钥解密得到目标NMK码,并修改第二电力猫的NMK码为目标NMK码;若目标NMK码由第二电力猫生成时,则第二电力猫将自身的NMK码修改为目标NMK码,且通过第一密钥将目标NMK码加密发送至第一电力猫,以使得第一电力猫通过第一密钥解密得到目标NMK码,并修改第一电力猫的NMK码为目标NMK码。
209、第一电力猫发送提示消息;
第一电力猫的NMK码与第二电力猫的NMK码统一后,即完成了两者的配对,第一电力猫发送提示消息,以提示用户配对成功,需要说明的是,第一电力猫提示用户配对成功的方式有多种,例如通过预置的亮灯方式,在第一电力猫与第二电力猫配对过程中,第一电力猫上的指示灯周期性闪烁,配对成功时第一电力猫上的指示灯变为长亮;或者在第一电力猫与第二电力猫配对过程中,第一电力猫发出“滴-滴-滴”的声音,配对成功时第一电力猫停止发声,以提示用户配对成功,故提示用户配对成功的方式具体此处不做限定。
需要说明的是,本申请实施例中,第二电力猫也可以发送提示消息,第二电力猫发送提示消息的方式与第一电力猫发送提示消息的方式类似,此处不再赘述。
另外,可以理解的是,第一电力猫和第二电力猫可以都发送提示消息,或者仅由其中一个电力猫发送提示消息,具体此处不做限定。
210、第一电力猫接收第三电力猫发送的接入请求消息;
第一电力猫与第二电力猫配对成功后,用户可将第一电力猫通过网线与宽带接口连接,并拔下第二电力猫插到终端附近的电源插座上,且第二电力猫的一端通过网线与终端的网线接口连接,使得终端能够实现上传和下载数据。第一电力猫与第二电力猫组网成功后,若用户还需要接入第三电力猫,则将第三电力猫插在第一电力猫或者第二电力猫的附近的电源插座上,若插在第一电力猫附近的电源插座时,第一电力猫接收第三电力猫发送的接入请求消息,并回复第三电力猫接入请求响应,且该接入请求响应中携带关联确认信息,该关联确认信息用于告知第三电力猫,第一电力猫已组网,使得该第三电力猫加入该组网中。
211、第一电力猫判断接入请求消息的信号强度是否大于第一预设值;若否,则执行步骤212;若是,则执行步骤213;
本申请实施例中,步骤211中第一电力猫判断接入请求消息的信号强度是否大于第一预设值的方式与步骤202中第一电力猫判断组网请求消息的信号强度是否大于第一预设值的方式类似,此处不再赘述。
212、第一电力猫与第三电力猫不进行配对;
本申请实施例中,步骤212与步骤203类似,此处不再赘述。
213、第一电力猫生成第二密钥;
214、第三电力猫生成第二密钥;
215、第一电力猫根据第二密钥将目标NMK码发送至第三电力猫;
216、第三电力猫将第三电力猫的NMK码修改为目标NMK码。
217、第三电力猫发送提醒消息。
本申请实施例中,步骤213至步骤217中第一电力猫与第三电力猫的交互过程与步骤205至步骤209类似,此处不再赘述。
需要说明的是,本申请实施例中,步骤210至步骤217为第一电力猫与第二电力猫配对组网后,第三电力猫加入该组网的过程,实际应用中,第三电力猫的个数不做限定,例如,第三电力猫的个数为0,则不存在步骤210至步骤217;第三电力猫有多个时,则每添加一个第三电力猫,即可以重复一次步骤210至步骤217,故具体此处不做限定。
本申请实施例中,电力猫之间自动协商更改NMK码以完成配对,能够与邻区网络隔离,降低了安全风险,且电力猫上电后自动发送组网请求消息来完成协商组网,改善了用户的使用体验,同时厂家不需要为电力猫设计单独的物理配对按键,可以将电力猫体积做的更小,减少了硬件成本。
上面对本申请实施例中电力猫的配对方法进行了描述,下面对本申请实施例中的第一电力猫进行描述,请参阅图3,本申请实施例第一电力猫一个实施例包括:
第一接收单元301,用于接收第二电力猫发送的组网请求消息;
判断单元302,用于根据该组网请求消息判断该第一电力猫与该第二电力猫是否满足预置的配对条件;
确定单元303,当该第一电力猫与该第二电力猫满足预置的配对条件时,用于与该第二电力猫确定目标网络识别码NMK码;
第一配对单元304,用于根据该目标NMK码与该第二电力猫配对。
