WO2022100559A1 - Networking method, networking device, electronic device, and storage medium - Google Patents

Networking method, networking device, electronic device, and storage medium Download PDF

Info

Publication number
WO2022100559A1
WO2022100559A1 PCT/CN2021/129443 CN2021129443W WO2022100559A1 WO 2022100559 A1 WO2022100559 A1 WO 2022100559A1 CN 2021129443 W CN2021129443 W CN 2021129443W WO 2022100559 A1 WO2022100559 A1 WO 2022100559A1
Authority
WO
WIPO (PCT)
Prior art keywords
networking
accessed
host
module
request
Prior art date
Application number
PCT/CN2021/129443
Other languages
French (fr)
Chinese (zh)
Inventor
于宏全
孙权
廖亮
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2022100559A1 publication Critical patent/WO2022100559A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection

Definitions

  • This application relates to the fields of communications and the Internet of Things.
  • WIFI signals With the popularity of wireless networks, many public places and private places are covered with WIFI signals.
  • a device wants to access a wireless network it usually needs to input device information and a password, which reduces user experience.
  • the present application provides a networking method, a networking device, an electronic device, and a computer-readable storage medium.
  • a method for networking comprising: determining whether the device to be accessed has networking authority according to a networking request sent by the device to be accessed through a first near field communication NFC module, wherein the The networking request carries the identity information of the device to be accessed; when it is determined that the device to be accessed has the networking authority, the device to be accessed is connected to the host and connected to the Internet; and when it is determined that the device to be accessed has the networking authority When the device does not have the networking authority, it sends a networking authentication request to the host, where the networking authentication request carries the identity information of the device to be accessed.
  • a method for networking comprising: when a first NFC module is activated by an electromagnetic field, sending a networking request through the first NFC module, wherein the networking request carries the current waiting list Enter the identity information of the device.
  • a networked device includes: a first storage module, on which a first executable program is stored; a first main control module, on which the first executable program is stored; A main control module can execute the first executable program to implement the networking method provided according to the first aspect of the present disclosure; a second NFC module, the second NFC module is used to provide an electromagnetic field; a communication module, the The communication module is used to communicate with the host.
  • an electronic device comprising: a second storage module, where a second executable program is stored; a second main control module, the second main control module
  • the second executable program can be executed to realize the networking method provided according to the second aspect of the present disclosure
  • the first NFC module when activated by an electromagnetic field, the first NFC module can send a message carrying the current electronic device; Online requests for identity information.
  • a computer-readable storage medium storing a computer program that, when executed by a processor, implements the first or second aspect of the present disclosure the described networking method.
  • FIG. 1 is a flowchart of an embodiment of the networking method provided by the first aspect of the present disclosure
  • FIG. 2 is a flowchart of another implementation manner of the networking method provided by the first aspect of the present disclosure
  • FIG. 3 is a flowchart of an embodiment of the networking method provided by the second aspect of the present disclosure.
  • FIG. 4 is a schematic diagram of a module of a networked device provided by a third aspect of the present disclosure.
  • FIG. 5 is a schematic diagram of a module of an electronic device provided by a fourth aspect of the present disclosure.
  • the IoT method includes steps S110 to S130.
  • step S110 it is judged whether the device to be accessed has the networking authority according to the networking request sent by the device to be accessed through the first near field communication NFC module, wherein the networking request carries the identity of the device to be accessed information.
  • step S120 when it is determined (in step S110) that the device to be accessed has the networking authority, the device to be accessed is connected to the host and connected to the network.
  • step S130 when it is determined (in step S110) that the device to be accessed does not have the networking authority, a networking authentication request is sent to the host, and the networking authentication request carries the information of the device to be accessed. Identity Information.
  • the IoT method provided by the first aspect of the present disclosure is performed by a networked device (eg, a smart router, a networked device such as a CPE (Customer Premise Equipment)), and more specifically, by, for example, a main control module of the networked device implement.
  • the networked device may have a second NFC module.
  • the second NFC module can generate an electromagnetic field.
  • the first NFC module of the device to be connected enters the electromagnetic field, the first NFC module is activated, and the networking request can be sent to the networking device through near field communication.
  • the networking device After receiving the networking request, the networking device firstly determines whether the device to be accessed has networking authority.
  • the device to be accessed When it is determined that the device to be accessed has the networking authority, the device to be accessed is directly connected to the host to realize sensorless networking; when it is determined that the device to be accessed does not have the networking authority, it directly
  • the carried identity information is authenticated online, and the operator of the device to be accessed does not need to input identity information, which simplifies the operator's operation steps and improves the user experience.
  • whether the device to be accessed has the right to connect to the Internet there is no special limitation on how to determine whether the device to be accessed has the right to connect to the Internet.
  • whether the to-be-connected device has the right to connect to the Internet may be determined according to the Internet-connected whitelist or the Internet-connected blacklist.
  • the identity information of the device that refuses to be connected to the Internet can be set in the Internet-connected blacklist.
  • the networking request is received, the identity information of the device to be accessed carried in the networking request is compared with the networking blacklist.
  • the comparison result is that the identity information of the device to be accessed exists in the networking blacklist, it is determined that the device to be accessed does not have networking authority; when the comparison result is that the identity information of the device to be accessed does not exist in the network blacklist
  • it is in the networking blacklist it is determined that the device to be accessed has networking authority.
  • the identity information of the device that is allowed to connect to the Internet may be set in the Internet whitelist.
  • the step of judging whether the device to be accessed has networking authority includes: judging whether the device to be accessed is in the networking whitelist according to the identity information of the device to be accessed.
  • the device to be accessed When the device to be accessed is in the networking whitelist, it is determined that the device to be accessed has the networking authority; when the device to be accessed is not in the networking whitelist, it is determined that the device to be accessed is not in the networking whitelist The incoming device does not have the stated networking permission.
  • the identity information of the device to be accessed is not particularly limited.
  • the identity information of the device to be accessed may include an International Mobile Equipment Identity (IMEI, International Mobile Equipment Identification) of the device to be accessed .
  • IMEI International Mobile Equipment Identity
  • International Mobile Equipment Identification International Mobile Equipment Identification
  • the networking whitelist may be pushed by the host to the networking device performing the networking method.
  • the identity information of the device to be accessed is sent to the host, and the host authenticates it.
  • the device to be accessed can be connected to the host to realize networking. And, in this case, the host pushes the information of non-whitelisted groups to the connected devices.
  • the device to be accessed is not allowed to access the host.
  • the networking device When the device to be accessed is in the networking whitelist, the networking device directly connects the device to be accessed to the host. And, in this case, the host pushes the information of the whitelist group to the connected devices.
  • the networking method may further include step S140 performed after step S130.
  • step S140 in response to an instruction of allowing networking returned by the host, the device to be accessed is connected to the host and connected to the network.
  • the step of sending an online authentication request to the host includes steps S131 to S133.
  • step S131 it is determined whether the host is in the local area network.
  • step S132 the network authentication request is sent to the host through the local area network.
  • step S133 the network authentication request is sent to the host through the WIFI network.
  • the network authentication request may be sent to the host through a communication module.
  • the communication module in this embodiment is a narrow band (NB, Narrow Band), communication module.
  • the present disclosure is not limited to this, and the communication module may also be a communication module adopting communication methods such as Long Term Evolution (LTE, Long Term Evolution), 5G, etc., that is, a LET communication module, a 5G communication module, and the like.
  • the main control module and the NB communication module may enter a sleep state.
  • the networking method may include step S150 performed after step S140.
  • step S150 a sleep control signal is sent to the power management module, so as to control the NB communication module and the main control module to enter a sleep state through the power management module.
  • both the main control module and the NB communication module are in a dormant state.
  • step S100 the networking request is received.
  • step S105 in response to the networking request, a power supply signal is sent to the power management module, so that the power management module supplies power to the current main control module to end the sleep state of the current main control module.
