WO2019062570A1 - 设备配置方法及装置 - Google Patents

设备配置方法及装置 Download PDF

Info

Publication number
WO2019062570A1
WO2019062570A1 PCT/CN2018/105907 CN2018105907W WO2019062570A1 WO 2019062570 A1 WO2019062570 A1 WO 2019062570A1 CN 2018105907 W CN2018105907 W CN 2018105907W WO 2019062570 A1 WO2019062570 A1 WO 2019062570A1
Authority
WO
WIPO (PCT)
Prior art keywords
physical device
network
information
access
community
Prior art date
Application number
PCT/CN2018/105907
Other languages
English (en)
French (fr)
Inventor
朱碧军
杨豪
李林峰
邓高亮
Original Assignee
阿里巴巴集团控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Publication of WO2019062570A1 publication Critical patent/WO2019062570A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0889Techniques to speed-up the configuration process
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • One or more embodiments of the present disclosure relate to the field of terminal technologies, and in particular, to a device configuration method and apparatus.
  • one or more embodiments of the present specification provide a device configuration method and apparatus.
  • a device configuration method comprising:
  • the first physical device in the network calculates the access information of the network according to the first built-in algorithm, where the first physical device is bound to the community;
  • the second physical device calculates, according to the information about the community sent by the user equipment, the information of the community according to the second built-in algorithm to obtain the access information to be verified, and uses the information to be verified to the first physical
  • the device initiates an access request to the network
  • the first physical device allows the second physical device to access the network if the to-be-verified access information matches the access information.
  • a device configuration method including:
  • the first physical device in the network calculates the access information of the network according to the first built-in algorithm, where the first physical device is bound to the community;
  • the first physical device allows the second physical device to access the network if the to-be-verified access information matches the access information.
  • a device configuration method including:
  • the second physical device calculates the information to be verified according to the information of the community according to the second built-in algorithm
  • the second physical device When the second physical device detects the network where the first physical device is located, the second physical device initiates an access request for the network to the first physical device, where the access request includes the to-be-verified access information. To access the network after successful authentication.
  • a device configuration method including:
  • the user equipment binds the first physical device to the community, so that after the first physical device joins the network, the information of the community is calculated according to the first built-in algorithm to obtain the access information of the network;
  • the user equipment sends the information of the community to the second physical device, so that the information about the community is calculated by the second physical device according to the second built-in algorithm, and the access information to be verified is obtained, and based on the waiting Verifying that the access information initiates an access request for the network to the first physical device; wherein the first physical device allows the location if the to-be-authenticated access information matches the access information
  • the second physical device accesses the network.
  • a device configuration method including:
  • the first physical device allows the second physical device to access the network if the to-be-verified access information matches the access information.
  • an apparatus configuration apparatus comprising:
  • the network creation unit is configured to enable the first physical device in the network to calculate the access information of the network according to the first built-in algorithm, where the first physical device is bound to the community;
  • the information acquiring unit when the first physical device receives the access request initiated by the second physical device to the network, acquires the to-be-verified access information included in the access request;
  • the access verification unit is configured to enable the first physical device to allow the second physical device to access the network if the to-be-authenticated access information matches the access information.
  • an apparatus configuration apparatus comprising:
  • the information receiving unit is configured to enable the second physical device to receive information about the community sent by the user equipment;
  • the information calculation unit is configured to calculate, by the second physical device, the information of the community according to the second built-in algorithm to obtain the access information to be verified;
  • An access requesting unit when the second physical device detects the network where the first physical device is located, initiates an access request for the network to the first physical device, where the access request includes the The access information is to be verified to access the network after successful authentication.
  • an apparatus configuration apparatus including:
  • the group binding unit is configured to bind the first physical device to the community, so that the first physical device joins the network, and the information of the community is calculated according to the first built-in algorithm to obtain the access of the network. information;
  • An information sending unit configured to send, by the user equipment, the information of the community to the second physical device, to calculate, by the second physical device, the information of the community according to the second built-in algorithm, to obtain the access information to be verified, And initiating, according to the to-be-verified access information, an access request for the network to the first physical device, where the first physical device matches the access information to be verified In the case, the second physical device is allowed to access the network.
  • FIG. 1 is a schematic diagram of configuring a physical device according to an exemplary embodiment.
  • FIG. 2A is a flowchart of a device configuration method according to an exemplary embodiment.
  • FIG. 2B is a flowchart of another apparatus configuration method according to an exemplary embodiment.
  • FIG. 3 is a flowchart of another apparatus configuration method provided by an exemplary embodiment.
  • FIG. 4 is a flowchart of still another device configuration method according to an exemplary embodiment.
  • FIG. 5 is a flowchart of still another device configuration method according to an exemplary embodiment.
  • FIG. 6 is a schematic diagram of operational logic of an access point device according to an exemplary embodiment.
  • FIG. 7 is a schematic diagram of a network access interface provided by an exemplary embodiment.
  • FIG. 10 is a schematic diagram of an APP boot interface provided by an exemplary embodiment.
  • FIG. 11 is a schematic diagram of an APP download guiding interface provided by an exemplary embodiment.
  • FIG. 12 is a schematic diagram of an enterprise WeChat login interface provided by an exemplary embodiment.
  • FIG. 13 is a schematic diagram of an enterprise WeChat update interface provided by an exemplary embodiment.
  • FIG. 14 is a schematic diagram of a team selection interface provided by an exemplary embodiment.
  • FIG. 16 is a block diagram of an apparatus configuration apparatus according to an exemplary embodiment.
  • FIG. 18 is a block diagram of still another device configuration apparatus according to an exemplary embodiment.
  • FIG. 1 is a schematic diagram of configuring a physical device according to an exemplary embodiment. It is assumed that a plurality of physical devices need to be configured, for example, the plurality of physical devices including the access point device 11 shown in FIG. 1, the access point device 12, and the access point device 13 are networked to form a local local area network, and The local area network establishes a connection with the external network 15 to ensure that the electronic devices within the local area network can access the network 15.
  • the network 15 may include multiple types of wired or wireless networks; in an embodiment, the network 15 may include a Public Switched Telephone Network (PSTN) and the Internet.
  • PSTN Public Switched Telephone Network
  • the above several physical devices may include any electronic device, such as an attendance machine, a printer, a projector, an access control, and the above-mentioned access point device, etc., which is not limited in this specification.
  • the access point device 11-13 may include any network device having a routing function; in an embodiment, the access point device 11-13 may be an AP in a conventional sense or The router is configured to implement networking in a wired network scenario.
  • the access point device 11-13 can be a wireless router, that is, a router that has both an AP function and a routing function, and can implement networking in a wired network scenario. It is also possible to implement networking under the wireless network. This specification does not limit the specific types of access point devices 11-13.
  • the user can configure a plurality of the above physical devices through user equipment such as the mobile phone 14.
  • the access point device 11 may be first bound to the community, and the access point device 11 is connected to the network 15, as a local local area network within the community and the above-mentioned network 15
  • the gateway device then causes the access point device 12-13 to access the local area network, such that the access point device 11 implements automatic configuration for the access point device 12-13, configuring the access point device 12-13 as the local Routing devices or AP devices in the LAN without manual configuration by the user.
  • the automatic configuration can be completed through the access point 11 or automatically through other devices such as the access point device 12-13. This specification does not limit this.
  • the user equipment may also include various types of electronic devices such as a tablet device, a notebook computer, a PDA (Personal Digital Assistants), and a wearable device (such as smart glasses, smart watches, etc.).
  • a tablet device such as a notebook computer, a PDA (Personal Digital Assistants), and a wearable device (such as smart glasses, smart watches, etc.).
  • PDA Personal Digital Assistants
  • a wearable device such as smart glasses, smart watches, etc.
  • the handset 14 can run a client-side program of an application, for example, the handset 14 can run a program of the mobile group office platform to implement configuration functions for the plurality of physical devices described above.
  • the mobile group office platform can not only realize the communication function, but also can be used as an integrated function platform for many other functions, such as approval events (such as leave, office item application, financial and other approval events), attendance events.
  • approval events such as leave, office item application, financial and other approval events
  • attendance events such as attendance events.
  • the mobile group office platform can be carried in instant messaging applications in related technologies, such as enterprise instant messaging (EIM) applications, such as Skype For. Wait.
  • EIM enterprise instant messaging
  • the instant messaging function is only one of the communication functions supported by the mobile group office platform, and the mobile group office platform can implement more functions such as the above, which will not be described here.
  • the application of the client of the mobile group office platform can be pre-installed on the mobile phone 14 so that the client can be launched and run on the mobile phone 14; of course, when using an online "customer such as HTML5 technology" At the end, the client can be obtained and run without installing the corresponding application on the mobile phone 14.
  • FIG. 2A is a flowchart of a device configuration method according to an exemplary embodiment. As shown in FIG. 2A, the method can include the following steps:
  • Step 202A The first physical device in the network calculates the access information of the network according to the first built-in algorithm, where the first physical device is bound to the community.
  • the information of the community may include: a name of the community, an identification number of the community, and the like, which is not limited in this specification.
  • the network in which the first physical device is located may include a wired network or a wireless network.
  • the wireless network may include a network using the WIFI protocol, etc., and the specification does not limit this.
  • the network described above may be created by the first physical device.
  • the foregoing network may be created by another device, and after the first physical device accesses the network, the access information of the network may be determined according to the information of the community, to be verified by the second physical device. After the access information is verified, the second physical device is assisted to access the network.
  • the access information may include authentication information for the network; in another embodiment, the access information may include authentication information for the network; in other embodiments, the access information may include other types of Information, this specification does not limit this.
  • the access information may include the SSID and password of the network;
  • the network where the first physical device is located may also adopt other forms, and the present specification does not limit this.
  • the first built-in algorithm may be a default algorithm configured by the first physical device at the factory, or may be updated or replaced according to actual needs after leaving the factory.
  • the first built-in algorithm may include a digital digest algorithm for calculating a digital digest corresponding to the information of the community, which is not limited in this specification.
  • Step 204A The second physical device calculates the information to be verified according to the information of the community sent by the user equipment according to the second built-in algorithm, and uses the information to be verified to use the information to be verified.
  • the first physical device initiates an access request to the network.
  • the second built-in algorithm may be a default algorithm configured by the second physical device at the factory, or may be updated or replaced according to actual needs after leaving the factory.
  • the first built-in algorithm may include a digital digest algorithm for calculating a digital digest corresponding to the information of the community, which is not limited in this specification.
  • the first built-in algorithm and the second built-in algorithm may include any algorithm, and only the first built-in algorithm in the first physical device is required to be consistent with the second built-in algorithm in the second physical device, and the first physical device Consistent with the information of the community acquired by the second physical device, it can be ensured that the access information to be verified calculated by the second physical device matches the access information calculated by the first physical device, so that the second physical device can access the second physical device.
  • the first built-in algorithm in the first physical device and the second physical device may be ensured.
  • the second built-in algorithm is the same, so that when the user equipment informs the second physical device of the information of the community to which the first physical device is bound, the information to be verified calculated by the second physical device and the first physical device can be calculated.
  • the access information matches.
  • Step 206A The first physical device allows the second physical device to access the network if the to-be-verified access information matches the access information.
  • the first physical device configures the second physical device after the second physical device accesses the network.
  • the first physical device may perform any type of configuration operation on the second physical device, for example, the first physical device may bind the second physical device to the community, or the first physical device may be associated with the second Device networking and the like are implemented between physical devices, and this specification does not limit this.
  • the second physical device is notified by the user equipment, and the corresponding physical information to be verified is calculated by the second physical device by using the second built-in algorithm, so that the first physical device can be located.