本申请实施例中,当判断单元判断第一电力猫和第二电力猫满足预置的配对条件时,确定单元与第二电力猫确定目标NMK码来完成配对,相对于现有技术的不需要配对即完成连接,本申请实施例增加了网络的私密性以及安全性。
为便于理解,下面对本申请实施例中的第一电力猫进行详细描述,在上述图3所示的基础上,请参阅图4,图4为本申请实施例中第一电力猫的另一个实施例示意图,第一电力猫包括:第一接收单元401、判断单元402、确定单元403和第一配对单元404,其中判断单元402包括:
第一判断模块4021,用于判断组网请求消息的信号强度是否大于第一预设值;
若是,则第一电力猫与第二电力猫满足所述预置的配对条件。
可选的,本申请实施例中第一电力猫的另一实施例中,判断单元302包括:
第二判断模块4022,用于判断组网请求消息的频率是否为预设频率;
若是,则第一电力猫与第二电力猫满足预置的配对条件。
可选的,本申请实施例中第一电力猫的另一实施例中,确定单元403包括:
确定模块4031,用于与第二电力猫确定第一电力猫的NMK码为目标NMK码。
可选的,本申请实施例中第一电力猫的另一实施例中,第一配对单元404包括:
第一生成模块4041,用于与第二电力猫生成第一密钥;
第一发送模块4042,用于根据第一密钥将第一电力猫的NMK码发送至第二电力猫,以使得第二电力猫将第二电力猫的NMK码修改为目标NMK码,以完成配对。
可选的,本申请实施例中第一电力猫的另一实施例中,第一电力猫还可以包括:
第二接收单元405,用于接收第三电力猫发送的接入请求消息;
第二配对单元406,用于与第三电力猫配对,以使得第三电力猫将第三电力猫的NMK码修改为目标NMK码。
可选的,本申请实施例中第一电力猫的另一实施例中,第二配对单元406可以包括:
第二生成模块4061,用于与第三电力猫生成第二密钥;
第二发送模块4062,用于根据第二密钥将目标NMK码发送至第三电力猫,以完成配对。
可选的,本申请实施例中第一电力猫的另一实施例中,第一电力猫还可以包括:
发送单元407,用于发送提示消息,提示消息用于提示配对成功。
可选的,本申请实施例中第一电力猫的另一实施例中,第一电力猫还可以包括:
响应单元408,用于响应于组网请求消息,向第二电力猫发送组网确认消息。
本申请实施例中,第一判断模块通过判断组网请求消息的信号强度来确定第一电力猫和第二电力猫是否满足预置的配对条件,或者第二判断模块通过判断组网请求消息的频率来确定第一电力猫和第二电力猫是否满足预置的配对条件,增加了本申请实施例的实现方式。
上面对本申请实施例中第一电力猫进行了描述,下面对本申请实施例中的第二电力猫进行描述,请参阅图5,本申请实施例第二电力猫一个实施例包括:
第一发送单元501,用于发送组网请求消息,以使得第一电力猫根据组网请求消息确定第一电力猫与第二电力猫满足预置的配对条件;
确定单元502,用于与第一电力猫确定目标NMK码;
第一配对单元503,用于将第二电力猫的NMK码修改为目标NMK码,以完成与第一电力猫的配对。
本申请实施例中,当满足预置的配对条件时,确定单元确定目标NMK码来完成配对,相对于现有技术的不需要配对即完成连接,本申请实施例增加了网络的安全性和私密性。
为便于理解,下面对本申请实施例中的第二电力猫进行详细描述,在上述图5所示的基础上,请参阅图6,图6为本申请实施例中第二电力猫的另一个实施例示意图,第二电力猫包括:第一发送单元601、确定单元602和第一配对单元603,其中确定单元602包括:
确定模块6021,用于与第一电力猫确定第一电力猫的NMK码为目标NMK码。
可选的,本申请实施例中第二电力猫的另一实施例中,第二电力猫还可以包括:
第一接收单元604,用于接收第三电力猫发送的接入请求消息;
第二配对单元605,用于与第三电力猫配对,以使得第三电力猫将第三电力猫的NMK码修改为目标NMK码。
可选的,本申请实施例中第二电力猫的另一实施例中,第二电力猫还可以包括:
第二接收单元606,用于接收第一电力猫发送的组网确认消息。
可选的,本申请实施例中第二电力猫的另一实施例中,第二电力猫还可以包括:
第二发送单元607,用于发送提示消息,提示消息用于提示配对成功。