  • step S105 power can also be supplied to the NB communication module in the dormant state through the power management module to end the dormant state of the NB communication module.
  • the host may set the networking duration of each slave device that accesses the host. When the slave device connected to the host exceeds the networking duration of the host, the host will disconnect from the slave device.
  • the main control module and the NB communication module need to be activated only after the networking request is received and the networking method is executed, while in other time periods, the main control module and the NB communication module are both dormant In the state, the energy consumption of the networked device including the main control module can be reduced.
  • a networking method is provided, and the networking method can be performed by the device to be accessed (ie, the slave device) described above. As shown in FIG. 3 , the networking method includes step S210.
  • step S210 when the first NFC module is excited by the electromagnetic field, a networking request is sent through the first NFC module, wherein the networking request carries the identity information of the current device to be accessed.
  • the networking method provided by the second aspect of the present disclosure is used in conjunction with the networking method provided by the first aspect of the present disclosure.
  • the networked device has a second NFC module that provides an electromagnetic field.
  • the first NFC module When the device to be accessed that is provided with the first NFC module enters the electromagnetic field provided by the second NFC module, the first NFC module is activated, and sends a networking request carrying the identity information of the device to be accessed currently to the networking device .
  • the main control module of the networking device executes the networking method provided by the first aspect of the present disclosure.
  • the identity information is sent to the networked device through the first NFC module, without the user's manual input, and sensorless networking can be realized.
  • the networking device includes a first storage module 310 , a first main control module 320 , a second NFC module 330 and an NB communication module 340 .
  • the first storage module 310 stores a first executable program
  • the first main control module 320 can execute the first executable program to implement the networking method provided by the first aspect of the present disclosure
  • the second NFC module 330 can An electromagnetic field is provided, the NB communication module 340, for communication with the host.
  • the NB communication module 340 is configured to send the networking authentication request generated by the first main control module 320 to the host, and feed back the data sent by the host to the connected device.
  • the first main control module 320 of the networking device can execute the networking method provided by the first aspect of the present disclosure, and control the second NFC module 330 to receive the networking request sent by the first NFC module of the device to be connected, and firstly according to the The identity information carried in the networking request is used to determine whether the device to be accessed has networking authority.
  • the device to be accessed has the networking authority
  • the device to be accessed is connected to the host to implement networking of the device to be accessed.
  • the identity information of the device to be accessed is sent to the host for authentication by the host.
  • the authentication is passed, the device to be connected is connected to the host, and when the authentication is not passed, the device to be connected is not connected to the host.
  • the user of the device to be connected does not need to manually input data, so that true sensorless networking can be realized and user experience is improved.
  • the networked device may further include a power management module 350, and the power management module 350 is configured to supply power to the first main control module 320 and the NB communication module 340 of the networked device.
  • the power management module 350 receives the sleep signal sent by the first main control module 320, it controls the first main control module 320 and the NB communication module 340 to enter a sleep state with low power consumption.
  • the power management module 350 receives the power supply signal sent by the first main control module 320, it supplies power to the first main control module 320 and the NB communication module 340 normally to end the sleep of the first main control module 320 and the NB communication module 340. state.
  • an electronic device As shown in FIG. 5 , the electronic device includes a second storage module 410 , a second main control module 420 , and a first NFC module 430 .
  • the second storage module 410 stores a second executable program, and the second main control module 420 can execute the second executable program to implement the networking method provided according to the second aspect of the present disclosure.
  • the first NFC module 430 When activated by an electromagnetic field, it can send a networking request carrying the identity information of the current electronic device.
  • the electronic device provided by the present disclosure is the device to be connected mentioned above. Since the electronic device has the first NFC module 430, when the first NFC module 430 enters the second NFC module of the networked device provided above When the electromagnetic field of the electronic device 330 is excited, the second main control module 420 sends the networking request carrying the identity information of the electronic device to the second NFC module 330 through the first NFC module 430 . Subsequently, the networking method provided by the first aspect of the present disclosure can be executed by the networking device, and the sensorless networking of the electronic device can be realized.
  • the electronic device acts as a slave device when networked.
  • the electronic device may be a terminal device such as a mobile phone and a tablet computer, or may be other electronic devices with networking requirements.
  • the electronic device is a mobile phone
  • the communication module is an NB communication module.
  • both the main control module and the NB communication module of the networked device are in a dormant state.
  • the first main control module of the networking device uses the IMEI number to set the networking whitelist.
  • the mobile phone to be accessed is scanned by the networking device to obtain the networking request of the mobile phone to be accessed.
  • the networking request sent by the mobile phone through the first NFC module carries the IMEI number of the mobile phone.
  • the networking device determines whether the cell phone is in the networking white list according to the IMEI number of the cell phone, and when the cell phone is in the networking white list, it is determined that the cell phone has networking authority, and in the case of no further authentication, The networking device connects the mobile phone to the host, so that the mobile phone can be connected to the WIFI network without inductance. At this time, the information pushed by the host to the mobile phone is not the information of the whitelisted group.
  • the networking device determines whether the networking device and the host are in the same local area network. When the networking device and the host are in the same local area network, the networking device uses the NB communication module to send the networking authentication request carrying the mobile phone identity information to the host through the local area network; when the networking device and the host When not in the same local area network, the networking device uses the NB communication module to send the networking authentication request carrying the identity information of the mobile phone to the host through the WIFI network.
  • the networking device uses the NB communication module to send the networking authentication request to the host through the local area network; when the networking device and the host are not in the same local area network, The networked device uses the NB communication module to send the connected authentication request to the host through the WIFI network.
  • the host authenticates the mobile phone according to the identity information in the online authentication request, and feeds back the authentication result to the NB communication module.
  • the networked device receives the feedback information sent by the host through the NB communication module, and judges whether to allow the mobile phone to access the host according to the feedback information.
  • the networked device After completing the above authentication process, the networked device sends a sleep control signal to the power control module, so that the first main control module and the NB communication module enter a sleep state with low power consumption.
  • the present disclosure is not limited to this, and the communication module may also be a module using communication methods such as LTE and 5G.
  • a computer-readable storage medium is provided, and the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, realizes the disclosure provided according to the first aspect of the present disclosure
  • the networking method, or, the networking method provided according to the second aspect of the present disclosure are provided.
  • Such software may be distributed on computer-readable storage media, which may include computer storage media (or non-transitory media) and communication media (or transitory media).
  • computer storage media includes both volatile and nonvolatile implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules or other data flexible, removable and non-removable media.
  • Computer storage media include, but are not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cartridges, magnetic tape, magnetic disk storage or other magnetic storage devices, or may Any other medium used to store desired information and that can be accessed by a computer.
  • communication media typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism, and can include any information delivery media, as is well known to those of ordinary skill in the art .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The present invention provides a networking method, comprising: determining, according to a networking request issued by means of a first near-field communication (NFC) module by a device to be accessed, whether said device has a networking permission, wherein the networking request carries identity information of said device; when it is determined that said device has the networking permission, accessing said device to a host and performing networking; and when it is determined that said device does not have the networking permission, sending a networking authentication request to the host, the networking authentication request carrying the identity information of said device. The present invention also provides another networking method, a networking device, an electronic device, and a computer readable storage medium.