  • the network adds access authentication. The security of the network prevents unauthorized devices from accessing the network. This helps improve the security and risk of the first physical device and its network.
  • FIG. 2B is a flowchart of another apparatus configuration method according to an exemplary embodiment. As shown in FIG. 2B, the method may include the following steps:
  • Step 202B The first physical device in the network determines the access information of the network according to the information of the community bound to the first physical device.
  • the information of the community may include: a name of the community, an identification number of the community, and the like, which is not limited in this specification.
  • the network in which the first physical device is located may include a wired network or a wireless network.
  • the wireless network may include a network using the WIFI protocol, etc., and the specification does not limit this.
  • the network described above may be created by the first physical device.
  • the foregoing network may be created by another device, and after the first physical device accesses the network, the access information of the network may be determined according to the information of the community, to be verified by the second physical device. After the access information is verified, the second physical device is assisted to access the network.
  • the access information may include authentication information for the network; in another embodiment, the access information may include authentication information for the network; in other embodiments, the access information may include other types of Information, this specification does not limit this.
  • the access information may include the SSID and password of the network;
  • the network where the first physical device is located may also adopt other forms, and the present specification does not limit this.
  • the first physical device may be pre-configured with a processing scheme for the information of the community to process the information of the community through the processing scheme to obtain access information of the network.
  • the processing scheme may include a first built-in algorithm, which may be a default algorithm configured by the first physical device at the factory, or may be updated or replaced according to actual needs after leaving the factory. limit.
  • the first built-in algorithm may include a digital digest algorithm for calculating a digital digest corresponding to the information of the community, which is not limited in this specification.
  • Step 204B The second physical device determines the to-be-authenticated access information for the network according to the information about the community sent by the user equipment, and uses the to-be-verified access information to initiate the network to the first physical device. Access request;
  • the second physical device may be pre-configured with a processing scheme for the information of the community, to process the information of the community by using the processing scheme to obtain the foregoing to-be-verified access information.
  • the processing scheme may include a second built-in algorithm, which may be a default algorithm configured by the second physical device at the factory, or may be updated or replaced according to actual needs after leaving the factory.
  • the second built-in algorithm may include a digital digest algorithm for calculating a digital digest corresponding to the information of the community, which is not limited in this specification.
  • the processing scheme preset by the first physical device and the second physical device may include any type, and only the processing schemes of the first physical device and the second physical device are required to be consistent, and the first physical device and the second physical device acquire the The information of the community is consistent, so that the access information to be verified determined by the second physical device matches the access information determined by the first physical device, so that the second physical device can access the network where the first physical device is located. And automatically configuring the second physical device by the first physical device.
  • the first physical device and the second physical device may be ensured that the processing scheme is the same. Therefore, when the user equipment informs the second physical device that the information of the community to which the first physical device is bound, the access information to be verified determined by the second physical device and the access information determined by the first physical device are match.
  • Step 206B The first physical device allows the second physical device to access the network if the to-be-verified access information matches the access information.
  • the first physical device configures the second physical device after the second physical device accesses the network.
  • the first physical device may perform any type of configuration operation on the second physical device, for example, the first physical device may bind the second physical device to the community, or the first physical device may be associated with the second Device networking and the like are implemented between physical devices, and this specification does not limit this.
  • the information of the community is notified to the second physical device, and the second physical device determines the corresponding access information to be verified, so that the first physical device can add access to the network.
  • the verification function, the security of the network, and the access of the illegal device to the network helps to improve the security and risk of the first physical device and its network.
  • FIG. 3 is a flowchart of another apparatus configuration method provided by an exemplary embodiment. As shown in FIG. 3, the method may include the following steps:
  • Step 302 The first physical device in the network calculates the access information of the network according to the first built-in algorithm, where the first physical device is bound to the community.
  • the information of the community may include: a name of the community, an identification number of the community, and the like, which is not limited in this specification.
  • the network in which the first physical device is located may include a wired network or a wireless network.
  • the wireless network may include a network using the WIFI protocol, etc., and the specification does not limit this.
  • the access information may include authentication information for the network; in another embodiment, the access information may include authentication information for the network; in other embodiments, the access information may include other types of Information, this specification does not limit this.
  • the access information may include the SSID and password of the network; in other embodiments, the first physical device is located
  • the network may take other forms, and this specification does not limit this.
  • the first built-in algorithm may be a default algorithm configured by the first physical device at the factory, or may be updated or replaced according to actual needs after leaving the factory.
  • the first built-in algorithm may include a digital digest algorithm for calculating a digital digest corresponding to the information of the community, which is not limited in this specification.
  • Step 304 The first physical device acquires the to-be-verified access information included in the access request when receiving the access request initiated by the second physical device to the network.
  • the second built-in algorithm may be a default algorithm configured by the second physical device at the factory, or may be updated or replaced according to actual needs after leaving the factory.
  • the first built-in algorithm may include a digital digest algorithm for calculating a digital digest corresponding to the information of the community, which is not limited in this specification.
  • the first built-in algorithm and the second built-in algorithm may include any algorithm, and only the first built-in algorithm in the first physical device is required to be consistent with the second built-in algorithm in the second physical device, and the first physical device Consistent with the information of the community acquired by the second physical device, it can be ensured that the access information to be verified calculated by the second physical device matches the access information calculated by the first physical device, so that the second physical device can access the second physical device.
  • the first physical device configures the second physical device after the second physical device accesses the network.
  • the first physical device may perform any type of configuration operation on the second physical device, for example, the first physical device may bind the second physical device to the community, or the first physical device may be associated with the second Device networking and the like are implemented between physical devices, and this specification does not limit this.
  • FIG. 4 is a flowchart of still another device configuration method according to an exemplary embodiment. As shown in FIG. 4, the method may include the following steps:
  • Step 402 The second physical device receives information about a community sent by the user equipment.
  • the information of the community may include: a name of the community, an identification number of the community, and the like, which is not limited in this specification.
  • Step 404 The second physical device calculates, according to the second built-in algorithm, information about the community to obtain access information to be verified.
  • the second built-in algorithm may be a default algorithm configured by the second physical device at the factory, or may be updated or replaced according to actual needs after leaving the factory.
  • the first built-in algorithm may include a digital digest algorithm for calculating a digital digest corresponding to the information of the community, which is not limited in this specification.
  • Step 406 When detecting the network where the first physical device is located, the second physical device initiates an access request for the network to the first physical device, where the access request includes the to-be-authenticated connection Information is entered to access the network after successful authentication.
  • the network in which the first physical device is located may include a wired network or a wireless network.
  • the wireless network may include a network using the WIFI protocol, etc., and the specification does not limit this.
  • the access information may include authentication information for the network; in another embodiment, the access information may include authentication information for the network; in other embodiments, the access information may include other types of Information, this specification does not limit this.
  • the access information may include the SSID and password of the network;
  • the network where the first physical device is located may also adopt other forms, and the present specification does not limit this.
  • the first built-in algorithm may be a default algorithm configured by the first physical device at the factory, or may be updated or replaced according to actual needs after leaving the factory.
  • the first built-in algorithm may include a digital digest algorithm for calculating a digital digest corresponding to the information of the community, which is not limited in this specification.
  • the first built-in algorithm and the second built-in algorithm may include any algorithm, and only the first built-in algorithm in the first physical device is required to be consistent with the second built-in algorithm in the second physical device, and the first physical device Consistent with the information of the community acquired by the second physical device, it can be ensured that the access information to be verified calculated by the second physical device matches the access information calculated by the first physical device, so that the second physical device can access the second physical device.
  • the first built-in algorithm in the first physical device and the second physical device may be ensured.
  • the second built-in algorithm is the same, so that when the user equipment informs the second physical device of the information of the community to which the first physical device is bound, the information to be verified calculated by the second physical device and the first physical device can be calculated.
  • the access information matches.
  • the first physical device configures the second physical device after the second physical device accesses the network.
  • the first physical device may perform any type of configuration operation on the second physical device, for example, the first physical device may bind the second physical device to the community, or the first physical device may be associated with the second Device networking and the like are implemented between physical devices, and this specification does not limit this.
  • the second physical device is notified by the user equipment, and the corresponding physical information to be verified is calculated by the second physical device by using the second built-in algorithm, so that the first physical device can be located.
  • the network adds access authentication. The security of the network prevents unauthorized devices from accessing the network. This helps improve the security and risk of the first physical device and its network.
  • the network in which the first physical device is located may include a wired network or a wireless network.
  • the wireless network may include a network using the WIFI protocol, etc., and the specification does not limit this.
  • the access information may include authentication information for the network; in another embodiment, the access information may include authentication information for the network; in other embodiments, the access information may include other types of Information, this specification does not limit this.
  • the access information may include the SSID and password of the network;
  • the network where the first physical device is located may also adopt other forms, and the present specification does not limit this.
  • the first built-in algorithm may be a default algorithm configured by the first physical device at the factory, or may be updated or replaced according to actual needs after leaving the factory.
  • the first built-in algorithm may include a digital digest algorithm for calculating a digital digest corresponding to the information of the community, which is not limited in this specification.
  • Step 504 The user equipment sends the information of the community to the second physical device, to calculate, by the second physical device, the information about the community according to the second built-in algorithm, to obtain the access information to be verified, and based on The access information to be verified initiates an access request for the network to the first physical device, where the first physical device is in the case that the to-be-verified access information matches the access information. Allowing the second physical device to access the network.
  • the data interaction between the devices can be implemented based on the client, thereby enabling the user to
  • the device may bind the first physical device to the community, and the user device may send the information of the community to the second physical device, so that the second physical device accesses the network created by the first physical device, so that the first physical device
  • the second physical device implements automatic configuration.
  • the second built-in algorithm may be a default algorithm configured by the second physical device at the factory, or may be updated or replaced according to actual needs after leaving the factory.
  • the first built-in algorithm may include a digital digest algorithm for calculating a digital digest corresponding to the information of the community, which is not limited in this specification.
  • the first built-in algorithm and the second built-in algorithm may include any algorithm, and only the first built-in algorithm in the first physical device is required to be consistent with the second built-in algorithm in the second physical device, and the first physical device Consistent with the information of the community acquired by the second physical device, it can be ensured that the access information to be verified calculated by the second physical device matches the access information calculated by the first physical device, so that the second physical device can access the second physical device.
  • the first built-in algorithm in the first physical device and the second physical device may be ensured.
  • the second built-in algorithm is the same, so that when the user equipment informs the second physical device of the information of the community to which the first physical device is bound, the information to be verified calculated by the second physical device and the first physical device can be calculated.