本申请实施例中,第一接收单元接收第三电力猫发送的接入请求消息,第二发送单元发送提示消息来提示用户配对成功,增加了本申请实施例的实现方式。
上面图3至图6从模块化功能实体的角度分别对本申请实施例中的第一电力猫和第二电力猫进行描述,下面从硬件处理的角度对本申请实施例中的第一电力猫进行详细描述,请参阅图7,图7是本申请实施例提供的一种第一电力猫的结构示意图,该第一电力猫700可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上中央处理器(central processing units,CPU)722(例如,一个或一个以上处理器)和存储器732,一个或一个以上存储应用程序742或数据744的存储介质730(例如一个或一个以上海量存储设备)。其中,存储器732和存储介质730可以是短暂存储或持久存储。存储在存储介质730的程序可以包括一个或一个以上模块(图示没标出),每个模块可以包括对智能终端中的一系列指令操作。更进一步地,中央处理器722可以设置为与存储介质730通信,在智能终端700上执行存储介质730中的一系列指令操作。
智能终端700还可以包括一个或一个以上电源726,一个或一个以上有线或无线网络接口750,一个或一个以上输入输出接口758,和/或,一个或一个以上操作系统741,例如Windows Server,Mac OS X,Unix,Linux,FreeBSD等等。
上述实施例中的存储介质730可以是计算机能够存储的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如,固态硬盘 (solid state disk,SSD))等。
上述实施例中由第一电力猫所执行的步骤可以基于该图7所示的第一电力猫结构。
请参阅图8,本申请实施例中第二电力猫一个实施例包括:
图8是本申请实施例提供的一种第二电力猫的结构示意图,该第二电力猫800可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上中央处理器(central processing units,CPU)822(例如,一个或一个以上处理器)和存储器832,一个或一个以上存储应用程序842或数据844的存储介质830(例如一个或一个以上海量存储设备)。其中,存储器832和存储介质830可以是短暂存储或持久存储。存储在存储介质830的程序可以包括一个或一个以上模块(图示没标出),每个模块可以包括对Wi-Fi接入点中的一系列指令操作。更进一步地,中央处理器822可以设置为与存储介质830通信,在Wi-Fi接入点800上执行存储介质830中的一系列指令操作。
第二电力猫800还可以包括一个或一个以上电源826,一个或一个以上有线或无线网络接口850,一个或一个以上输入输出接口858,和/或,一个或一个以上操作系统841,例如Windows Server,Mac OS X,Unix,Linux,FreeBSD等等。
上述实施例中由第二电力猫所执行的步骤可以基于该图8所示的第二电力猫结构。
上述实施例中的存储介质830可以是计算机能够存储的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如,固态硬盘(solid state disk,SSD))等。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。
所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存储的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(solid state disk,SSD))等。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显 示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。

