WO2023001082A1 - 一种配网方法及装置 - Google Patents
一种配网方法及装置 Download PDFInfo
- Publication number
- WO2023001082A1 WO2023001082A1 PCT/CN2022/106098 CN2022106098W WO2023001082A1 WO 2023001082 A1 WO2023001082 A1 WO 2023001082A1 CN 2022106098 W CN2022106098 W CN 2022106098W WO 2023001082 A1 WO2023001082 A1 WO 2023001082A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- electronic device
- network
- information
- router
- wireless access
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 268
- 238000013475 authorization Methods 0.000 claims abstract description 299
- 230000004044 response Effects 0.000 claims description 36
- 230000015654 memory Effects 0.000 claims description 34
- 238000004590 computer program Methods 0.000 claims description 18
- 230000008569 process Effects 0.000 abstract description 90
- 238000012795 verification Methods 0.000 description 145
- 230000006854 communication Effects 0.000 description 33
- 238000004891 communication Methods 0.000 description 30
- 238000012545 processing Methods 0.000 description 26
- 230000005540 biological transmission Effects 0.000 description 23
- 238000004422 calculation algorithm Methods 0.000 description 22
- 238000010586 diagram Methods 0.000 description 12
- 238000012790 confirmation Methods 0.000 description 10
- 238000012546 transfer Methods 0.000 description 10
- 238000004458 analytical method Methods 0.000 description 9
- 238000003825 pressing Methods 0.000 description 8
- 238000007689 inspection Methods 0.000 description 5
- 230000004397 blinking Effects 0.000 description 4
- 230000010267 cellular communication Effects 0.000 description 4
- 238000011161 development Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 230000006855 networking Effects 0.000 description 4
- 229920001621 AMOLED Polymers 0.000 description 3
- 238000013473 artificial intelligence Methods 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000010295 mobile communication Methods 0.000 description 3
- 238000006243 chemical reaction Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000002238 attenuated effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000007667 floating Methods 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000035515 penetration Effects 0.000 description 1
- 239000002096 quantum dot Substances 0.000 description 1
- 239000000523 sample Substances 0.000 description 1
- 238000013515 script Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/12—Arrangements for remote connection or disconnection of substations or of equipment thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
Definitions
- the present application relates to the technical field of communications, and in particular to a network distribution method and device.
- Smart home devices may be, for example, smart cameras, smart speakers, smart plugs, and the like. Usually these devices need to be connected to the Wi-Fi at home to work properly.
- the smart home devices listed above are inconvenient for users to directly input distribution network information (such as the name and password of the router).
- users can use electronic devices such as mobile phones and tablet computers to perform network distribution for the above-mentioned electronic devices that are not convenient for users to directly input distribution network information.
- various manufacturers have also implemented various simple network distribution methods. These distribution network methods have some security loopholes, which have brought great challenges to users' information security. Therefore, how to realize safe and convenient distribution network is an urgent problem to be solved.
- the embodiment of the present application provides a network distribution method and device, which improves the security when the wireless access device is used for network distribution of electronic equipment, and reduces manual intervention in the network distribution process (for example, the user does not need to manually input the wireless access device The name and password of the wireless LAN where it is located), which improves the user experience.
- the embodiment of the present application provides a network distribution method, which can be applied to a network distribution system including a first electronic device, a wireless access device, and a server.
- the method includes: the first electronic device accesses the wireless Access the device's unauthenticated network.
- the wireless access device sends a first request message to the server.
- the server After receiving the first request message, the server generates a first authorization code, where the first authorization code is different from an authorization code generated by the server after receiving a request message from another electronic device sent by the wireless access device.
- the wireless access device and the first electronic device obtain a first authorization code, and negotiate to obtain a first key based on the first authorization code.
- the wireless access device encrypts network distribution information of the wireless local area network where the wireless access device is located based on the first key, obtains encrypted network distribution information, and sends the encrypted network distribution information to the first electronic device.