  • the access information matches.
  • the first physical device configures the second physical device after the second physical device accesses the network.
  • the first physical device may perform any type of configuration operation on the second physical device, for example, the first physical device may bind the second physical device to the community, or the first physical device may be associated with the second Device networking and the like are implemented between physical devices, and this specification does not limit this.
  • the second physical device is notified by the user equipment, and the corresponding physical information to be verified is calculated by the second physical device by using the second built-in algorithm, so that the first physical device can be located.
  • the network adds access authentication. The security of the network prevents unauthorized devices from accessing the network. This helps improve the security and risk of the first physical device and its network.
  • the following describes the technical solution of the present specification by taking the networking process of multiple access points in the enterprise as an example; for example, it is assumed that the administrator in the enterprise sequentially connects to the access point device 11 through the mobile phone 14.
  • the in-point device 12 is configured.
  • the mobile phone 14, the access point device 11, and the access point device 12 respectively run a client of the enterprise WeChat, for example, the mobile phone 14 runs the enterprise WeChat client 1, and the access point device 11 runs the enterprise WeChat client.
  • the enterprise WeChat client 3 is run on the access point device 12, so that the electronic devices respectively implement the technical solutions of the present specification by running the corresponding enterprise WeChat client.
  • FIG. 6 is a schematic diagram of operational logic of an access point device according to an exemplary embodiment. As shown in FIG. 6, taking the access point device 11 as an example, the running logic based on the enterprise WeChat client 2 includes the following steps:
  • Step 602 After the access point device 11 is powered on, whether the self-test has completed the configuration.
  • step 604A when the self-test result is configured, the access point device 11 will operate according to the existing configuration scheme.
  • the access point device 11 can be configured to maintain a local area network, and the access point device 11 also accesses the wide area network, such that the configuration scheme of the access point device 11 is included as the local area network and the wide area network. Gateway device between.
  • the access point device 11 can be configured as a routing device or an AP device in a local area network maintained by other gateway devices to assist the user equipment in implementing network access to the wide area network.
  • step 604B when the self-test result is not configured, the access point device 11 will create an initial network according to the default rule, so that the administrator can implement the configuration operation of the access point device 11 through the mobile phone 14.
  • the SSID of the initial network may take the form of "product model + SN encoded five digits" to facilitate the administrator to distinguish the initial network from other networks. For example, assuming that the product model of the access point device 11 is "Alpha" and the five digits of the SN code are 12345, the SSID of the initial network may be "Alpha_12345".
  • FIG. 7 is a schematic diagram of a network access interface provided by an exemplary embodiment.
  • the mobile phone 14 can provide a network access interface 700, and the administrator can enable or disable the wireless local area network access function of the mobile phone 14 by triggering the wireless access switch 702.
  • the wireless LAN access function of the mobile phone 14 When the wireless LAN access function of the mobile phone 14 is turned on, the mobile phone 14 can search for a nearby wireless local area network, and display the SSID of the searched wireless local area network, etc. in the search result display area 704 in the network access interface 700.
  • the administrator determines that the product model of the access point device 11 is “Alpha” and the last five digits of the SN code are 12345, it may be determined that the SSID “Alpha_12345” corresponds to the initial network created by the mobile phone 14; the initial network may not be set.
  • the password allows the administrator to access the initial network directly via the handset 14.
  • the initial network may be configured with an access password, and the access password may be recorded in a device body, a product package, or a manual of the access point device 11, so that the administrator can learn the access password accordingly. It is used to access the initial network mentioned above, and avoids unrelated personnel accessing the initial network, which helps to improve security.
  • FIG. 8 is a schematic diagram of an Internet configuration guidance interface provided by an exemplary embodiment. As shown in FIG. 8, after the administrator connects the mobile phone 14 to the initial network created by the access point device 11, if it is determined that the WAN port of the access point device 11 has a connection but is not connected to the WAN (if the network connection has not been configured yet) In the parameter, the Internet configuration guiding interface 800 can be displayed on the mobile phone 14 for guiding the administrator to configure the network access parameter for the access point device 11.
  • the enterprise WeChat client 2 running on the access point device 11 can determine the connection status of the WAN port of the access point device 11 and the configuration of the network access parameter, thereby determining that there is a connection at the WAN port. If the network access parameter has not been configured, the corresponding network configuration guidance message is sent to the mobile phone 14 to indicate that the mobile phone 14 displays the Internet configuration guidance interface 800, or the interface data is sent to the mobile phone 14 so that the mobile phone 14 is based on the interface. The data shows a corresponding Internet configuration boot interface 800.
  • the network access parameter may include an “online mode”.
  • the access mode may include broadband dialing, static IP, dynamic IP (such as dynamic IP allocation based on DHCP function), and the like.
  • the network access parameter may further include a broadband account, a broadband password, etc., by configuring these network access parameters, the access point device 11 may be connected to the wide area network.
  • FIG. 9 is a schematic diagram of another Internet configuration guidance interface provided by an exemplary embodiment.
  • the administrator triggers the selection identifier 802 shown in FIG. 8, other types of Internet access modes other than "broadband dialing" may be selected.
  • the display content of the Internet configuration boot interface 800 can be switched to as shown in FIG. 9 , so that the administrator needs to further address the IP address, subnet mask, gateway, and DNS server ( FIG. 9 ).
  • the network access parameters are configured by "0.0.0.0" to indicate the default value).
  • FIG. 10 is a schematic diagram of an APP boot interface provided by an exemplary embodiment.
  • the mobile phone 14 can display the APP guiding interface 1000 so that the administrator can trigger the interface portal 1002.
  • the enterprise WeChat client 1 running on the mobile phone 14 is invoked so that the administrator can implement further configuration of the access point device 11 based on the enterprise WeChat client 1.
  • FIG. 12 is a schematic diagram of an enterprise WeChat login interface provided by an exemplary embodiment.
  • the enterprise WeChat login interface 1200 can be displayed to enable the administrator to log in to his account, or by triggering "new user registration". "Options to register a new user account.
  • the APP client of the enterprise WeChat running on the mobile phone 14 is configured to correspond to the administrator's enterprise WeChat client 1, so that the administrator can implement through the enterprise WeChat client 1. Its own administrative authority.
  • FIG. 14 is a schematic diagram of a team selection interface provided by an exemplary embodiment.
  • the enterprise WeChat client 1 can show a team selection interface 1400 that can display alternative teams related to the administrator, such as "Enterprise AA” and "X Project” shown in FIG. Group", “serious work group”, etc.
  • the alternate team may include a team with administrators having administrative privileges.
  • the administrator can further trigger the "Bind team and complete configuration” option in the team selection interface 1400 to bind the team "X project group” to the access point device. 11.
  • the administrator can create a new team by triggering the "Create Team” option and bind the new community to the access point device 11.
  • the administrator can bind one or more teams to the access point device 11, and this specification does not limit this.
  • the access point device 11 After the access point device 11 is bound to the community "X project group", the access point device 11 can acquire the community ID, community name or other information of the community "X project group” and follow the access point device.
  • the first built-in algorithm in 11 calculates the obtained information; then, the access point device 11 creates a wireless local area network, and sets the SSID and the access password of the wireless local area network according to the calculation result obtained by the first built-in algorithm.
  • the access point device 12 can create a corresponding initial network when the self-test determines that the configuration has not been completed through the process shown in FIG. 6, so that the administrator can access the initial network through the mobile phone 14. This process is similar to the process of the access point device 11, and will not be described here.
  • the access point device 12 can then cause the enterprise WeChat client 1 to be turned on on the handset 14 by the embodiment shown in Figures 10-13. Further, the enterprise WeChat client 1 may show the community selection interface 1400 as shown in FIG. 14 to determine, by the administrator, the community to which the access point device 12 needs to be bound; assuming that the administrator selects the group "X project group", The enterprise WeChat client 1 can send the information of the group "X project group” to the access point device 12, and the enterprise WeChat client 3 operated by the access point device 12 passes the second built-in algorithm to the group "X project group". The information is calculated.
  • the access point device 11 and the access point device 12 both run the client of the enterprise WeChat, it can be ensured that the first built-in algorithm is the same as the second built-in algorithm, then the access point device 11 and the access point When the device 12 calculates the information of the group "X project group" by the same algorithm, the same calculation result can be obtained, so that the access point device 12 can calculate the SSID and the local LAN of the local area network created by the access point device 11. Enter the password.
  • the access point device 12 can log in to the local local area network created by the access point device 11 through the calculated SSID and the access password, and implement data interaction with the access point device 11 through the local local area network, so that the access point device 11 can
  • the access point device 12 is automatically configured without requiring the administrator to repeatedly perform configuration operations.
  • the administrator can access the access point device 13 or other device to the local local area network created by the access point device 11 to perform automatic configuration by the access point device 11 , and details are not described herein again.
  • the access point device 12, the access point device 13 can also implement automated configuration updates based on the access point device 11.
  • the access point device 11 may actively send configuration update data to the access point device 12, the access point device 13, and the like in the maintained local local area network, so that the access point device 12 The access point device 13 and the like implement automatic update by using the configuration update data.
  • the access point device 12 and the access point device 13 can initiate an update request to the access point device 11, for example, the access point device 12 and the access point device 13 can initiate the update periodically. Request to implement a configuration update.
  • the configuration information sent by the access point device 12 and the access point device 13 to the access point device 11 may include a version identifier, such as a version number, a timestamp, and the like, for distinguishing configuration information of different versions.
  • the update request initiated by the access point device 12 and the access point device 13 may include the version identifier of the currently adopted configuration information (such as version D1), and the access point device 11 receives the access point device 12 and receives
  • the version identifier (such as version D2) of the configuration information currently used by the access point device 11 may be obtained.
  • the configuration information adopted by the device is the latest version, so that the configuration is not required to be updated, and when D2 ⁇ D1, the access point device 11 can send the configuration information with the version ID D2 to the access point device 12 and the access point device 13. To implement configuration update of the access point device 12 and the access point device 13.
  • FIG. 15 is a schematic structural diagram of an electronic device according to an exemplary embodiment.
  • the electronic device includes a processor 1502, an internal bus 1504, a network interface 1506, a memory 1508, and a non-volatile memory 1510, and of course may also include hardware required for other services.
  • the processor 1502 reads the corresponding computer program from the non-volatile memory 1510 into the memory 1508 and then operates to form a device configuration device at a logical level.
  • one or more embodiments of the present specification do not exclude other implementation manners, such as a logic device or a combination of software and hardware, etc., that is, the execution body of the following processing flow is not limited to each.
  • a logical unit which can also be a hardware or logic device.
  • the network creation unit 1601 is configured to enable the first physical device in the network to calculate the access information of the network according to the first built-in algorithm, where the first physical device is bound to the community;
  • the information acquiring unit 1602 when the first physical device receives the access request initiated by the second physical device to the network, acquires the to-be-verified access information included in the access request;
  • the device configuration unit 1604 is configured to enable the first physical device to configure the second physical device after the second physical device accesses the network.
  • the device networking is implemented between the first physical device and the second physical device to implement configuration of the second physical device.
  • the device configuration apparatus may include:
  • the information receiving unit 1701 enables the second physical device to receive the information of the community sent by the user equipment;
  • the access requesting unit 1703 when the second physical device detects the network where the first physical device is located, initiates an access request for the network to the first physical device, where the access request includes The access information is verified to be accessed after the verification is successful.
  • the system, device, module or unit illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product having a certain function.
  • a typical implementation device is a computer, and the specific form of the computer may be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email transceiver, and a game control.
  • a computer includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is an example of a computer readable medium.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information storage can be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory.
  • PRAM phase change memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • RAM random access memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本说明书一个或多个实施例提供一种设备配置方法及装置,该方法可以包括:网络中的第一物理设备按照第一内置算法对团体的信息进行计算得到所述网络的接入信息,其中所述第一物理设备被绑定至所述团体;第二物理设备根据用户设备发送的所述团体的信息,按照第二内置算法对所述团体的信息进行计算得到待验证接入信息,并利用所述待验证接入信息向所述第一物理设备发起对所述网络的接入请求;所述第一物理设备在所述待验证接入信息匹配于所述接入信息的情况下,允许所述第二物理设备接入所述网络。