Claims (30)

  1. 一种电力猫的配对方法,其特征在于,包括:
    第一电力猫接收第二电力猫发送的组网请求消息;
    所述第一电力猫根据所述组网请求消息判断所述第一电力猫与所述第二电力猫是否满足预置的配对条件;
    当所述第一电力猫与所述第二电力猫满足预置的配对条件时,所述第一电力猫与所述第二电力猫确定目标NMK码;
    所述第一电力猫根据所述目标NMK码与所述第二电力猫配对。
  2. 根据权利要求1所述的配对方法,所述第一电力猫根据所述组网请求消息判断所述第一电力猫与所述第二电力猫是否满足预置的配对条件包括:
    所述第一电力猫判断所述组网请求消息的信号强度是否大于第一预设值;
    若是,则所述第一电力猫与所述第二电力猫满足所述预置的配对条件。
  3. 根据权利要求1所述的配对方法,所述第一电力猫根据所述组网请求消息判断所述第一电力猫与所述第二电力猫是否满足预置的配对条件包括:
    所述第一电力猫判断所述组网请求消息的频率是否为预设频率;
    若是,则所述第一电力猫与所述第二电力猫满足所述预置的配对条件。
  4. 根据权利要求1所述的配对方法,其特征在于,所述第一电力猫与所述第二电力猫确定目标NMK码包括:
    所述第一电力猫与所述第二电力猫确定所述第一电力猫的NMK码为所述目标NMK码。
  5. 根据权利要求4所述的配对方法,其特征在于,所述第一电力猫根据所述目标NMK码与所述第二电力猫配对包括:
    所述第一电力猫与所述第二电力猫生成第一密钥;
    所述第一电力猫根据所述第一密钥将所述第一电力猫的NMK码发送至所述第二电力猫,以使得所述第二电力猫将所述第二电力猫的NMK码修改为所述目标NMK码,以完成配对。
  6. 根据权利要求1所述的配对方法,其特征在于,所述第一电力猫根据所述目标NMK码与所述第二电力猫配对之后,所述方法还包括:
    所述第一电力猫接收第三电力猫发送的接入请求消息;
    所述第一电力猫与所述第三电力猫配对,以使得所述第三电力猫将所述第三电力猫的NMK码修改为所述目标NMK码。
  7. 根据权利要求6所述的配对方法,其特征在于,所述第一电力猫与所述第三电力猫配对包括:
    所述第一电力猫与所述第三电力猫生成第二密钥;
    所述第一电力猫根据所述第二密钥将所述目标NMK码发送至所述第三电力猫,以完成配对。
  8. 根据权利要求1至7中任一项所述的配对方法,其特征在于,所述第一电力猫根据 所述目标NMK码与所述第二电力猫配对之后,所述方法还包括:
    所述第一电力猫发送提示消息,所述提示消息用于提示配对成功。
  9. 根据权利要求2到8中任一项所述的配对方法,其特征在于,所述第一电力猫根据所述组网请求消息判断所述第一电力猫与所述第二电力猫是否满足预置的配对条件之后,所述第一电力猫与所述第二电力猫确定目标NMK码之前,所述方法还包括:
    响应于所述组网请求消息,所述第一电力猫向所述第二电力猫发送组网确认消息。
  10. 一种电力猫的配对方法,其特征在于,包括:
    第二电力猫发送组网请求消息,以使得所述第一电力猫根据所述组网请求消息确定所述第一电力猫与所述第二电力猫满足预置的配对条件;
    所述第二电力猫与所述第一电力猫确定目标NMK码;
    所述第二电力猫将所述第二电力猫的NMK码修改为所述目标NMK码,以完成与所述第一电力猫的配对。
  11. 根据权利要求10所述的配对方法,其特征在于,所述第二电力猫与所述第一电力猫确定目标NMK码包括:
    所述第二电力猫与所述第一电力猫确定所述第一电力猫的NMK码为所述目标NMK码。
  12. 根据权利要求11所述的配对方法,其特征在于,所述第二电力猫将所述第二电力猫的NMK码修改为所述目标NMK码之后,所述方法还包括:
    所述第二电力猫接收第三电力猫发送的接入请求消息;
    所述第二电力猫与所述第三电力猫配对,以使得所述第三电力猫将所述第三电力猫的NMK码修改为所述目标NMK码。
  13. 根据权利要求10到12中任一项所述的配对方法,其特征在于,所述第二电力猫发送组网请求消息之后,所述第二电力猫与所述第一电力猫确定目标NMK码之前,所述方法还包括:
    所述第二电力猫接收所述第一电力猫发送的组网确认消息。
  14. 根据权利要求10到13中任一项所述的配对方法,其特征在于,所述第二电力猫将所述第二电力猫的NMK码修改为所述目标NMK码,以完成与所述第一电力猫的配对之后,所述方法还包括:
    所述第二电力猫发送提示消息,所述提示消息用于提示配对成功。