- the first electronic device receives the encrypted network distribution information, decrypts the encrypted network distribution information based on the first key, obtains the network distribution information, and connects to the wireless local area network where the wireless access device is located based on the network distribution information.
- the first authorization code is randomly generated by the server in response to request messages from different electronic devices, wherein the authorization code may be randomly generated by the server according to a preset random number generation algorithm; in some implementations, it is also possible for the server to generate the same authorization code for different electronic devices.
- the server may also generate the first authorization code and the second authorization code, the server sends the first authorization code and the second authorization code to the wireless access device, and the wireless access device saves the first authorization code to Locally, the wireless access device sends the second authorization code to the first electronic device. Afterwards, the wireless access device negotiates with the first electronic device to obtain the first key based on the first authorization code and the second authorization code. When the first authorization code is the same as the second authorization code, the wireless access device and the first electronic device negotiate to obtain the first key based on the same authorization code. When the first authorization code is different from the second authorization code, the wireless access device and the first electronic device negotiate to obtain the first key based on different authorization codes.
- the first electronic device can be any of the following: smart lights, smart ovens, smart fans, smart air conditioners, smart TVs, smart big screens, smart bracelets, smart watches, smart speakers, smart refrigerators, smart doors and windows, smart cars, Smart monitors, smart robots, smart cameras, etc.
- the network distribution method does not require the user to input the name and password of the wireless local area network where the wireless access device is located, and the operation is simple.
- the wireless access device is always in the AP mode. In this way, ongoing services of other devices connected to the wireless access device will not be affected.
- the server generates different authorization codes for different electronic devices, which ensures that the high-density channels used by each electronic device are not the same. ) transfer security, ensuring the security of the distribution network process.
- the method further includes: the first electronic device sends the first authorization code to the server through the wireless access device The first authentication information locally stored on the device; the server receives the first authentication information, and determines that the first electronic device is a legitimate device according to the first authentication information.
- the server judges that the first authentication information satisfies the first condition, it determines that the first electronic device is a legitimate device.
- the first authentication information includes first registration information.
- the server After the server receives the first request information and before the server receives the first authentication information sent by the wireless access device, the server generates the first registration information (such as a registration code), and saves the first registration information locally to obtain the second registration information information.
- the server sends the first registration information to the first electronic device through the wireless access device. After receiving the first registration information, the first electronic device saves the first registration information locally.
- the first condition includes: the first registration information in the first authentication information is the same as the second registration information of the first electronic device locally stored by the server. That is, when the server confirms that the first registration information sent by the first electronic device through the wireless access device is the registration information of the first electronic device previously sent by the server through the wireless access device, the server can preliminarily determine that the electronic device is a legitimate device.
- the first authentication information includes first registration information and first verification information.
- the first inspection information may be any one of a digital certificate or a KPI certificate.
- the first condition includes: the first registration information in the first authentication information is the same as the second registration information of the first electronic device locally stored by the server. And the first verification information is legal verification information.
- the server before the server determines that the first verification information is valid verification information, the server generates a first random number and sends the first random number to the first electronic device through the wireless access device. After receiving the first random number, the first electronic device encrypts the first random number according to the first private key to obtain the encrypted first random number. The first electronic device sends the encrypted first random number to the server through the wireless access device. After receiving the encrypted first random number, the server decrypts the encrypted first random number according to the first public key preset in the first verification information, and after obtaining the first random number, the server determines that the first verification information is Valid verification information.
- the server After the server determines that the first electronic device is a legitimate device through the first registration information, the server further verifies the legitimacy of the first electronic device according to the verification information. In this way, the security of subsequent transmission of distribution network information can be improved.
- the server will generate the first authorization code for the first electronic device to negotiate with the wireless access device to obtain the first key and transfer the distribution network information.
- the server determines that the first electronic device is not a legitimate device through the first authentication information, then the server will not generate the first authorization code, and the first electronic device cannot obtain network distribution information, and the first electronic device cannot join the wireless access device In this way, the security in the process of network distribution is guaranteed.