Description

设备配置方法及装置
本申请要求2017年9月27日递交的申请号为201710890916.2、发明名称为“设备配置方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本说明书一个或多个实施例涉及终端技术领域,尤其涉及一种设备配置方法及装置。
背景技术
在相关技术中,团体内往往需要多台物理设备,比如考勤设备、投影设备、路由设备等,需要针对这些物理设备逐个实施配置,操作过程十分耗时费力,而且容易出错而导致配置失败或重复操作。
发明内容
有鉴于此,本说明书一个或多个实施例提供一种设备配置方法及装置。
为实现上述目的,本说明书一个或多个实施例提供技术方案如下:
根据本说明书一个或多个实施例的第一方面,提出了一种设备配置方法,包括:
网络中的第一物理设备按照第一内置算法对团体的信息进行计算得到所述网络的接入信息,其中所述第一物理设备被绑定至所述团体;
第二物理设备根据用户设备发送的所述团体的信息,按照第二内置算法对所述团体的信息进行计算得到待验证接入信息,并利用所述待验证接入信息向所述第一物理设备发起对所述网络的接入请求;
所述第一物理设备在所述待验证接入信息匹配于所述接入信息的情况下,允许所述第二物理设备接入所述网络。
根据本说明书一个或多个实施例的第二方面,提出了一种设备配置方法,包括:
网络中的第一物理设备按照第一内置算法对团体的信息进行计算得到所述网络的接入信息,其中所述第一物理设备被绑定至所述团体;
所述第一物理设备在收到第二物理设备对所述网络发起的接入请求时,获取所述接入请求包含的待验证接入信息;
所述第一物理设备在所述待验证接入信息匹配于所述接入信息的情况下,允许所述 第二物理设备接入所述网络。
根据本说明书一个或多个实施例的第三方面,提出了一种设备配置方法,包括:
第二物理设备接收用户设备发送的团体的信息;
所述第二物理设备按照第二内置算法对所述团体的信息进行计算得到待验证接入信息;
所述第二物理设备在检测到第一物理设备所处的网络时,向所述第一物理设备发起针对所述网络的接入请求,所述接入请求包含所述待验证接入信息,以在验证成功后接入所述网络。
根据本说明书一个或多个实施例的第四方面,提出了一种设备配置方法,包括:
用户设备将第一物理设备绑定至团体,以使所述第一物理设备加入网络后,按照第一内置算法对所述团体的信息进行计算得到所述网络的接入信息;
所述用户设备将所述团体的信息发送至第二物理设备,以由所述第二物理设备按照第二内置算法对所述团体的信息进行计算得到待验证接入信息、并基于所述待验证接入信息向所述第一物理设备发起针对所述网络的接入请求;其中,所述第一物理设备在所述待验证接入信息匹配于所述接入信息的情况下,允许所述第二物理设备接入所述网络。
根据本说明书一个或多个实施例的第五方面,提出了一种设备配置方法,包括:
网络中的第一物理设备根据与所述第一物理设备绑定的团体的信息确定所述网络的接入信息;
第二物理设备根据用户设备发送的所述团体的信息确定针对所述网络的待验证接入信息,并利用所述待验证接入信息向所述第一物理设备发起对所述网络的接入请求;
所述第一物理设备在所述待验证接入信息匹配于所述接入信息的情况下,允许所述第二物理设备接入所述网络。
根据本说明书一个或多个实施例的第六方面,提出了一种设备配置装置,包括:
网络创建单元,使网络中的第一物理设备按照第一内置算法对团体的信息进行计算得到所述网络的接入信息,其中所述第一物理设备被绑定至所述团体;
信息获取单元,使所述第一物理设备在收到第二物理设备对所述网络发起的接入请求时,获取所述接入请求包含的待验证接入信息;
接入验证单元,使所述第一物理设备在所述待验证接入信息匹配于所述接入信息的情况下,允许所述第二物理设备接入所述网络。
根据本说明书一个或多个实施例的第七方面,提出了一种设备配置装置,包括:
信息接收单元,使第二物理设备接收用户设备发送的团体的信息;
信息计算单元,使所述第二物理设备按照第二内置算法对所述团体的信息进行计算得到待验证接入信息;
接入请求单元,使所述第二物理设备在检测到第一物理设备所处的网络时,向所述第一物理设备发起针对所述网络的接入请求,所述接入请求包含所述待验证接入信息,以在验证成功后接入所述网络。
根据本说明书一个或多个实施例的第八方面,提出了一种设备配置装置,包括:
团体绑定单元,使用户设备将第一物理设备绑定至团体,以使所述第一物理设备加入网络后,按照第一内置算法对所述团体的信息进行计算得到所述网络的接入信息;
信息发送单元,使所述用户设备将所述团体的信息发送至第二物理设备,以由所述第二物理设备按照第二内置算法对所述团体的信息进行计算得到待验证接入信息、并基于所述待验证接入信息向所述第一物理设备发起针对所述网络的接入请求;其中,所述第一物理设备在所述待验证接入信息匹配于所述接入信息的情况下,允许所述第二物理设备接入所述网络。
附图说明
图1是一示例性实施例提供的一种对物理设备进行配置的示意图。
图2A是一示例性实施例提供的一种设备配置方法的流程图。
图2B是一示例性实施例提供的另一种设备配置方法的流程图。
图3是一示例性实施例提供的另一种设备配置方法的流程图。
图4是一示例性实施例提供的又一种设备配置方法的流程图。
图5是一示例性实施例提供的又一种设备配置方法的流程图。
图6是一示例性实施例提供的一种接入点设备的运行逻辑的示意图。
图7是一示例性实施例提供的一种网络接入界面的示意图。
图8是一示例性实施例提供的一种上网配置引导界面的示意图。
图9是一示例性实施例提供的另一种上网配置引导界面的示意图。
图10是一示例性实施例提供的一种APP引导界面的示意图。
图11是一示例性实施例提供的一种APP下载引导界面的示意图。
图12是一示例性实施例提供的一种企业微信登录界面的示意图。
图13是一示例性实施例提供的一种企业微信更新界面的示意图。
图14是一示例性实施例提供的一种团队选择界面的示意图。
图15是一示例性实施例提供的一种电子设备的结构示意图。
图16是一示例性实施例提供的一种设备配置装置的框图。
图17是一示例性实施例提供的另一种设备配置装置的框图。
图18是一示例性实施例提供的又一种设备配置装置的框图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本说明书一个或多个实施例相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本说明书一个或多个实施例的一些方面相一致的装置和方法的例子。
需要说明的是:在其他实施例中并不一定按照本说明书示出和描述的顺序来执行相应方法的步骤。在一些其他实施例中,其方法所包括的步骤可以比本说明书所描述的更多或更少。此外,本说明书中所描述的单个步骤,在其他实施例中可能被分解为多个步骤进行描述;而本说明书中所描述的多个步骤,在其他实施例中也可能被合并为单个步骤进行描述。
图1是一示例性实施例提供的一种对物理设备进行配置的示意图。假定需要对若干台物理设备进行配置,例如该若干台物理设备包括图1所示的接入点设备11、接入点设备12与接入点设备13等进行组网,形成本地局域网,同时将该本地局域网与外部的网络15建立连接,以确保该本地局域网内的电子设备能够对该网络15实现访问。其中,该网络15可以包括多种类型的有线或无线网络;在一实施例中,该网络15可以包括公共交换电话网络(Public Switched Telephone Network,PSTN)和因特网。
上述的若干台物理设备可以包括任意的电子设备,比如考勤机、打印机、投影仪、门禁以及上述的接入点设备等,本说明书并不对此进行限制。以接入点设备11-13为例,该接入点设备11-13可以包括任意具有路由功能的网络设备;在一实施例中,接入点设备11-13可以为传统意义上的AP或路由器,以实现有线网络场景下组网;在另一实施例中,接入点设备11-13可以为无线路由器,即兼备AP功能和路由功能的路由器,既可以实现有线网络场景下的组网,也可以实现无线网络下的组网。本说明书并不限制接 入点设备11-13的具体类型。
在操作过程中,用户可以通过手机14等用户设备对上述的若干台物理设备进行配置。以接入点设备11-13为例,可以首先将接入点设备11绑定至团体,并将接入点设备11连接至网络15、作为团体内的本地局域网与上述的网络15之间的网关设备,然后使得接入点设备12-13接入该本地局域网,从而由接入点设备11对接入点设备12-13实施自动配置,将该接入点设备12-13配置为该本地局域网内的路由设备或AP设备,而无需用户实施手动配置。对于后续需要配置的其他接入点设备,可以通过接入点11完成自动配置,也可以通过接入点设备12-13等其他设备完成自动配置,本说明书并不对此进行限制。
其中,除了手机14之外,用户设备还可以包括平板设备、笔记本电脑、掌上电脑(PDAs,Personal Digital Assistants)、可穿戴设备(如智能眼镜、智能手表等)等多种类型的电子设备,本说明书一个或多个实施例并不对此进行限制。在运行过程中,该手机14可以运行某一应用的客户端侧的程序,例如该手机14可以运行移动化团体办公平台的程序,以实现对上述的若干台物理设备的配置功能。
在本实施例中,移动化团体办公平台不仅可以实现通讯功能,还可以作为诸多其他功能的集成化功能平台,比如对于审批事件(如请假、办公物品申领、财务等审批事件)、考勤事件、任务事件、日志事件等团体内部事件的处理,再比如订餐、采购等团体外部事件的处理,本说明书一个或多个实施例并不对此进行限制。
较为具体地,移动化团体办公平台可以承载于相关技术中的即时通讯应用,比如企业即时通讯(Enterprise Instant Messaging,EIM)应用,例如Skype For
Figure PCTCN2018105907-appb-000001
Figure PCTCN2018105907-appb-000002
Figure PCTCN2018105907-appb-000003
等。当然,即时通讯功能仅为移动化团体办公平台支持的通讯功能之一,该移动化团体办公平台还能够实现更多诸如上述的其他功能,此处不再赘述。
需要指出的是:移动化团体办公平台的客户端的应用程序可以被预先安装在手机14上,使得该客户端可以在该手机14上被启动并运行;当然,当采用诸如HTML5技术的在线“客户端”时,无需在手机14上安装相应的应用程序,即可获得并运行该客户端。
可见,通过手机14上运行的移动化团体办公平台的客户端,用户可以十分便捷地完成对上述的若干台物理设备的配置操作,而无需采用专门的设备或工具,也不需要用户掌握深奥、复杂的网络专业知识,极大地简化了对上述的若干台物理设备的配置过程。
图2A是一示例性实施例提供的一种设备配置方法的流程图。如图2A所示,该方法 可以包括以下步骤:
步骤202A,网络中的第一物理设备按照第一内置算法对团体的信息进行计算得到所述网络的接入信息,其中所述第一物理设备被绑定至所述团体。
在一实施例中,团体的信息可以包括:所述团体的名称、所述团体的标识号码等,本说明书并不对此进行限制。
在一实施例中,第一物理设备所处的网络可以包括有线网络或无线网络。比如该无线网络可以包括采用WIFI协议的网络等,本说明书并不对此进行限制。