Description

联网方法、联网设备、电子设备、存储介质Networking method, networking device, electronic device, storage medium
相关申请的交叉引用CROSS-REFERENCE TO RELATED APPLICATIONS
本申请要求于2020年11月10提交的中国专利申请NO.202011245325.8的优先权,该中国专利申请的全部内容通过引用结合在本申请中。This application claims priority to Chinese patent application No. 202011245325.8 filed on November 10, 2020, the entire contents of which are incorporated herein by reference.
技术领域technical field
本申请涉及通讯及物联网领域。This application relates to the fields of communications and the Internet of Things.
背景技术Background technique
随着无线网络的普及,很多公共场所、以及私人场所都覆盖了WIFI信号。当设备想要接入无线网络时,通常都需要输入设备信息以及密码,降低了用户体验。With the popularity of wireless networks, many public places and private places are covered with WIFI signals. When a device wants to access a wireless network, it usually needs to input device information and a password, which reduces user experience.
发明内容SUMMARY OF THE INVENTION
本申请提供一种联网方法、一种联网设备、一种电子设备和一种计算机可读存储介质。The present application provides a networking method, a networking device, an electronic device, and a computer-readable storage medium.
作为本公开的第一个方面,提供一种联网方法,包括:根据待接入设备通过第一近场通信NFC模块发出的联网请求判断所述待接入设备是否具有联网权限,其中,所述联网请求携带有所述待接入设备的身份信息;当判定所述待接入设备具有所述联网权限时,将所述待接入设备接入主机并联网;而当判定所述待接入设备不具有所述联网权限时,向所述主机发送联网认证请求,所述联网认证请求携带有所述待接入设备的身份信息。As a first aspect of the present disclosure, a method for networking is provided, comprising: determining whether the device to be accessed has networking authority according to a networking request sent by the device to be accessed through a first near field communication NFC module, wherein the The networking request carries the identity information of the device to be accessed; when it is determined that the device to be accessed has the networking authority, the device to be accessed is connected to the host and connected to the Internet; and when it is determined that the device to be accessed has the networking authority When the device does not have the networking authority, it sends a networking authentication request to the host, where the networking authentication request carries the identity information of the device to be accessed.
作为本公开的第二个方面,提供一种联网方法,包括:当第一NFC模块被电磁场激活时,通过所述第一NFC模块发送联网请求,其中,所述联网请求携带有当前的待接入设备的身份信息。As a second aspect of the present disclosure, there is provided a method for networking, comprising: when a first NFC module is activated by an electromagnetic field, sending a networking request through the first NFC module, wherein the networking request carries the current waiting list Enter the identity information of the device.
作为本公开的第三个方面,提供一种联网设备,所述联网设备包括:第一存储模块,所述第一存储模块上存储有第一可执行程序;第一主控模块,所述第一主控模块能够执行所述第一可执行程序,以实现根据本公开第一个方面所提供的联网方法;第二NFC模块,所述第二NFC模块用于提供电磁场;通信模块,所述通信模块用于与主机通信。As a third aspect of the present disclosure, a networked device is provided, the networked device includes: a first storage module, on which a first executable program is stored; a first main control module, on which the first executable program is stored; A main control module can execute the first executable program to implement the networking method provided according to the first aspect of the present disclosure; a second NFC module, the second NFC module is used to provide an electromagnetic field; a communication module, the The communication module is used to communicate with the host.
作为本公开的第四个方面,提供一种电子设备,包括:第二存储模块,所述第二存储模块上存储有第二可执行程序;第二主控模块,所述第二主控模块能够执行所述第二可执行程序,以实现根据本公开第二个方面所提供的联网方法;第一NFC模块,所述第一NFC模块能够在被电磁场激活时,发送携带有当前电子设备的身份信息的联网请求。As a fourth aspect of the present disclosure, an electronic device is provided, comprising: a second storage module, where a second executable program is stored; a second main control module, the second main control module The second executable program can be executed to realize the networking method provided according to the second aspect of the present disclosure; the first NFC module, when activated by an electromagnetic field, the first NFC module can send a message carrying the current electronic device; Online requests for identity information.
作为本公开的第五个方面,提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时实现根据本公开第一或第二个方面所述的联网方法。As a fifth aspect of the present disclosure, there is provided a computer-readable storage medium storing a computer program that, when executed by a processor, implements the first or second aspect of the present disclosure the described networking method.
附图说明Description of drawings
图1是本公开第一个方面所提供的联网方法的一种实施方式的流程图;FIG. 1 is a flowchart of an embodiment of the networking method provided by the first aspect of the present disclosure;
图2是本公开第一个方面所提供的联网方法的另一种实施方式的流程图;FIG. 2 is a flowchart of another implementation manner of the networking method provided by the first aspect of the present disclosure;
图3是本公开第二个方面所提供的联网方法的一种实施方式的流程图;FIG. 3 is a flowchart of an embodiment of the networking method provided by the second aspect of the present disclosure;
图4是本公开第三个方面所提供的联网设备的模块示意图;4 is a schematic diagram of a module of a networked device provided by a third aspect of the present disclosure;
图5是本公开第四个方面所提供的电子设备的模块示意图。FIG. 5 is a schematic diagram of a module of an electronic device provided by a fourth aspect of the present disclosure.
具体实施方式Detailed ways
为使本领域的技术人员更好地理解本公开的技术方案,下面结合附图对本公开提供的联网方法、联网设备、电子设备和计算机可读存储介质进行详细描述。In order to make those skilled in the art better understand the technical solutions of the present disclosure, the networking method, networking device, electronic device and computer-readable storage medium provided by the present disclosure will be described in detail below with reference to the accompanying drawings.
在下文中将参考附图更充分地描述示例实施例,但是所述示例实施例可以以不同形式来体现且不应当被解释为限于本文阐述的实施例。反之,提供这些实施例的目的在于使本公开透彻和完整,并将使本领域技术人员充分理解本公开的范围。Example embodiments are described more fully hereinafter with reference to the accompanying drawings, but which may be embodied in different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
在不冲突的情况下,本公开各实施例及实施例中的各特征可相互组合。Various embodiments of the present disclosure and various features of the embodiments may be combined with each other without conflict.
如本文所使用的,术语“和/或”包括一个或多个相关列举条目的任何和所有组合。As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
本文所使用的术语仅用于描述特定实施例,且不意欲限制本公开。如本文所使用的,单数形式“一个”和“该”也意欲包括复数形式,除非上下文另外清楚指出。还将理解的是,当本说明书中使用术语“包括”和/或“由……制成”时,指定存在所述特征、整体、步骤、操作、元件和/或组件,但不排除存在或添加一个或多个其它特征、整体、步骤、操作、元件、组件和/或其群组。The terminology used herein is used to describe particular embodiments only and is not intended to limit the present disclosure. As used herein, the singular forms "a" and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It will also be understood that when the terms "comprising" and/or "made of" are used in this specification, the stated features, integers, steps, operations, elements and/or components are specified to be present, but not precluded or Add one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
除非另外限定,否则本文所用的所有术语(包括技术和科学术语)的含义与本领域普通技术人员通常理解的含义相同。还将理解,诸如那些在常用字典中限定的那些术语应当被解释为具有与其在相关技术以及本公开的背景下的含义一致的含义,且将不解释为具有理想化或过度形式上的含义,除非本文明确如此限定。Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art. It will also be understood that terms such as those defined in common dictionaries should be construed as having meanings consistent with their meanings in the context of the related art and the present disclosure, and will not be construed as having idealized or over-formal meanings, unless expressly so limited herein.
作为本公开的一个方面,提供一种联网方法,如图1所示,所述物联网方法包括步骤S110至S130。As an aspect of the present disclosure, a networking method is provided. As shown in FIG. 1 , the IoT method includes steps S110 to S130.
在步骤S110中,根据待接入设备通过第一近场通信NFC模块发出的联网请求判断所述待接入设备是否具有联网权限,其中,所述联网请求携带有所述待接入设备的身份信息。In step S110, it is judged whether the device to be accessed has the networking authority according to the networking request sent by the device to be accessed through the first near field communication NFC module, wherein the networking request carries the identity of the device to be accessed information.
在步骤S120中,当(在步骤S110中)判定所述待接入设备具有所述联网权限时,将所述待接入设备接入主机并联网。In step S120, when it is determined (in step S110) that the device to be accessed has the networking authority, the device to be accessed is connected to the host and connected to the network.
在步骤S130中,当(在步骤S110中)判定所述待接入设备不具有所述联网权限时,向所述主机发送联网认证请求,所述联网认证请求携带有所述待接入设备的身份信息。In step S130, when it is determined (in step S110) that the device to be accessed does not have the networking authority, a networking authentication request is sent to the host, and the networking authentication request carries the information of the device to be accessed. Identity Information.