  15. 一种电力猫,所述电力猫为第一电力猫,其特征在于,包括:
    第一接收单元,用于接收第二电力猫发送的组网请求消息;
    判断单元,用于根据所述组网请求消息判断所述第一电力猫与所述第二电力猫是否满足预置的配对条件;
    确定单元,当所述第一电力猫与所述第二电力猫满足预置的配对条件时,用于与所述第二电力猫确定目标网络识别码NMK码;
    第一配对单元,用于根据所述目标NMK码与所述第二电力猫配对。
  16. 根据权利要求15所述的电力猫,其特征在于,所述判断单元包括:
    第一判断模块,用于判断所述组网请求消息的信号强度是否大于第一预设值;
    若是,则所述第一电力猫与所述第二电力猫满足所述预置的配对条件。
  17. 根据权利要求15所述的电力猫,其特征在于,所述判断单元包括:
    第二判断模块,用于判断所述组网请求消息的频率是否为预设频率;
    若是,则所述第一电力猫与所述第二电力猫满足所述预置的配对条件。
  18. 根据权利要求15所述的电力猫,其特征在于,所述确定单元包括:
    确定模块,用于与所述第二电力猫确定所述第一电力猫的NMK码为所述目标NMK码。
  19. 根据权利要求18所述的电力猫,其特征在于,所述第一配对单元包括:
    第一生成模块,用于与所述第二电力猫生成第一密钥;
    第一发送模块,用于根据所述第一密钥将所述第一电力猫的NMK码发送至所述第二电力猫,以使得所述第二电力猫将所述第二电力猫的NMK码修改为所述目标NMK码,以完成配对。
  20. 根据权利要求15所述的电力猫,其特征在于,所述电力猫还包括:
    第二接收单元,用于接收第三电力猫发送的接入请求消息;
    第二配对单元,用于与所述第三电力猫配对,以使得所述第三电力猫将所述第三电力猫的NMK码修改为所述目标NMK码。
  21. 根据权利要求20所述的电力猫,其特征在于,所述第二配对单元包括:
    第二生成模块,用于与所述第三电力猫生成第二密钥;
    第二发送模块,用于根据所述第二密钥将所述目标NMK码发送至所述第三电力猫,以完成配对。
  22. 根据权利要求15至21中任一项所述的电力猫,其特征在于,所述电力猫还包括:
    发送单元,用于发送提示消息,所述提示消息用于提示配对成功。
  23. 根据权利要求16至22中任一项所述的电力猫,其特征在于,所述电力猫还包括:
    响应单元,用于响应于所述组网请求消息,向所述第二电力猫发送组网确认消息。
  24. 一种电力猫,所述电力猫为第二电力猫,其特征在于,包括:
    第一发送单元,用于发送组网请求消息,以使得所述第一电力猫根据所述组网请求消息确定所述第一电力猫与所述第二电力猫满足预置的配对条件;
    确定单元,用于与所述第一电力猫确定目标NMK码;
    第一配对单元,用于将所述第二电力猫的NMK码修改为所述目标NMK码,以完成与所述第一电力猫的配对。
  25. 根据权利要求24所述的电力猫,其特征在于,所述确定单元包括:
    确定模块,用于与所述第一电力猫确定所述第一电力猫的NMK码为所述目标NMK码。
  26. 根据权利要求25所述的电力猫,其特征在于,所述电力猫还包括:
    第一接收单元,用于接收第三电力猫发送的接入请求消息;
    第二配对单元,用于与所述第三电力猫配对,以使得所述第三电力猫将所述第三电力猫的NMK码修改为所述目标NMK码。
  27. 根据权利要求24至26中任一项所述的电力猫,其特征在于,所述电力猫还包括:
    第二接收单元,用于接收所述第一电力猫发送的组网确认消息。
  28. 根据权利要求24至27中任一项所述的电力猫,其特征在于,所述电力猫还包括:
    第二发送单元,用于发送提示消息,所述提示消息用于提示配对成功。
  29. 一种计算机可读存储介质,包括指令,当其在计算机上运行时,使得计算机执行如权利要求1-14任意一项所述的方法。
  30. 一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如权利要求1-14任意一项所述的方法。
PCT/CN2017/087675 2017-02-22 2017-06-09 一种电力猫的配对方法以及电力猫 WO2018152982A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201780008214.5A CN108886383B (zh) 2017-02-22 2017-06-09 一种电力猫的配对方法以及电力猫