在一实施例中,上述的网络可以由第一物理设备创建。在另一实施例中,上述的网络可由其他设备创建,而第一物理设备接入该网络后,可以根据团体的信息确定出该网络的接入信息,以对第二物理设备提供的待验证接入信息进行验证后,协助第二物理设备接入该网络。
在一实施例中,接入信息可以包括针对网络的认证信息;在另一实施例中,接入信息可以包括针对网络的鉴权信息;在其他实施例中,接入信息可以包括其他类型的信息,本说明书并不对此进行限制。
在一实施例中,当第一物理设备所处的网络采用“SSID(Service Set Identifier,服务集标识)+密码”的接入形式时,接入信息可以包括网络的SSID和密码;在其他实施例中,第一物理设备所处的网络还可以采用其他形式,本说明书并不对此进行限制。
在一实施例中,第一内置算法可以为第一物理设备在出厂时配置的默认算法,或者可以在出厂后根据实际需求进行更新或更换。例如,该第一内置算法可以包括数字摘要算法,用于计算团体的信息对应的数字摘要,本说明书并不对此进行限制。
步骤204A,第二物理设备根据用户设备发送的所述团体的信息,按照第二内置算法对所述团体的信息进行计算得到待验证接入信息,并利用所述待验证接入信息向所述第一物理设备发起对所述网络的接入请求。
在一实施例中,第二内置算法可以为第二物理设备在出厂时配置的默认算法,或者可以在出厂后根据实际需求进行更新或更换。例如,该第一内置算法可以包括数字摘要算法,用于计算团体的信息对应的数字摘要,本说明书并不对此进行限制。
在一实施例中,第一内置算法、第二内置算法可以包括任意算法,只需要第一物理设备中的第一内置算法与第二物理设备中的第二内置算法一致,并且第一物理设备与第二物理设备获取的团体的信息一致,即可确保第二物理设备计算出的待验证接入信息与第一物理设备计算的接入信息相匹配,从而使得第二物理设备能够接入第一物理设备所 处的网络,以及进一步由第一物理设备对第二物理设备实施自动配置。
在一实施例中,当第一物理设备与第二物理设备均运行有同一移动化团体办公平台的客户端时,可以确保该第一物理设备中的第一内置算法与第二物理设备中的第二内置算法相同,从而当用户设备将第一物理设备被绑定的团体的信息告知第二物理设备时,即可确保第二物理设备计算出的待验证接入信息与第一物理设备计算的接入信息相匹配。
步骤206A,所述第一物理设备在所述待验证接入信息匹配于所述接入信息的情况下,允许所述第二物理设备接入所述网络。
在一实施例中,所述第一物理设备在所述第二物理设备接入所述网络后,对所述第二物理设备进行配置。
在一实施例中,第一物理设备可以对第二物理设备实施任意类型的配置操作,例如第一物理设备可以将第二物理设备绑定至所述团体,或者第一物理设备可以与第二物理设备之间实现设备组网等,本说明书并不对此进行限制。
在一实施例中,通过由用户设备将团体的信息告知第二物理设备,并由第二物理设备通过第二内置算法计算相应的待验证接入信息,使得第一物理设备可以为所处的网络添加接入验证功能,该网络的安全性,避免非法设备接入该网络,有助于提升第一物理设备及其网络的安全性、降低风险。
图2B是一示例性实施例提供的另一种设备配置方法的流程图。如图2B所示,该方法可以包括以下步骤:
步骤202B,网络中的第一物理设备根据与所述第一物理设备绑定的团体的信息确定所述网络的接入信息;
在一实施例中,团体的信息可以包括:所述团体的名称、所述团体的标识号码等,本说明书并不对此进行限制。
在一实施例中,第一物理设备所处的网络可以包括有线网络或无线网络。比如该无线网络可以包括采用WIFI协议的网络等,本说明书并不对此进行限制。
在一实施例中,上述的网络可以由第一物理设备创建。在另一实施例中,上述的网络可由其他设备创建,而第一物理设备接入该网络后,可以根据团体的信息确定出该网络的接入信息,以对第二物理设备提供的待验证接入信息进行验证后,协助第二物理设备接入该网络。
在一实施例中,接入信息可以包括针对网络的认证信息;在另一实施例中,接入信 息可以包括针对网络的鉴权信息;在其他实施例中,接入信息可以包括其他类型的信息,本说明书并不对此进行限制。
在一实施例中,当第一物理设备所处的网络采用“SSID(Service Set Identifier,服务集标识)+密码”的接入形式时,接入信息可以包括网络的SSID和密码;在其他实施例中,第一物理设备所处的网络还可以采用其他形式,本说明书并不对此进行限制。
在一实施例中,第一物理设备可以预设有针对团体的信息的处理方案,以通过该处理方案对该团体的信息进行处理得到上述网络的接入信息。例如,该处理方案可以包括第一内置算法,该第一内置算法可以为第一物理设备在出厂时配置的默认算法,或者可以在出厂后根据实际需求进行更新或更换,本说明书并不对此进行限制。举例而言,该第一内置算法可以包括数字摘要算法,用于计算团体的信息对应的数字摘要,本说明书并不对此进行限制。
步骤204B,第二物理设备根据用户设备发送的所述团体的信息确定针对所述网络的待验证接入信息,并利用所述待验证接入信息向所述第一物理设备发起对所述网络的接入请求;
在一实施例中,第二物理设备可以预设有针对团体的信息的处理方案,以通过该处理方案对该团体的信息进行处理得到上述的待验证接入信息。例如,该处理方案可以包括第二内置算法,该第二内置算法可以为第二物理设备在出厂时配置的默认算法,或者可以在出厂后根据实际需求进行更新或更换。例如,该第二内置算法可以包括数字摘要算法,用于计算团体的信息对应的数字摘要,本说明书并不对此进行限制。
其中,第一物理设备、第二物理设备预设的处理方案可以包括任意类型,只需要第一物理设备与第二物理设备中的处理方案一致,并且第一物理设备与第二物理设备获取的团体的信息一致,即可确保第二物理设备确定出的待验证接入信息与第一物理设备确定的接入信息相匹配,从而使得第二物理设备能够接入第一物理设备所处的网络,以及进一步由第一物理设备对第二物理设备实施自动配置。
在一实施例中,当第一物理设备与第二物理设备均运行有同一移动化团体办公平台的客户端时,可以确保该第一物理设备与第二物理设备中预设的处理方案相同,从而当用户设备将第一物理设备被绑定的团体的信息告知第二物理设备时,即可确保第二物理设备确定出的待验证接入信息与第一物理设备确定出的接入信息相匹配。
步骤206B,所述第一物理设备在所述待验证接入信息匹配于所述接入信息的情况下,允许所述第二物理设备接入所述网络。
在一实施例中,所述第一物理设备在所述第二物理设备接入所述网络后,对所述第二物理设备进行配置。
在一实施例中,第一物理设备可以对第二物理设备实施任意类型的配置操作,例如第一物理设备可以将第二物理设备绑定至所述团体,或者第一物理设备可以与第二物理设备之间实现设备组网等,本说明书并不对此进行限制。
在一实施例中,通过由用户设备将团体的信息告知第二物理设备,并由第二物理设备确定出相应的待验证接入信息,使得第一物理设备可以为所处的网络添加接入验证功能,该网络的安全性,避免非法设备接入该网络,有助于提升第一物理设备及其网络的安全性、降低风险。
图3是一示例性实施例提供的另一种设备配置方法的流程图。如图3所示,该方法可以包括以下步骤:
步骤302,网络中的第一物理设备按照第一内置算法对团体的信息进行计算得到所述网络的接入信息,其中所述第一物理设备被绑定至所述团体。
在一实施例中,团体的信息可以包括:所述团体的名称、所述团体的标识号码等,本说明书并不对此进行限制。
在一实施例中,第一物理设备所处的网络可以包括有线网络或无线网络。比如该无线网络可以包括采用WIFI协议的网络等,本说明书并不对此进行限制。
在一实施例中,上述的网络可以由第一物理设备创建。在另一实施例中,上述的网络可由其他设备创建,而第一物理设备接入该网络后,可以根据团体的信息确定出该网络的接入信息,以对第二物理设备提供的待验证接入信息进行验证后,协助第二物理设备接入该网络。
在一实施例中,接入信息可以包括针对网络的认证信息;在另一实施例中,接入信息可以包括针对网络的鉴权信息;在其他实施例中,接入信息可以包括其他类型的信息,本说明书并不对此进行限制。
在一实施例中,当第一物理设备所处的网络采用“SSID+密码”的接入形式时,接入信息可以包括网络的SSID和密码;在其他实施例中,第一物理设备所处的网络还可以采用其他形式,本说明书并不对此进行限制。
在一实施例中,第一内置算法可以为第一物理设备在出厂时配置的默认算法,或者可以在出厂后根据实际需求进行更新或更换。例如,该第一内置算法可以包括数字摘要算法,用于计算团体的信息对应的数字摘要,本说明书并不对此进行限制。
步骤304,所述第一物理设备在收到第二物理设备对所述网络发起的接入请求时,获取所述接入请求包含的待验证接入信息。
在一实施例中,第二内置算法可以为第二物理设备在出厂时配置的默认算法,或者可以在出厂后根据实际需求进行更新或更换。例如,该第一内置算法可以包括数字摘要算法,用于计算团体的信息对应的数字摘要,本说明书并不对此进行限制。
在一实施例中,第一内置算法、第二内置算法可以包括任意算法,只需要第一物理设备中的第一内置算法与第二物理设备中的第二内置算法一致,并且第一物理设备与第二物理设备获取的团体的信息一致,即可确保第二物理设备计算出的待验证接入信息与第一物理设备计算的接入信息相匹配,从而使得第二物理设备能够接入第一物理设备所处的网络,以及进一步由第一物理设备对第二物理设备实施自动配置。
在一实施例中,当第一物理设备与第二物理设备均运行有同一移动化团体办公平台的客户端时,可以确保该第一物理设备中的第一内置算法与第二物理设备中的第二内置算法相同,从而当用户设备将第一物理设备被绑定的团体的信息告知第二物理设备时,即可确保第二物理设备计算出的待验证接入信息与第一物理设备计算的接入信息相匹配。
步骤306,所述第一物理设备在所述待验证接入信息匹配于所述接入信息的情况下,允许所述第二物理设备接入所述网络。
在一实施例中,所述第一物理设备在所述第二物理设备接入所述网络后,对所述第二物理设备进行配置。
在一实施例中,第一物理设备可以对第二物理设备实施任意类型的配置操作,例如第一物理设备可以将第二物理设备绑定至所述团体,或者第一物理设备可以与第二物理设备之间实现设备组网等,本说明书并不对此进行限制。
在一实施例中,通过由用户设备将团体的信息告知第二物理设备,并由第二物理设备通过第二内置算法计算相应的待验证接入信息,使得第一物理设备可以为所处的网络添加接入验证功能,该网络的安全性,避免非法设备接入该网络,有助于提升第一物理设备及其网络的安全性、降低风险。
图4是一示例性实施例提供的又一种设备配置方法的流程图。如图4所示,该方法可以包括以下步骤:
步骤402,第二物理设备接收用户设备发送的团体的信息。
在一实施例中,团体的信息可以包括:所述团体的名称、所述团体的标识号码等, 本说明书并不对此进行限制。
步骤404,所述第二物理设备按照第二内置算法对所述团体的信息进行计算得到待验证接入信息。
在一实施例中,第二内置算法可以为第二物理设备在出厂时配置的默认算法,或者可以在出厂后根据实际需求进行更新或更换。例如,该第一内置算法可以包括数字摘要算法,用于计算团体的信息对应的数字摘要,本说明书并不对此进行限制。
步骤406,所述第二物理设备在检测到第一物理设备所处的网络时,向所述第一物理设备发起针对所述网络的接入请求,所述接入请求包含所述待验证接入信息,以在验证成功后接入所述网络。