需要指出的是,本公开第一个方面所提供的物联网方法由联网设备(例如,智能路由器、CPE(Customer Premise Equipment)等联网设备)执行,更具体地,例如由联网设备的主控模块执行。该联网设备可具有第二NFC模块。第二NFC模块可以产生电磁场。当所述待接入设备的第一NFC模块进入所述电磁场后,该第一NFC模块被激发,可以将所述联网请求通过近场通信发送给所述联网设备。所述联网设备接收到所述联网请求后,首先判断所述待接入设备是否具有联网权限。当判定所述待接入设备具有联网权限时,直接将待接入设备接入主机,实现无感联网;当判定所述待接入设备不具有联网权限时,直接根据所述联网请求中所携带的身份信息进行联网认证,无需待接入设备的操作者输入身份信息,简化了操作者的操作步骤,提升了用户体验。It should be pointed out that the IoT method provided by the first aspect of the present disclosure is performed by a networked device (eg, a smart router, a networked device such as a CPE (Customer Premise Equipment)), and more specifically, by, for example, a main control module of the networked device implement. The networked device may have a second NFC module. The second NFC module can generate an electromagnetic field. After the first NFC module of the device to be connected enters the electromagnetic field, the first NFC module is activated, and the networking request can be sent to the networking device through near field communication. After receiving the networking request, the networking device firstly determines whether the device to be accessed has networking authority. When it is determined that the device to be accessed has the networking authority, the device to be accessed is directly connected to the host to realize sensorless networking; when it is determined that the device to be accessed does not have the networking authority, it directly The carried identity information is authenticated online, and the operator of the device to be accessed does not need to input identity information, which simplifies the operator's operation steps and improves the user experience.
在本公开中,对如何判断所述待接入设备是否具有联网权限不做特殊的限定。例如,可以根据联网白名单或者联网黑名单来判断所述待接入设备是否具有联网权限。In the present disclosure, there is no special limitation on how to determine whether the device to be accessed has the right to connect to the Internet. For example, whether the to-be-connected device has the right to connect to the Internet may be determined according to the Internet-connected whitelist or the Internet-connected blacklist.
当通过联网黑名单来判断所述待接入设备是否具有联网权限时,可以在联网黑名单中设置拒绝联网的设备的身份信息。当接收到所述联网请求时,将联网请求中携带的待接入设备的身份信息与所述联网黑名单进行对比。当对比结果为所述待接入设备的身份信息存在于所述联网黑名单中时,判定该待接入设备不具有联网权限;当对比结果为所述待接入设备的身份信息不存在于所述联网黑名单中时,判定该待接入设备具有联网权限。When judging whether the device to be accessed has the right to connect to the Internet through the Internet-connected blacklist, the identity information of the device that refuses to be connected to the Internet can be set in the Internet-connected blacklist. When the networking request is received, the identity information of the device to be accessed carried in the networking request is compared with the networking blacklist. When the comparison result is that the identity information of the device to be accessed exists in the networking blacklist, it is determined that the device to be accessed does not have networking authority; when the comparison result is that the identity information of the device to be accessed does not exist in the network blacklist When it is in the networking blacklist, it is determined that the device to be accessed has networking authority.
当通过联网白名单判断所述待接入设备是否具有联网权限时,可以在所述联网白名单中设置允许联网的设备的身份信息。当接收到所述联网请求时,判断所述待接入设备是否具有联网权限的步骤包括:根据所述待接入设备的身份信息判断所述待接入设备是否在联网白名单中。When judging whether the device to be accessed has the right to connect to the Internet through the Internet whitelist, the identity information of the device that is allowed to connect to the Internet may be set in the Internet whitelist. When the networking request is received, the step of judging whether the device to be accessed has networking authority includes: judging whether the device to be accessed is in the networking whitelist according to the identity information of the device to be accessed.
当所述待接入设备在所述联网白名单中时,判定所述待接入设备具有所述联网权限;当所述待接入设备不在所述联网白名单中时,判定所述待接入设备不具有所述联网权限。When the device to be accessed is in the networking whitelist, it is determined that the device to be accessed has the networking authority; when the device to be accessed is not in the networking whitelist, it is determined that the device to be accessed is not in the networking whitelist The incoming device does not have the stated networking permission.
通过联网白名单来判断待接入设备是否具有联网权限更有利于确保主机的安全性。It is more beneficial to ensure the security of the host by judging whether the device to be connected has the permission to connect to the network through the networking whitelist.
在本公开中,对所述待接入设备的身份信息不做特殊的限定。例如,当所述待接入设备为移动设备(例如,手机)时,所述待接入设备的身份信息可以包括所述待接入设备的国际移动设备识别号(IMEI,International Mobile Equipment Identify)。In the present disclosure, the identity information of the device to be accessed is not particularly limited. For example, when the device to be accessed is a mobile device (eg, a mobile phone), the identity information of the device to be accessed may include an International Mobile Equipment Identity (IMEI, International Mobile Equipment Identification) of the device to be accessed .
在本公开中,可以通过主机将所述联网白名单推送至执行所述联网方法的联网设备。In the present disclosure, the networking whitelist may be pushed by the host to the networking device performing the networking method.
当所述待接入设备不在所述联网白名单中时,将所述待接入设备的身份信息发送至主机,由所述主机对其进行认证。When the device to be accessed is not in the networking whitelist, the identity information of the device to be accessed is sent to the host, and the host authenticates it.
当认证通过时,可以将所述待接入设备接入所述主机,以实现联网。并且,在这种情况下,主机向已经接入的设备推送非白名单机组的信息。When the authentication is passed, the device to be accessed can be connected to the host to realize networking. And, in this case, the host pushes the information of non-whitelisted groups to the connected devices.
当认证未通过时,则不允许所述待接入设备接入所述主机。When the authentication fails, the device to be accessed is not allowed to access the host.
当所述待接入设备在所述联网白名单中时,所述联网设备直接将所述待接入设备接入所述主机。并且,在这种情况下,主机向已经接入的设备推送白名单机组的信息。When the device to be accessed is in the networking whitelist, the networking device directly connects the device to be accessed to the host. And, in this case, the host pushes the information of the whitelist group to the connected devices.
换言之,如图2所示,所述联网方法还可以包括在步骤S130之后进行的步骤S140。In other words, as shown in FIG. 2, the networking method may further include step S140 performed after step S130.
在步骤S140中,响应于所述主机返回的允许联网指令,将所述待接入设备接入所述主机并联网。In step S140, in response to an instruction of allowing networking returned by the host, the device to be accessed is connected to the host and connected to the network.
在本公开中,对如何将所述认证信息发送给所述主机不做特殊的限定。作为一种可选实施方式,如图2所示,向所述主机发送联网认证请求的步骤包括步骤S131至S133。In the present disclosure, there is no special limitation on how to send the authentication information to the host. As an optional implementation manner, as shown in FIG. 2 , the step of sending an online authentication request to the host includes steps S131 to S133.
在步骤S131中,判断所述主机是否在局域网内。In step S131, it is determined whether the host is in the local area network.
当所述主机在所述局域网内时,在步骤S132中,通过所述局域网向所述主机发送所述联网认证请求。When the host is in the local area network, in step S132, the network authentication request is sent to the host through the local area network.
当所述主机不在所述局域网内时,在步骤S133中,通过WIFI网络向所述主机发送所述联网认证请求。When the host is not in the local area network, in step S133, the network authentication request is sent to the host through the WIFI network.
在本公开中,可以通过通信模块向所述主机发送所述联网认证请求。作为示例,本实施例中的通信模块为窄频带(NB,Narrow Band),通信模块。然而,本公开不限如此,通信模块也可以为采用长期演进(LTE,Long Term Evolution)、5G等通信方式的通信模块,即LET通信模块、5G通信模块等。In the present disclosure, the network authentication request may be sent to the host through a communication module. As an example, the communication module in this embodiment is a narrow band (NB, Narrow Band), communication module. However, the present disclosure is not limited to this, and the communication module may also be a communication module adopting communication methods such as Long Term Evolution (LTE, Long Term Evolution), 5G, etc., that is, a LET communication module, a 5G communication module, and the like.
为了降低能耗,作为一种可选实施方式,在接收到主机的反馈后,所述主控模块和所述NB通信模块可以进入休眠状态。具体地,如图2所示,所述联网方法可以包括在步骤S140之后进行的步骤S150。In order to reduce energy consumption, as an optional implementation manner, after receiving the feedback from the host, the main control module and the NB communication module may enter a sleep state. Specifically, as shown in FIG. 2, the networking method may include step S150 performed after step S140.
在步骤S150中,向电源管理模块发出休眠控制信号,以通过所述电源管理模块控制所述NB通信模块和所述主控模块进入休眠状态。In step S150, a sleep control signal is sent to the power management module, so as to control the NB communication module and the main control module to enter a sleep state through the power management module.