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710097106 2017-02-22
CN201710097106.1 2017-02-22

Publications (1)

Publication Number Publication Date
WO2018152982A1 true WO2018152982A1 (zh) 2018-08-30

Family

ID=63253496

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/087675 WO2018152982A1 (zh) 2017-02-22 2017-06-09 一种电力猫的配对方法以及电力猫

Country Status (2)

Country Link
CN (1) CN108886383B (zh)
WO (1) WO2018152982A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203261327U (zh) * 2012-12-05 2013-10-30 海信集团有限公司 用于家用电器的电力线通信装置
CN104579428A (zh) * 2015-01-12 2015-04-29 上海泓亚通信技术有限公司 一种plc设备自动配对方法
CN104756410A (zh) * 2012-10-26 2015-07-01 高通股份有限公司 多实例电力线通信系统
CN104967466A (zh) * 2015-04-29 2015-10-07 普联技术有限公司 一种宽带电力线通信设备的组网方法及装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7689602B1 (en) * 2005-07-20 2010-03-30 Bakbone Software, Inc. Method of creating hierarchical indices for a distributed object system
US9521090B2 (en) * 2007-06-04 2016-12-13 Qualcomm Incorporated Authorizing stations into a centrally managed network
US20140146898A1 (en) * 2012-11-23 2014-05-29 Hassan Ibrahim Hallas Method and apparatus for data communications over power lines
US8874898B2 (en) * 2012-12-14 2014-10-28 Intel Corporation Power line based theft protection of electronic devices
US9173095B2 (en) * 2013-03-11 2015-10-27 Intel Corporation Techniques for authenticating a device for wireless docking

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104756410A (zh) * 2012-10-26 2015-07-01 高通股份有限公司 多实例电力线通信系统
CN203261327U (zh) * 2012-12-05 2013-10-30 海信集团有限公司 用于家用电器的电力线通信装置
CN104579428A (zh) * 2015-01-12 2015-04-29 上海泓亚通信技术有限公司 一种plc设备自动配对方法
CN104967466A (zh) * 2015-04-29 2015-10-07 普联技术有限公司 一种宽带电力线通信设备的组网方法及装置

Also Published As

Publication number Publication date
CN108886383A (zh) 2018-11-23
CN108886383B (zh) 2021-05-04

Similar Documents

Publication Publication Date Title
US20230093016A1 (en) Discovery and provisioning method, electronic device, and system
KR102460107B1 (ko) 무선 수신 전력 촉진을 위한 수신기 장치
EP2829095B1 (en) Network security configuration using short-range wireless communication
US8245278B2 (en) Apparatus and method for secure configuration of shared powerline devices
CN111787517A (zh) 智能设备激活绑定的方法和装置
JP6756009B2 (ja) データ伝送
WO2017031674A1 (zh) 一种安全认证方法、配置方法以及相关设备
CN107567017B (zh) 无线连接系统、装置及方法
KR20120073288A (ko) 무선 링크 키를 확립하기 위한 방법 및 디바이스
EP2756649B1 (en) Protocol-specific keys for a hybrid network
US11399069B2 (en) Method and apparatus to implement a home computing cloud
CN109327823B (zh) 组网方法、装置、系统、ZigBee设备及存储介质
WO2015030784A1 (en) Porting wifi settings
WO2021213463A1 (zh) 智能设备的配网方法及装置、电子设备、计算机可读介质
WO2016180091A1 (zh) 一种网络接入方法及装置
CN105069875A (zh) 电子钥匙、电子设备及电子设备组网/配对方法
WO2018210320A1 (zh) 一种通过充电装置对用户设备进行充电的方法与设备
US10152587B2 (en) Device pairing method
JP2021505938A (ja) データ暗号化を改善するシステムおよび方法
CN109841273B (zh) 一种医疗诊断软件的一站式整合方法及装置
CN114760112A (zh) 一种面向无线局域网络的智能家居设备入网方法、系统、设备及存储介质
WO2017147745A1 (zh) 一种对接入点ap的认证方法、系统及相关设备
CN114793178B (zh) 配网方法、装置、设备和存储介质
WO2018152982A1 (zh) 一种电力猫的配对方法以及电力猫
CN107294815B (zh) 进入工作网络的方法、装置和计算机可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17898282

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17898282

Country of ref document: EP

Kind code of ref document: A1