在一实施例中,第一物理设备所处的网络可以包括有线网络或无线网络。比如该无线网络可以包括采用WIFI协议的网络等,本说明书并不对此进行限制。
在一实施例中,上述的网络可以由第一物理设备创建。在另一实施例中,上述的网络可由其他设备创建,而第一物理设备接入该网络后,可以根据团体的信息确定出该网络的接入信息,以对第二物理设备提供的待验证接入信息进行验证后,协助第二物理设备接入该网络。
在一实施例中,接入信息可以包括针对网络的认证信息;在另一实施例中,接入信息可以包括针对网络的鉴权信息;在其他实施例中,接入信息可以包括其他类型的信息,本说明书并不对此进行限制。
在一实施例中,当第一物理设备所处的网络采用“SSID(Service Set Identifier,服务集标识)+密码”的接入形式时,接入信息可以包括网络的SSID和密码;在其他实施例中,第一物理设备所处的网络还可以采用其他形式,本说明书并不对此进行限制。
在一实施例中,第一内置算法可以为第一物理设备在出厂时配置的默认算法,或者可以在出厂后根据实际需求进行更新或更换。例如,该第一内置算法可以包括数字摘要算法,用于计算团体的信息对应的数字摘要,本说明书并不对此进行限制。
在一实施例中,第一内置算法、第二内置算法可以包括任意算法,只需要第一物理设备中的第一内置算法与第二物理设备中的第二内置算法一致,并且第一物理设备与第二物理设备获取的团体的信息一致,即可确保第二物理设备计算出的待验证接入信息与第一物理设备计算的接入信息相匹配,从而使得第二物理设备能够接入第一物理设备所处的网络,以及进一步由第一物理设备对第二物理设备实施自动配置。
在一实施例中,当第一物理设备与第二物理设备均运行有同一移动化团体办公平台 的客户端时,可以确保该第一物理设备中的第一内置算法与第二物理设备中的第二内置算法相同,从而当用户设备将第一物理设备被绑定的团体的信息告知第二物理设备时,即可确保第二物理设备计算出的待验证接入信息与第一物理设备计算的接入信息相匹配。
在一实施例中,所述第一物理设备在所述第二物理设备接入所述网络后,对所述第二物理设备进行配置。
在一实施例中,第一物理设备可以对第二物理设备实施任意类型的配置操作,例如第一物理设备可以将第二物理设备绑定至所述团体,或者第一物理设备可以与第二物理设备之间实现设备组网等,本说明书并不对此进行限制。
在一实施例中,通过由用户设备将团体的信息告知第二物理设备,并由第二物理设备通过第二内置算法计算相应的待验证接入信息,使得第一物理设备可以为所处的网络添加接入验证功能,该网络的安全性,避免非法设备接入该网络,有助于提升第一物理设备及其网络的安全性、降低风险。
图5是一示例性实施例提供的又一种设备配置方法的流程图。如图5所示,该方法可以包括以下步骤:
步骤502,用户设备将第一物理设备绑定至团体,以使所述第一物理设备加入网络后,按照第一内置算法对所述团体的信息进行计算得到所述网络的接入信息。
在一实施例中,团体的信息可以包括:所述团体的名称、所述团体的标识号码等,本说明书并不对此进行限制。
在一实施例中,第一物理设备所处的网络可以包括有线网络或无线网络。比如该无线网络可以包括采用WIFI协议的网络等,本说明书并不对此进行限制。
在一实施例中,上述的网络可以由第一物理设备创建。在另一实施例中,上述的网络可由其他设备创建,而第一物理设备接入该网络后,可以根据团体的信息确定出该网络的接入信息,以对第二物理设备提供的待验证接入信息进行验证后,协助第二物理设备接入该网络。
在一实施例中,接入信息可以包括针对网络的认证信息;在另一实施例中,接入信息可以包括针对网络的鉴权信息;在其他实施例中,接入信息可以包括其他类型的信息,本说明书并不对此进行限制。
在一实施例中,当第一物理设备所处的网络采用“SSID(Service Set Identifier,服务集标识)+密码”的接入形式时,接入信息可以包括网络的SSID和密码;在其他实 施例中,第一物理设备所处的网络还可以采用其他形式,本说明书并不对此进行限制。
在一实施例中,第一内置算法可以为第一物理设备在出厂时配置的默认算法,或者可以在出厂后根据实际需求进行更新或更换。例如,该第一内置算法可以包括数字摘要算法,用于计算团体的信息对应的数字摘要,本说明书并不对此进行限制。
步骤504,所述用户设备将所述团体的信息发送至第二物理设备,以由所述第二物理设备按照第二内置算法对所述团体的信息进行计算得到待验证接入信息、并基于所述待验证接入信息向所述第一物理设备发起针对所述网络的接入请求;其中,所述第一物理设备在所述待验证接入信息匹配于所述接入信息的情况下,允许所述第二物理设备接入所述网络。
在一实施例中,当第一物理设备、第二物理设备、用户设备均运行有同一移动化团体办公平台的客户端时,使得这些设备之间可以基于该客户端实现数据交互,从而使得用户设备可以将第一物理设备绑定至团体,以及用户设备可以将团体的信息发送至第二物理设备,使得第二物理设备接入第一物理设备创建的网络,从而由第一物理设备对该第二物理设备实施自动配置。
在一实施例中,第二内置算法可以为第二物理设备在出厂时配置的默认算法,或者可以在出厂后根据实际需求进行更新或更换。例如,该第一内置算法可以包括数字摘要算法,用于计算团体的信息对应的数字摘要,本说明书并不对此进行限制。
在一实施例中,第一内置算法、第二内置算法可以包括任意算法,只需要第一物理设备中的第一内置算法与第二物理设备中的第二内置算法一致,并且第一物理设备与第二物理设备获取的团体的信息一致,即可确保第二物理设备计算出的待验证接入信息与第一物理设备计算的接入信息相匹配,从而使得第二物理设备能够接入第一物理设备所处的网络,以及进一步由第一物理设备对第二物理设备实施自动配置。
在一实施例中,当第一物理设备与第二物理设备均运行有同一移动化团体办公平台的客户端时,可以确保该第一物理设备中的第一内置算法与第二物理设备中的第二内置算法相同,从而当用户设备将第一物理设备被绑定的团体的信息告知第二物理设备时,即可确保第二物理设备计算出的待验证接入信息与第一物理设备计算的接入信息相匹配。
在一实施例中,所述第一物理设备在所述第二物理设备接入所述网络后,对所述第二物理设备进行配置。
在一实施例中,第一物理设备可以对第二物理设备实施任意类型的配置操作,例如 第一物理设备可以将第二物理设备绑定至所述团体,或者第一物理设备可以与第二物理设备之间实现设备组网等,本说明书并不对此进行限制。
在一实施例中,通过由用户设备将团体的信息告知第二物理设备,并由第二物理设备通过第二内置算法计算相应的待验证接入信息,使得第一物理设备可以为所处的网络添加接入验证功能,该网络的安全性,避免非法设备接入该网络,有助于提升第一物理设备及其网络的安全性、降低风险。
为了便于理解,下面以企业内部的多个接入点的组网过程为例,对本说明书的技术方案进行详细说明;例如,假定企业内的管理员通过手机14依次对接入点设备11、接入点设备12进行配置。其中,手机14、接入点设备11、接入点设备12上分别运行有企业微信的客户端,比如手机14上运行有企业微信客户端1、接入点设备11上运行有企业微信客户端2、接入点设备12上运行有企业微信客户端3,使得这些电子设备分别通过运行相应的企业微信客户端,实现本说明书的技术方案。
图6是一示例性实施例提供的一种接入点设备的运行逻辑的示意图。如图6所示,以接入点设备11为例,基于企业微信客户端2的运行逻辑包括以下步骤:
步骤602,接入点设备11上电后,自检是否已完成配置。
步骤604A,当自检结果为已配置时,接入点设备11将按照已有配置方案运行。
在一实施例中,接入点设备11可以被配置为维护一本地局域网,且该接入点设备11还接入广域网,从而使得该接入点设备11的配置方案包括作为该本地局域网与广域网之间的网关设备。
在一实施例中,接入点设备11可以被配置为其他网关设备维护的本地局域网内的路由设备或AP设备,以协助用户设备实现对广域网的网络访问。
步骤604B,当自检结果为尚未配置时,接入点设备11将按照默认规则创建初始网络,以供管理员通过手机14实现对该接入点设备11的配置操作。
在一实施例中,初始网络的SSID可以采用“产品型号+SN编码后五位”的形式,以便于管理员区分该初始网络与其他网络。例如,假定接入点设备11的产品型号为“Alpha”、SN编码后五位为12345,那么初始网络的SSID可以为“Alpha_12345”。
图7是一示例性实施例提供的一种网络接入界面的示意图。如图7所示,手机14可以提供一网络接入界面700,管理员可以通过触发无线接入开关702来开启或关闭手机14的无线局域网接入功能。当手机14的无线局域网接入功能被开启时,手机14可以对附近的无线局域网进行搜索,并在网路接入界面700中的搜索结果展示区域704中 示出搜索到的无线局域网的SSID等信息,以供管理员查看并选择希望接入的无线局域网。
例如,当管理员确定接入点设备11的产品型号为“Alpha”、SN编码的后五位为12345时,可以确定SSID“Alpha_12345”对应于手机14创建的初始网络;该初始网络可以不设密码,使得管理员可以直接通过手机14接入该初始网络。在一实施例中,初始网络可以设置有接入密码,该接入密码可以记录在接入点设备11的设备本体、产品包装盒或说明书等位置,使得管理员可以据此获知该接入密码并用于接入上述的初始网络,而避免无关人员接入该初始网络,有助于提升安全性。
图8是一示例性实施例提供的一种上网配置引导界面的示意图。如图8所示,在管理员将手机14接入接入点设备11创建的初始网络后,如果确定接入点设备11的WAN口存在连接、但尚未连接至广域网(如尚未配置其网络接入参数),则可以在手机14上示出上网配置引导界面800,以用于引导管理员为该接入点设备11配置网络接入参数。
在一实施例中,接入点设备11上运行的企业微信客户端2可以确定该接入点设备11的WAN口的连接情况以及网络接入参数的配置情况,从而在确定WAN口存在连接、网络接入参数尚未配置的情况下,通过向手机14发送相应的网络配置引导消息、以指示手机14示出上网配置引导界面800,或者通过向手机14发送界面数据、以使手机14根据该界面数据示出相应的上网配置引导界面800。
在一实施例中,网络接入参数可以包括“上网方式”,比如该上网方式可以包括宽带拨号、静态IP、动态IP(如基于DHCP功能实现的动态IP分配)等。例如,当上网方式为“宽带拨号”时,网络接入参数还可以包括宽带账号、宽带密码等,通过配置这些网络接入参数,可使接入点设备11接入广域网。
图9是一示例性实施例提供的另一种上网配置引导界面的示意图。当管理员触发图8所示的选择标识802后,可以选取“宽带拨号”之外的其他类型的上网方式。例如,当管理员选取“静态IP”时,上网配置引导界面800的展示内容可以切换至如图9所示,使得管理员需要进一步对IP地址、子网掩码、网关、DNS服务器(图9中通过“0.0.0.0”表示缺省值)等网络接入参数进行配置。
图10是一示例性实施例提供的一种APP引导界面的示意图。如图10所示,在管理员通过手机14完成了对接入点设备11的网络接入参数的配置后,手机14可以示出APP引导界面1000,以使得管理员可以通过触发界面入口1002,唤起手机14上运行的企业 微信客户端1,以便于管理员基于该企业微信客户端1实现对接入点设备11的进一步配置。