相应地,在接收到所述联网请求之前,所述主控模块、所述NB通信模块都是处于休眠状态的。这就要求接收到所述联网请求之后,将所述主控模块、所述NB通信模块等处于休眠状态的模块激活。因此,如图2所示,所述联网方法还可以包括在步骤S110之前进行的步骤S100和S105。Correspondingly, before receiving the networking request, both the main control module and the NB communication module are in a dormant state. This requires that modules that are in a dormant state, such as the main control module and the NB communication module, be activated after the networking request is received. Therefore, as shown in FIG. 2, the networking method may further include steps S100 and S105 performed before step S110.
在步骤S100中,接收所述联网请求。In step S100, the networking request is received.
在步骤S105中,响应于所述联网请求,向所述电源管理模块发送供电信号,以使得所述电源管理模块向当前主控模块供电以结束当前主控模块的休眠状态。In step S105, in response to the networking request, a power supply signal is sent to the power management module, so that the power management module supplies power to the current main control module to end the sleep state of the current main control module.
进一步地,在步骤S105中,也可以通过电源管理模块向处于休眠状态的NB通信模块供电,以结束NB通信模块的休眠状态。Further, in step S105, power can also be supplied to the NB communication module in the dormant state through the power management module to end the dormant state of the NB communication module.
为了进一步保证主机的安全性,作为一种可选实施方式,主机可以设置每个接入该主机的从机设备的联网时长。当接入所述主机的从机设备超过主机的联网时长后,主机会断开与从机设备的连接。In order to further ensure the security of the host, as an optional implementation manner, the host may set the networking duration of each slave device that accesses the host. When the slave device connected to the host exceeds the networking duration of the host, the host will disconnect from the slave device.
换言之,在本公开中,只有在接收到联网请求后、并执行所述联网方法时,需要将主控模块以及NB通信模块激活,而在其他时间段,主控模块以及NB通信模块均处于休眠状态中,可以降低包括所述主控模块的联网设备的能耗。In other words, in the present disclosure, the main control module and the NB communication module need to be activated only after the networking request is received and the networking method is executed, while in other time periods, the main control module and the NB communication module are both dormant In the state, the energy consumption of the networked device including the main control module can be reduced.
作为本公开的另一个方面,提供一种联网方法,该联网方法可以由上文中所述的待接入设备(即,从机设备)所执行。如图3所示,所述联网方法包括步骤S210。As another aspect of the present disclosure, a networking method is provided, and the networking method can be performed by the device to be accessed (ie, the slave device) described above. As shown in FIG. 3 , the networking method includes step S210.
在步骤S210中,当第一NFC模块被电磁场激发时,通过所述第一NFC模块发送联网请求,其中,所述联网请求携带有当前的待接入设备的身份信息。In step S210, when the first NFC module is excited by the electromagnetic field, a networking request is sent through the first NFC module, wherein the networking request carries the identity information of the current device to be accessed.
本公开第二个方面所提供的联网方法与本公开第一个方面所提供的联网方法配合使用。The networking method provided by the second aspect of the present disclosure is used in conjunction with the networking method provided by the first aspect of the present disclosure.
具体地,所述联网设备具有第二NFC模块,该第二NFC模块提供电磁场。当设置有第一NFC模块的待接入设备进入第二NFC模块提供的电磁场时,第一NFC模块被激活,并将携带有当前待接入设备的身份信息的联网请求发送至所述联网设备。当所述联网设备的主控模块接收到所述联网请求后,执行本公开第一个方面所提供的联网方法。Specifically, the networked device has a second NFC module that provides an electromagnetic field. When the device to be accessed that is provided with the first NFC module enters the electromagnetic field provided by the second NFC module, the first NFC module is activated, and sends a networking request carrying the identity information of the device to be accessed currently to the networking device . After receiving the networking request, the main control module of the networking device executes the networking method provided by the first aspect of the present disclosure.
在本公开中,通过第一NFC模块向联网设备发送身份信息,无需用户手输,可以实现无感联网。In the present disclosure, the identity information is sent to the networked device through the first NFC module, without the user's manual input, and sensorless networking can be realized.
作为本公开的第三个方面,提供一种联网设备,如图4所示,所述联网设备包括第一存储模块310、第一主控模块320、第二NFC模块330和NB通信模块340。As a third aspect of the present disclosure, a networking device is provided. As shown in FIG. 4 , the networking device includes a first storage module 310 , a first main control module 320 , a second NFC module 330 and an NB communication module 340 .
第一存储模块310上存储有第一可执行程序,第一主控模块320能够执行所述第一可执行程序,以实现本公开第一个方面所提供的联网方法,第二NFC模块330能够提供电磁场,NB通信模块340,用于与主机通信。The first storage module 310 stores a first executable program, the first main control module 320 can execute the first executable program to implement the networking method provided by the first aspect of the present disclosure, and the second NFC module 330 can An electromagnetic field is provided, the NB communication module 340, for communication with the host.
具体地,NB通信模块340用于将第一主控模块320生成的联网认证请求发送至主机,并将主机下发的数据反馈给已经联网的设备。Specifically, the NB communication module 340 is configured to send the networking authentication request generated by the first main control module 320 to the host, and feed back the data sent by the host to the connected device.
所述联网设备的第一主控模块320可以执行本公开第一个方面所提供的联网方法,控制 第二NFC模块330接收到待接入设备的第一NFC模块发出的联网请求,首先根据所述联网请求中携带的身份信息判断待接入设备是否具有联网权限。当待接入设备具有联网权限时,将待接入设备接入主机,实现所述待接入设备联网。当待接入设备不具有联网权限时,将待接入设备的身份信息发送给主机,供主机进行认证。当认证通过时,才将待接入设备接入主机,当未通过认证时,则不将待接入设备接入主机。The first main control module 320 of the networking device can execute the networking method provided by the first aspect of the present disclosure, and control the second NFC module 330 to receive the networking request sent by the first NFC module of the device to be connected, and firstly according to the The identity information carried in the networking request is used to determine whether the device to be accessed has networking authority. When the device to be accessed has the networking authority, the device to be accessed is connected to the host to implement networking of the device to be accessed. When the device to be accessed does not have the networking authority, the identity information of the device to be accessed is sent to the host for authentication by the host. When the authentication is passed, the device to be connected is connected to the host, and when the authentication is not passed, the device to be connected is not connected to the host.
在所述联网设备执行所述联网方法的过程中,不需要待接入设备的使用者手输数据,从而可以实现真正的无感联网,提升了用户体验。In the process of executing the networking method by the networking device, the user of the device to be connected does not need to manually input data, so that true sensorless networking can be realized and user experience is improved.
进一步地,所述联网设备还可以包括电源管理模块350,该电源管理模块350用于向联网设备的第一主控模块320、NB通信模块340供电。具体地,当电源管理模块350接收到第一主控模块320发送的休眠信号时,控制第一主控模块320、以及NB通信模块340进入耗电量低的休眠状态。当电源管理模块350接收到第一主控模块320发送的供电信号时,向第一主控模块320、以及NB通信模块340正常供电,以结束第一主控模块320以及NB通信模块340的休眠状态。Further, the networked device may further include a power management module 350, and the power management module 350 is configured to supply power to the first main control module 320 and the NB communication module 340 of the networked device. Specifically, when the power management module 350 receives the sleep signal sent by the first main control module 320, it controls the first main control module 320 and the NB communication module 340 to enter a sleep state with low power consumption. When the power management module 350 receives the power supply signal sent by the first main control module 320, it supplies power to the first main control module 320 and the NB communication module 340 normally to end the sleep of the first main control module 320 and the NB communication module 340. state.
作为本公开的第四个方面,提供一种电子设备,如图5所示,该电子设备包括第二存储模块410、第二主控模块420、第一NFC模块430。As a fourth aspect of the present disclosure, an electronic device is provided. As shown in FIG. 5 , the electronic device includes a second storage module 410 , a second main control module 420 , and a first NFC module 430 .
第二存储模块410上存储有第二可执行程序,第二主控模块420能够执行所述第二可执行程序,以实现根据本公开第二个方面所提供的联网方法,第一NFC模块430能够在被电磁场激活时,发送携带有当前电子设备的身份信息的联网请求。The second storage module 410 stores a second executable program, and the second main control module 420 can execute the second executable program to implement the networking method provided according to the second aspect of the present disclosure. The first NFC module 430 When activated by an electromagnetic field, it can send a networking request carrying the identity information of the current electronic device.
本公开所提供的电子设备是上文中所提到的待接入设备,由于所述电子设备具有第一NFC模块430,当第一NFC模块430进入上文中所提供的联网设备的第二NFC模块330的电磁场时会被激发,此时第二主控模块420通过第一NFC模块430将携带有所述电子设备的身份信息的联网请求发送至第二NFC模块330。随后可以由所述联网设备执行本公开第一个方面所提供的联网方法,并实现电子设备的无感联网。The electronic device provided by the present disclosure is the device to be connected mentioned above. Since the electronic device has the first NFC module 430, when the first NFC module 430 enters the second NFC module of the networked device provided above When the electromagnetic field of the electronic device 330 is excited, the second main control module 420 sends the networking request carrying the identity information of the electronic device to the second NFC module 330 through the first NFC module 430 . Subsequently, the networking method provided by the first aspect of the present disclosure can be executed by the networking device, and the sensorless networking of the electronic device can be realized.
在本公开中,所述电子设备在联网时用作从机设备。所述电子设备可以是手机、平板电脑等终端设备,也可以是其他具有联网需求的电子设备。In the present disclosure, the electronic device acts as a slave device when networked. The electronic device may be a terminal device such as a mobile phone and a tablet computer, or may be other electronic devices with networking requirements.
下面简单介绍本公开所提供的电子设备利用本公开所提供的联网设备接入主机进行联网的流程实例。The following briefly introduces a flow example of the electronic device provided by the present disclosure using the networking device provided by the present disclosure to access a host for networking.
在本实例中,所述电子设备为手机,所述通信模块为NB通信模块。在所述电子设备未进入所述联网设备的第二NFC模块的电磁场范围内时,所述联网设备的主控模块、NB通信模块均处于休眠状态。In this example, the electronic device is a mobile phone, and the communication module is an NB communication module. When the electronic device does not enter the electromagnetic field range of the second NFC module of the networked device, both the main control module and the NB communication module of the networked device are in a dormant state.
所述联网设备的第一主控模块使用IMEI号码设置所述联网白名单。The first main control module of the networking device uses the IMEI number to set the networking whitelist.
利用所述联网设备扫描待接入的手机,以获取待接入的手机的联网请求。手机通过第一NFC模块发出的联网请求中携带有该手机的IMEI号码。The mobile phone to be accessed is scanned by the networking device to obtain the networking request of the mobile phone to be accessed. The networking request sent by the mobile phone through the first NFC module carries the IMEI number of the mobile phone.
所述联网设备根据手机的IMEI号码判断该手机是否在所述联网白名单中,当所述手机在所述联网白名单中时,判定所述手机具有联网权限,在无需进一步认证的情况下,所述联网设备将所述手机接入主机,实现所述手机无感接入WIFI网络。此时,主机向所述手机推送的信息未白名单机组的信息。The networking device determines whether the cell phone is in the networking white list according to the IMEI number of the cell phone, and when the cell phone is in the networking white list, it is determined that the cell phone has networking authority, and in the case of no further authentication, The networking device connects the mobile phone to the host, so that the mobile phone can be connected to the WIFI network without inductance. At this time, the information pushed by the host to the mobile phone is not the information of the whitelisted group.
当所述手机不在所述联网白名单中时,所述联网设备判断该联网设备与所述主机是否在同一局域网中。当所述联网设备与所述主机在同一局域网中时,所述联网设备利用NB通信 模块通过局域网将携带有手机身份信息的联网认证请求发送至所述主机;当所述联网设备与所述主机不在同一局域网中时,所述联网设备利用NB通信模块通过WIFI网络将携带有手机身份信息的联网认证请求发送至所述主机。When the mobile phone is not in the networking whitelist, the networking device determines whether the networking device and the host are in the same local area network. When the networking device and the host are in the same local area network, the networking device uses the NB communication module to send the networking authentication request carrying the mobile phone identity information to the host through the local area network; when the networking device and the host When not in the same local area network, the networking device uses the NB communication module to send the networking authentication request carrying the identity information of the mobile phone to the host through the WIFI network.
当所述联网设备与所述主机在同一局域网中时,联网设备利用NB通信模块通过局域网将所述联网认证请求发送至所述主机;当所述联网设备与所述主机不在同一局域网中时,所述联网设备利用NB通信模块通过WIFI网络将所联网认证请求发送至所述主机。When the networking device and the host are in the same local area network, the networking device uses the NB communication module to send the networking authentication request to the host through the local area network; when the networking device and the host are not in the same local area network, The networked device uses the NB communication module to send the connected authentication request to the host through the WIFI network.
主机根据所述联网认证请求中的身份信息对所述手机进行认证,并将认证结果反馈给NB通信模块。The host authenticates the mobile phone according to the identity information in the online authentication request, and feeds back the authentication result to the NB communication module.
所述联网设备通过NB通信模块接收到主机发送的反馈信息,并根据反馈信息判断是否允许所述手机接入所述主机。The networked device receives the feedback information sent by the host through the NB communication module, and judges whether to allow the mobile phone to access the host according to the feedback information.
完成上述认证流程后,联网设备向电源控制模块发送休眠控制信号,以使得第一主控模块、以及NB通信模块进入低功耗的休眠状态。After completing the above authentication process, the networked device sends a sleep control signal to the power control module, so that the first main control module and the NB communication module enter a sleep state with low power consumption.
尽管本实施例中以NB通信模块作为通信模块的实例,但是,本公开不限于此,通信模块也可以是采用LTE、5G等通信方式的模块。作为本公开的第五个方面,提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时实现根据本公开第一个方面所提供公开的联网方法,或,根据本公开第二个方面所提供的联网方法。Although the NB communication module is used as an example of the communication module in this embodiment, the present disclosure is not limited to this, and the communication module may also be a module using communication methods such as LTE and 5G. As a fifth aspect of the present disclosure, a computer-readable storage medium is provided, and the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, realizes the disclosure provided according to the first aspect of the present disclosure The networking method, or, the networking method provided according to the second aspect of the present disclosure.
本领域普通技术人员可以理解,上文中所公开方法中的全部或某些步骤、系统、装置中的功能模块/单元可以被实施为软件、固件、硬件及其适当的组合。在硬件实施方式中,在以上描述中提及的功能模块/单元之间的划分不一定对应于物理组件的划分;例如,一个物理组件可以具有多个功能,或者一个功能或步骤可以由若干物理组件合作执行。某些物理组件或所有物理组件可以被实施为由处理器,如中央处理器、数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读存储介质上,计算机可读存储介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其它数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于RAM、ROM、EEPROM、闪存或其它存储器技术、CD-ROM、数字多功能盘(DVD)或其它光盘存储、磁盒、磁带、磁盘存储或其它磁存储装置、或者可以用于存储期望的信息并且可以被计算机访问的任何其它的介质。此外,本领域普通技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其它传输机制之类的调制数据信号中的其它数据,并且可包括任何信息递送介质。Those of ordinary skill in the art can understand that all or some of the steps in the methods disclosed above, functional modules/units in the systems, and devices can be implemented as software, firmware, hardware, and appropriate combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be composed of several physical components Components execute cooperatively. Some or all physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit . Such software may be distributed on computer-readable storage media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). As known to those of ordinary skill in the art, the term computer storage media includes both volatile and nonvolatile implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules or other data flexible, removable and non-removable media. Computer storage media include, but are not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cartridges, magnetic tape, magnetic disk storage or other magnetic storage devices, or may Any other medium used to store desired information and that can be accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism, and can include any information delivery media, as is well known to those of ordinary skill in the art .
本文已经公开了示例实施例,并且虽然采用了具体术语,但它们仅用于并仅应当被解释为一般说明性含义,并且不用于限制的目的。在一些实例中,对本领域技术人员显而易见的是,除非另外明确指出,否则可单独使用与特定实施例相结合描述的特征、特性和/或元素,或可与其它实施例相结合描述的特征、特性和/或元件组合使用。因此,本领域技术人员将理解,在不脱离由所附的权利要求阐明的本公开的范围的情况下,可进行各种形式和细节上的改变。Example embodiments have been disclosed herein, and although specific terms are employed, they are used and should only be construed in a general descriptive sense and not for purposes of limitation. In some instances, it will be apparent to those skilled in the art that features, characteristics and/or elements described in connection with a particular embodiment may be used alone or in combination with other embodiments, unless expressly stated otherwise. Features and/or elements are used in combination. Accordingly, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the scope of the present disclosure as set forth in the appended claims.