图11是一示例性实施例提供的一种APP下载引导界面的示意图。如图11所示,当手机14检测到尚未安装企业微信的APP客户端时,可以通过示出APP下载引导界面1100,以使管理员通过触发下载选项1102,下载并安装企业微信的APP客户端。其中,当检测到下载选项1102被触发时,手机14可以链接至企业微信服务端、应用商店或其他途径,以实现对企业微信的APP客户端的下载操作。
图12是一示例性实施例提供的一种企业微信登录界面的示意图。如图12所示,当手机14唤起企业微信的APP客户端、但管理员尚未登录账号时,可以示出企业微信登录界面1200,以使得管理员登录自身的账号,或者通过触发“新用户注册”选项注册新的用户账号。当管理员完成账号登录后,可使手机14上运行的企业微信的APP客户端被配置为对应于该管理员的企业微信客户端1,以使得该管理员可以通过该企业微信客户端1实施自身的管理权限。
图13是一示例性实施例提供的一种企业微信更新界面的示意图。如图13所示,手机14可以检测企业微信的APP客户端的版本信息,当版本过低导致其无法支持对接入点设备11的配置功能时,可以通过示出企业微信更新界面1300,以引导管理员通过触发更新选项1302对企业微信的APP客户端实施版本更新。
图14是一示例性实施例提供的一种团队选择界面的示意图。如图14所示,企业微信客户端1可以示出团队选择界面1400,该团队选择界面1400可以展示出与管理员相关的备选团队,比如图14所示的“企业AA”、“X项目组”、“认真工作小组”等。在一实施例中,备选团队可以包括管理员具有管理权限的团队。
假定管理员选取了团队“X项目组”,该管理员可以进一步触发团队选择界面1400中的“绑定团队并完成配置”选项,以将该团队“X项目组”绑定至接入点设备11。或者,管理员可以通过触发“创建团队”选项来创建新的团队,并将新的团体绑定至接入点设备11。其中,管理员可以为接入点设备11绑定一个或多个团队,本说明书并不对此进行限制。
当管理员将团队“X项目组”与接入点设备11进行绑定后,接入点设备11可以据此实现相应的权限控制等功能。例如,接入点设备11在接收到网络访问请求时,可以通过获取相应的请求方采用的企业微信账号,确定该请求方是否属于绑定至该接入点设备11的团队“X项目组”,如果属于该团队“X项目组”则允许请求方完成网络访问, 如果不属于该团队“X项目组”则拒绝请求方实施网络访问等。接入点设备11还可以基于与团队之间的绑定关系,完成更多功能,此处不再一一赘述。
当接入点设备11被绑定至团体“X项目组”后,该接入点设备11可以获取该团体“X项目组”的团体ID、团体名称或其他信息,并按照该接入点设备11中的第一内置算法对获取的上述信息进行计算;然后,接入点设备11创建无线局域网,并根据上述第一内置算法得到的计算结果,设置该无线局域网的SSID和接入密码。
进一步地,管理员可以通过手机14将接入点设备12与接入点设备11进行组网,使得接入点设备12被配置为接入点设备11维护的本地局域网内的AP设备。下面对管理员通过手机14配置接入点设备12的过程进行描述。
首先,接入点设备12通过如图6所示的流程,在自检确定尚未完成配置时,可以创建相应的初始网络,使得管理员可以通过手机14接入该初始网络。该过程与接入点设备11的处理过程类似,此处不再赘述。
然后,接入点设备12可以通过如图10-13所示的实施例,使得企业微信客户端1在手机14上开启。进一步地,企业微信客户端1可以示出如图14所示的团体选择界面1400,以由管理员确定接入点设备12需要绑定的团体;假定管理员选择了团体“X项目组”,企业微信客户端1可以将该团体“X项目组”的信息发送至接入点设备12,由接入点设备12运行的企业微信客户端3通过第二内置算法对该团体“X项目组”的信息进行计算。
其中,当接入点设备11和接入点设备12均运行有企业微信的客户端时,可以确保上述的第一内置算法与第二内置算法相同,那么当接入点设备11和接入点设备12通过相同的算法对团体“X项目组”的信息进行计算时,必然能够得到相同的计算结果,使得该接入点设备12能够计算出接入点设备11创建的本地局域网的SSID和接入密码。
因此,接入点设备12可以通过计算得到的SSID和接入密码登入接入点设备11创建的本地局域网,并通过该本地局域网与接入点设备11实现数据交互,使得接入点设备11可以对该接入点设备12实施自动配置,而无需管理员重复实施配置操作。类似地,管理员可以通过上述方式将接入点设备13或其他设备接入接入点设备11创建的本地局域网,以由接入点设备11实施自动配置,此处不再赘述。
在一实施例中,接入点设备11作为网关设备,在完成配置后可以开启WDS AP(Wireless Distribution System Access Point,WDS接入点)功能,而接入点设备12、接入点设备13等可以开启WDS STA(Wireless Distribution System Station,WDS 客户端)功能,以实现基于WDS(Wireless Distribution System,无线分布系统)功能的无线桥接,完成接入点设备11、接入点设备12与接入点设备13之间的组网配置。
此外,接入点设备12、接入点设备13还可以基于接入点设备11实现自动化的配置更新。在一实施例中,接入点设备11在发生配置更新后,可以主动向维护的本地局域网内的接入点设备12、接入点设备13等发送配置更新数据,以使得接入点设备12、接入点设备13等通过该配置更新数据实现自动更新。在另一实施例中,接入点设备12、接入点设备13可以主动向接入点设备11发起更新请求,比如该接入点设备12、接入点设备13可以周期性地发起该更新请求,以实现配置更新。其中,接入点设备12、接入点设备13每次发送至接入点设备11的配置信息中可以包含版本标识,比如版本号、时间戳等,以用于区分不同版本的配置信息。那么,接入点设备12、接入点设备13发起的更新请求中可以包含当前采用的配置信息的版本标识(比如版本D1),而接入点设备11在接收到接入点设备12、接入点设备13发起的更新请求时,可以获取该接入点设备11当前采用的配置信息的版本标识(比如版本D2),那么当D2=D1时,表明接入点设备12、接入点设备13采用的配置信息为最新版本,因而不需要更新配置,而当D2≠D1时,接入点设备11可以将版本标识为D2的配置信息发送至接入点设备12、接入点设备13,以实现对接入点设备12、接入点设备13的配置更新。
图15是一示例性实施例的一种电子设备的示意结构图。请参考图15,在硬件层面,该电子设备包括处理器1502、内部总线1504、网络接口1506、内存1508以及非易失性存储器1510,当然还可能包括其他业务所需要的硬件。处理器1502从非易失性存储器1510中读取对应的计算机程序到内存1508中然后运行,在逻辑层面上形成设备配置装置。当然,除了软件实现方式之外,本说明书一个或多个实施例并不排除其他实现方式,比如逻辑器件抑或软硬件结合的方式等等,也就是说以下处理流程的执行主体并不限定于各个逻辑单元,也可以是硬件或逻辑器件。
请参考图16,在软件实施方式中,该设备配置装置可以包括:
网络创建单元1601,使网络中的第一物理设备按照第一内置算法对团体的信息进行计算得到所述网络的接入信息,其中所述第一物理设备被绑定至所述团体;
信息获取单元1602,使所述第一物理设备在收到第二物理设备对所述网络发起的接入请求时,获取所述接入请求包含的待验证接入信息;
接入验证单元1603,使所述第一物理设备在所述待验证接入信息匹配于所述接入信息的情况下,允许所述第二物理设备接入所述网络。
可选的,所述团体的信息包括:所述团体的名称、所述团体的标识号码。
可选的,还包括:
设备配置单元1604,使所述第一物理设备在所述第二物理设备接入所述网络后,对所述第二物理设备进行配置。
可选的,所述设备配置单元1604具体用于:
使所述第一物理设备将所述第二物理设备绑定至所述团体,以实现对所述第二物理设备的配置。
可选的,所述设备配置单元1604具体用于:
使所述第一物理设备与所述第二物理设备之间实现设备组网,以实现对所述第二物理设备的配置。
请参考图17,在软件实施方式中,该设备配置装置可以包括:
信息接收单元1701,使第二物理设备接收用户设备发送的团体的信息;
信息计算单元1702,使所述第二物理设备按照第二内置算法对所述团体的信息进行计算得到待验证接入信息;
接入请求单元1703,使所述第二物理设备在检测到第一物理设备所处的网络时,向所述第一物理设备发起针对所述网络的接入请求,所述接入请求包含所述待验证接入信息,以在验证成功后接入所述网络。
请参考图18,在软件实施方式中,该设备配置装置可以包括:
团体绑定单元1801,使用户设备将第一物理设备绑定至团体,以使所述第一物理设备加入网络后,按照第一内置算法对所述团体的信息进行计算得到所述网络的接入信息;
信息发送单元1802,使所述用户设备将所述团体的信息发送至第二物理设备,以由所述第二物理设备按照第二内置算法对所述团体的信息进行计算得到待验证接入信息、并基于所述待验证接入信息向所述第一物理设备发起针对所述网络的接入请求;其中,所述第一物理设备在所述待验证接入信息匹配于所述接入信息的情况下,允许所述第二物理设备接入所述网络。
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机,计算机的具体形式可以是个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件收发设备、游戏控制台、平板计算机、可穿戴设备或 者这些设备中的任意几种设备的组合。
在一个典型的配置中,计算机包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带、磁盘存储、量子存储器、基于石墨烯的存储介质或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。
上述对本说明书特定实施例进行了描述。其它实施例在所附权利要求书的范围内。在一些情况下,在权利要求书中记载的动作或步骤可以按照不同于实施例中的顺序来执行并且仍然可以实现期望的结果。另外,在附图中描绘的过程不一定要求示出的特定顺序或者连续顺序才能实现期望的结果。在某些实施方式中,多任务处理和并行处理也是可以的或者可能是有利的。
在本说明书一个或多个实施例使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本说明书一个或多个实施例。在本说明书一个或多个实施例和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本说明书一个或多个实施例可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本说明书一个或多个实施例范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
以上所述仅为本说明书一个或多个实施例的较佳实施例而已,并不用以限制本说明书一个或多个实施例,凡在本说明书一个或多个实施例的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本说明书一个或多个实施例保护的范围之内。