Claims (12)

  1. 一种联网方法,包括:A method of networking that includes:
    根据待接入设备通过第一近场通信NFC模块发出的联网请求判断所述待接入设备是否具有联网权限,其中,所述联网请求携带有所述待接入设备的身份信息;According to the networking request sent by the device to be accessed through the first near field communication NFC module, determine whether the device to be accessed has the networking authority, wherein the networking request carries the identity information of the device to be accessed;
    当判定所述待接入设备具有所述联网权限时,将所述待接入设备接入主机并联网;并且When it is determined that the device to be accessed has the networking authority, the device to be accessed is connected to the host and connected to the network; and
    当判定所述待接入设备不具有所述联网权限时,向所述主机发送联网认证请求,所述联网认证请求携带有所述待接入设备的身份信息。When it is determined that the device to be accessed does not have the networking authority, a networking authentication request is sent to the host, where the networking authentication request carries the identity information of the device to be accessed.
  2. 根据权利要求1所述的联网方法,其中,判断所述待接入设备是否具有联网权限的步骤包括:根据所述待接入设备的身份信息判断所述待接入设备是否在联网白名单中,其中,The method for networking according to claim 1, wherein the step of judging whether the device to be accessed has networking authority comprises: judging whether the device to be accessed is in a networking whitelist according to identity information of the device to be accessed ,in,
    当所述待接入设备在所述联网白名单中时,判定所述待接入设备具有所述联网权限;并且When the device to be accessed is in the networking whitelist, it is determined that the device to be accessed has the networking permission; and
    当所述待接入设备不在所述联网白名单中时,判定所述待接入设备不具有所述联网权限。When the device to be accessed is not in the networking whitelist, it is determined that the device to be accessed does not have the networking permission.
  3. 根据权利要求2所述的联网方法,其中,所述待接入设备的身份信息包括所述待接入设备的国际移动设备识别号IMEI。The networking method according to claim 2, wherein the identity information of the device to be accessed includes an International Mobile Equipment Identity (IMEI) of the device to be accessed.
  4. 根据权利要求1所述的联网方法,其中,在根据待接入设备通过第一近场通信NFC模块发出的联网请求判断所述待接入设备是否具有联网权限的步骤之前,所述联网方法还包括:The networking method according to claim 1, wherein, before the step of judging whether the device to be accessed has networking authority according to a networking request sent by the device to be accessed through the first near field communication NFC module, the networking method further comprises: include:
    接收所述联网请求;以及receiving the networking request; and
    响应于所述联网请求,向电源管理模块发送供电信号,以使得所述电源管理模块向当前主控模块供电以结束当前主控模块的休眠状态。In response to the networking request, a power supply signal is sent to the power management module, so that the power management module supplies power to the current main control module to end the sleep state of the current main control module.
  5. 根据权利要求1至4中任意一项所述的联网方法,其中,向所述主机发送联网认证请求的步骤包括:The networking method according to any one of claims 1 to 4, wherein the step of sending a networking authentication request to the host comprises:
    判断所述主机是否在局域网内;Determine whether the host is in the local area network;
    当判定所述主机在所述局域网内时,通过所述局域网向所述主机发送所述联网认证请求;并且When it is determined that the host is in the local area network, the network authentication request is sent to the host through the local area network; and
    当判定所述主机不在所述局域网内时,通过WIFI网络向所述主机发送所述联网认证请求。When it is determined that the host is not in the local area network, the network authentication request is sent to the host through the WIFI network.
  6. 根据权利要求1至4中任意一项所述的联网方法,还包括:The networking method according to any one of claims 1 to 4, further comprising:
    响应于所述主机返回的允许联网指令,将所述待接入设备接入所述主机并联网。In response to an instruction of allowing networking returned by the host, the device to be connected is connected to the host and connected to the network.
  7. 根据权利要求6所述的联网方法,其中,在向所述主机发送联网认证请求的步骤中,通过本地的通信模块将所述联网认证请求发送至所述主机,并且The networking method according to claim 6, wherein, in the step of sending the networking authentication request to the host, the networking authentication request is sent to the host through a local communication module, and
    在将所述待接入设备接入所述主机并联网的步骤之后,所述联网方法还包括:After the step of connecting the device to be connected to the host and networking, the networking method further includes:
    向电池管理模块发出休眠指令,以使得所述电池管理模块控制所述通信模块、以及当前主控模块进入休眠状态。A sleep instruction is sent to the battery management module, so that the battery management module controls the communication module and the current main control module to enter a sleep state.
  8. 根据权利要求7所述的联网方法,其中,所述通信模块选自由NB通信模块、长期演进LTE通信模块和5G通信模块构成的组。The networking method according to claim 7, wherein the communication module is selected from the group consisting of an NB communication module, a Long Term Evolution (LTE) communication module and a 5G communication module.
  9. 一种联网方法,包括:A method of networking that includes:
    当第一NFC模块被电磁场激活时,通过所述第一NFC模块发送联网请求,其中,所述联网请求携带有当前的待接入设备的身份信息。When the first NFC module is activated by the electromagnetic field, a networking request is sent through the first NFC module, wherein the networking request carries the current identity information of the device to be accessed.
  10. 一种联网设备,所述联网设备包括:A networked device comprising:
    第一存储模块,所述第一存储模块上存储有第一可执行程序;a first storage module, on which a first executable program is stored;
    第一主控模块,所述第一主控模块能够执行所述第一可执行程序,以实现根据权利要求1至8中任意一项所述的联网方法;a first main control module, the first main control module can execute the first executable program to realize the networking method according to any one of claims 1 to 8;
    第二NFC模块,所述第二NFC模块用于提供电磁场;以及a second NFC module for providing an electromagnetic field; and
    通信模块,所述通信模块用于与主机通信。A communication module, the communication module is used for communication with the host.
  11. 一种电子设备,包括:An electronic device comprising:
    第二存储模块,所述第二存储模块上存储有第二可执行程序;a second storage module, on which a second executable program is stored;
    第二主控模块,所述第二主控模块能够执行所述第二可执行程序,以实现根据权利要求8所述的联网方法;以及a second main control module capable of executing the second executable program to implement the networking method according to claim 8; and
    第一NFC模块,所述第一NFC模块能够在被电磁场激活时,发送携带有当前电子设备的身份信息的联网请求。A first NFC module, the first NFC module can send a networking request carrying the identity information of the current electronic device when activated by an electromagnetic field.
  12. 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时实现根据权利要求1至8中任一项所述的联网方法,或,根据权利要求9所述的联网方法。A computer-readable storage medium storing a computer program, when the computer program is executed by a processor, the networking method according to any one of claims 1 to 8 is implemented, or, according to the claim The networking method described in claim 9.
PCT/CN2021/129443 2020-11-10 2021-11-09 Networking method, networking device, electronic device, and storage medium WO2022100559A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011245325.8A CN114554462A (en) 2020-11-10 2020-11-10 Networking method, networking device, electronic device and storage medium
CN202011245325.8 2020-11-10

Publications (1)

Publication Number Publication Date
WO2022100559A1 true WO2022100559A1 (en) 2022-05-19

Family

ID=81600759

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/129443 WO2022100559A1 (en) 2020-11-10 2021-11-09 Networking method, networking device, electronic device, and storage medium

Country Status (2)

Country Link
CN (1) CN114554462A (en)
WO (1) WO2022100559A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115314448A (en) * 2022-08-11 2022-11-08 北京百度网讯科技有限公司 Method and device for accessing cloud network, electronic equipment and computer medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014215802A (en) * 2013-04-25 2014-11-17 ビッグローブ株式会社 Mobile network connection system, and mobile network connection method
CN104159275A (en) * 2014-07-17 2014-11-19 小米科技有限责任公司 Network connection method and device
CN105813080A (en) * 2014-12-31 2016-07-27 阿里巴巴集团控股有限公司 Method and device for controlling access of equipment to network
CN108810858A (en) * 2018-05-08 2018-11-13 郑州易通众联电子科技有限公司 A method of the quick obtaining wireless router access authority based on NFC

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014215802A (en) * 2013-04-25 2014-11-17 ビッグローブ株式会社 Mobile network connection system, and mobile network connection method
CN104159275A (en) * 2014-07-17 2014-11-19 小米科技有限责任公司 Network connection method and device
CN105813080A (en) * 2014-12-31 2016-07-27 阿里巴巴集团控股有限公司 Method and device for controlling access of equipment to network
CN108810858A (en) * 2018-05-08 2018-11-13 郑州易通众联电子科技有限公司 A method of the quick obtaining wireless router access authority based on NFC

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115314448A (en) * 2022-08-11 2022-11-08 北京百度网讯科技有限公司 Method and device for accessing cloud network, electronic equipment and computer medium
CN115314448B (en) * 2022-08-11 2023-12-05 北京百度网讯科技有限公司 Method and device for accessing cloud network, electronic equipment and computer medium

Also Published As

Publication number Publication date
CN114554462A (en) 2022-05-27

Similar Documents

Publication Publication Date Title
US11729594B2 (en) Network access method, device, and system
US9763094B2 (en) Methods, devices and systems for dynamic network access administration
EP3151628B1 (en) Method, device and system for accessing a wireless network
US9936390B2 (en) Method and apparatus of triggering applications in a wireless environment
US9705883B2 (en) Communications terminal and system and rights management method
CN112566050B (en) Cellular service account transfer for an accessory wireless device
US7903646B2 (en) Wireless communication system allowing group identification information to be publicly available and to be hidden, wireless access point device, and communication method and program for wireless access point device
EP4068694A1 (en) Method for managing smart device, mobile terminal, and communication system
WO2018090830A1 (en) Method and apparatus allowing smart terminal device to access internet
US9055393B2 (en) Near field communication data transfer
WO2016169184A1 (en) Virtual sim card management method and system
US9019878B2 (en) Phone supporting mode conversion
US9337899B2 (en) Methods and apparatus for secure updates to persistent data in a near field communication controller
US20110153855A1 (en) Method of defending against battery exhaustion attack and wireless communication device and recording medium using the method
US11246174B2 (en) Methods and systems for connecting a wireless device to a wireless network
WO2022100559A1 (en) Networking method, networking device, electronic device, and storage medium
US20120002570A1 (en) Coordinating and Establishing Communication Networks Between Communication Devices
US20070162980A1 (en) SYSTEM AND METHOD FOR PROVIDING CONTENT SECURITY IN UPnP SYSTEMS
WO2019161939A1 (en) Methods, devices, and computer programs for provisioning or controlling operator profiles in terminals
CN113973301B (en) Autonomous device authentication for private network access
WO2020048317A1 (en) Device-to-device service restriction method and storage medium
US20070220129A1 (en) Method of granting control of device and device using the method
US11178145B2 (en) Network apparatus and control method thereof
US20230328517A1 (en) Electronic device supporting profile transfer between electronic devices and operating method thereof
WO2022257876A1 (en) Key material processing method, acquisition method, information transmission method, and device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21891084

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 04.10.23)