Claims (16)

  1. 一种设备配置方法,其特征在于,包括:
    网络中的第一物理设备按照第一内置算法对团体的信息进行计算得到所述网络的接入信息,其中所述第一物理设备被绑定至所述团体;
    第二物理设备根据用户设备发送的所述团体的信息,按照第二内置算法对所述团体的信息进行计算得到待验证接入信息,并利用所述待验证接入信息向所述第一物理设备发起对所述网络的接入请求;
    所述第一物理设备在所述待验证接入信息匹配于所述接入信息的情况下,允许所述第二物理设备接入所述网络。
  2. 一种设备配置方法,其特征在于,包括:
    网络中的第一物理设备按照第一内置算法对团体的信息进行计算得到所述网络的接入信息,其中所述第一物理设备被绑定至所述团体;
    所述第一物理设备在收到第二物理设备对所述网络发起的接入请求时,获取所述接入请求包含的待验证接入信息;
    所述第一物理设备在所述待验证接入信息匹配于所述接入信息的情况下,允许所述第二物理设备接入所述网络。
  3. 根据权利要求2所述的方法,其特征在于,所述团体的信息包括:所述团体的名称、所述团体的标识号码。
  4. 根据权利要求2所述的方法,其特征在于,还包括:
    所述第一物理设备在所述第二物理设备接入所述网络后,对所述第二物理设备进行配置。
  5. 根据权利要求4所述的方法,其特征在于,所述第一物理设备对所述第二物理设备进行配置,包括:
    所述第一物理设备将所述第二物理设备绑定至所述团体,以实现对所述第二物理设备的配置。
  6. 根据权利要求4所述的方法,其特征在于,所述第一物理设备对所述第二物理设备进行配置,包括:
    所述第一物理设备与所述第二物理设备之间实现设备组网,以实现对所述第二物理设备的配置。
  7. 一种设备配置方法,其特征在于,包括:
    第二物理设备接收用户设备发送的团体的信息;
    所述第二物理设备按照第二内置算法对所述团体的信息进行计算得到待验证接入信息;
    所述第二物理设备在检测到第一物理设备所处的网络时,向所述第一物理设备发起针对所述网络的接入请求,所述接入请求包含所述待验证接入信息,以在验证成功后接入所述网络。
  8. 一种设备配置方法,其特征在于,包括:
    用户设备将第一物理设备绑定至团体,以使所述第一物理设备加入网络后,按照第一内置算法对所述团体的信息进行计算得到所述网络的接入信息;
    所述用户设备将所述团体的信息发送至第二物理设备,以由所述第二物理设备按照第二内置算法对所述团体的信息进行计算得到待验证接入信息、并基于所述待验证接入信息向所述第一物理设备发起针对所述网络的接入请求;其中,所述第一物理设备在所述待验证接入信息匹配于所述接入信息的情况下,允许所述第二物理设备接入所述网络。
  9. 一种设备配置方法,其特征在于,包括:
    网络中的第一物理设备根据与所述第一物理设备绑定的团体的信息确定所述网络的接入信息;
    第二物理设备根据用户设备发送的所述团体的信息确定针对所述网络的待验证接入信息,并利用所述待验证接入信息向所述第一物理设备发起对所述网络的接入请求;
    所述第一物理设备在所述待验证接入信息匹配于所述接入信息的情况下,允许所述第二物理设备接入所述网络。
  10. 一种设备配置装置,其特征在于,包括:
    网络创建单元,使网络中的第一物理设备按照第一内置算法对团体的信息进行计算得到所述网络的接入信息,其中所述第一物理设备被绑定至所述团体;
    信息获取单元,使所述第一物理设备在收到第二物理设备对所述网络发起的接入请求时,获取所述接入请求包含的待验证接入信息;
    接入验证单元,使所述第一物理设备在所述待验证接入信息匹配于所述接入信息的情况下,允许所述第二物理设备接入所述网络。
  11. 根据权利要求10所述的装置,其特征在于,所述团体的信息包括:所述团体的名称、所述团体的标识号码。
  12. 根据权利要求10所述的装置,其特征在于,还包括:
    设备配置单元,使所述第一物理设备在所述第二物理设备接入所述网络后,对所述第二物理设备进行配置。
  13. 根据权利要求12所述的装置,其特征在于,所述设备配置单元具体用于:
    使所述第一物理设备将所述第二物理设备绑定至所述团体,以实现对所述第二物理设备的配置。
  14. 根据权利要求12所述的装置,其特征在于,所述设备配置单元具体用于:
    使所述第一物理设备与所述第二物理设备之间实现设备组网,以实现对所述第二物理设备的配置。
  15. 一种设备配置装置,其特征在于,包括:
    信息接收单元,使第二物理设备接收用户设备发送的团体的信息;
    信息计算单元,使所述第二物理设备按照第二内置算法对所述团体的信息进行计算得到待验证接入信息;
    接入请求单元,使所述第二物理设备在检测到第一物理设备所处的网络时,向所述第一物理设备发起针对所述网络的接入请求,所述接入请求包含所述待验证接入信息,以在验证成功后接入所述网络。
  16. 一种设备配置装置,其特征在于,包括:
    团体绑定单元,使用户设备将第一物理设备绑定至团体,以使所述第一物理设备加入网络后,按照第一内置算法对所述团体的信息进行计算得到所述网络的接入信息;
    信息发送单元,使所述用户设备将所述团体的信息发送至第二物理设备,以由所述第二物理设备按照第二内置算法对所述团体的信息进行计算得到待验证接入信息、并基于所述待验证接入信息向所述第一物理设备发起针对所述网络的接入请求;其中,所述第一物理设备在所述待验证接入信息匹配于所述接入信息的情况下,允许所述第二物理设备接入所述网络。
PCT/CN2018/105907 2017-09-27 2018-09-17 设备配置方法及装置 WO2019062570A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710890916.2 2017-09-27
CN201710890916.2A CN109560954B (zh) 2017-09-27 2017-09-27 设备配置方法及装置

Publications (1)

Publication Number Publication Date
WO2019062570A1 true WO2019062570A1 (zh) 2019-04-04

Family

ID=65863705

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/105907 WO2019062570A1 (zh) 2017-09-27 2018-09-17 设备配置方法及装置

Country Status (2)

Country Link
CN (1) CN109560954B (zh)
WO (1) WO2019062570A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111092949B (zh) * 2019-12-20 2022-05-03 北京百度网讯科技有限公司 用于注册设备的方法及装置
CN111372251B (zh) * 2020-02-27 2024-04-09 深圳市信锐网科技术有限公司 无线访问接入方法、装置、系统、终端设备、服务器及存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2747371A1 (en) * 2012-12-24 2014-06-25 Alcatel Lucent Access policy definition with respect to a data object
CN104468552A (zh) * 2014-11-28 2015-03-25 迈普通信技术股份有限公司 一种接入控制方法和装置
CN105848152A (zh) * 2016-05-30 2016-08-10 深圳优克云联科技有限公司 一种网络接入方法、装置及系统

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345621B (zh) * 2007-07-09 2012-03-07 华为技术有限公司 家庭网络的认证装置、系统和方法
CN101883123A (zh) * 2009-05-04 2010-11-10 华为技术有限公司 对电信设备安全状态验证的方法、设备和系统
CN105207980A (zh) * 2014-06-26 2015-12-30 联想(北京)有限公司 信息处理方法和电子设备
US20170076234A1 (en) * 2015-09-14 2017-03-16 Capital One Services, Llc Comprehensive Analytics Tool for Generating User Interfaces Based on Retrieved Data
CN106203950A (zh) * 2016-07-01 2016-12-07 阿里巴巴集团控股有限公司 考勤配置方法及装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2747371A1 (en) * 2012-12-24 2014-06-25 Alcatel Lucent Access policy definition with respect to a data object
CN104468552A (zh) * 2014-11-28 2015-03-25 迈普通信技术股份有限公司 一种接入控制方法和装置
CN105848152A (zh) * 2016-05-30 2016-08-10 深圳优克云联科技有限公司 一种网络接入方法、装置及系统

Also Published As

Publication number Publication date
CN109560954A (zh) 2019-04-02
CN109560954B (zh) 2022-06-10

Similar Documents

Publication Publication Date Title
JP6668544B2 (ja) ポータル認証
US9820153B2 (en) Centralized access point provisioning system and methods of operation thereof
US9998473B2 (en) WiFi access management system and methods of operation thereof
US10581798B2 (en) Network based distribution for compute resource and application accessibility
CN108628658B (zh) 一种容器的许可证管理方法及装置
EP2973147B1 (en) Policy-based secure web boot
US11665060B2 (en) System and method for remote configuration of scalable datacenter
US9992188B2 (en) Methods and systems for single sign-on while protecting user privacy
US10757089B1 (en) Mobile phone client application authentication through media access gateway (MAG)
US9578513B2 (en) Identifying untrusted network access points
US20220029917A1 (en) Executing workloads across multiple cloud service providers
WO2019062570A1 (zh) 设备配置方法及装置
US20230216846A1 (en) Quantum Entanglement Communication Service
CN113051035B (zh) 一种远程控制方法、装置、系统及宿主机
CN111447080B (zh) 私有网络去中心化控制方法、装置及计算机可读存储介质
WO2019062632A1 (zh) 物理设备的配置方法及装置
US11297065B2 (en) Technology for computing resource liaison
US11983542B2 (en) Management of edge computing nodes in preboot execution environment (PxE) having unique media access control (MAC) address with targeted installation of edge node
US20240152598A1 (en) System, method, and computer program for smart secret rotator

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18862399

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18862399

Country of ref document: EP

Kind code of ref document: A1