- the method further includes: the first electronic device based on the local The saved preset parameters and the wireless access device negotiate to obtain a second key based on the locally saved preset parameters; the first electronic device sends the first authentication information locally stored by the first electronic device to the server through the wireless access device, specifically including : The first electronic device encrypts the first authentication information based on the second key to obtain the encrypted first authentication information; the first electronic device sends the encrypted first authentication information to the wireless access device; the wireless access device receives the encrypted After obtaining the first authentication information, the encrypted first authentication information is decrypted based on the second key to obtain the first authentication information; the wireless access device sends the first authentication information to the server.
- the wireless access device before the wireless access device sends the first registration information to the first electronic device, the wireless access device encrypts the first registration information with a second key to obtain encrypted first registration information. The wireless access device sends the encrypted first registration information to the first electronic device. In this way, the security of information transmission between the first electronic device and the wireless access device can be guaranteed.
- the first electronic device before the first electronic device initiates a registration request to the server (or before the first electronic device sends the first authentication information to the server through the wireless access device), if the first electronic device and the wireless access device can pass the local After the stored preset parameters are negotiated to obtain the second key, the first electronic device can be considered as a preliminary legal device, and the first electronic device can initiate a registration request to the server through the wireless access device.
- the first electronic device that initiates a registration request to the server is a preliminary legal electronic device, that is, the first electronic device stores preset parameters.
- the information transmitted between the first electronic device and the wireless access device is transmitted after being encrypted by the second key, which can ensure the security of information transmission between the first electronic device and the wireless access device.
- the first authorization code includes m authorization codes, where m is a positive integer greater than or equal to 1; the wireless access device and the first electronic device negotiate to obtain the first authorization code based on the first authorization code.
- a key specifically including: the wireless access device negotiates with the first electronic device based on x authorization codes in the first authorization code and obtains the first key based on y authorization codes in the first authorization code; wherein, x is greater than or equal to 1 is less than or equal to m, and y is greater than or equal to 1 and less than or equal to m.
- the server sends the first authorization code to the wireless access device
- the wireless access device stores the first authorization code locally
- the wireless access device also needs to send the first authorization code to the first electronic device.
- the wireless access device and the first electronic device may select part or all of the authorization codes from the first authorization codes and negotiate to obtain the first key.
- the x authorization codes in the first authorization code are the same as the y authorization codes in the first authorization code, then the wireless access device and the first electronic device negotiate to obtain the first key based on the same authorization code .
- the x authorization codes in the first authorization code are different from the y authorization codes in the first authorization code, and the wireless access device and the first electronic device negotiate to obtain the first password based on different authorization codes. key.
- the method further includes: the wireless access device sends the non-authentication network access information of the wireless access device; the first electronic device accessing the non-authentication network of the wireless access device specifically includes: the first electronic device receives the access information, and accesses the non-authentication network of the wireless access device based on the access information.
- the first user operation group may be the pressing operation of the network configuration key of the wireless access device, and the access information of the non-authenticated network may include the identifier of the non-authenticated network and the physical address of the wireless access device. Only after the wireless access device receives the operation of the first user (that is, is authorized by the user), the wireless access device will send the access information of the non-authenticated network of the wireless access device.
- the wireless access device continuously sends the access information of the non-authenticated network in response to the first user operation.
- the third electronic device accesses the non-authentication network of the wireless access device.
- the wireless access device sends a second request message to the server.
- the server After receiving the second request message, the server generates a second authorization code, where the second authorization code is different from the authorization code generated by the server after receiving the request message of other electronic devices sent by the wireless access device.
- the wireless access device and the third electronic device obtain the second authorization code, and negotiate to obtain the second key based on the second authorization code.
- the wireless access device encrypts network distribution information of the wireless local area network where the wireless access device is located based on the second key, obtains encrypted network distribution information, and sends the encrypted network distribution information to the third electronic device.
- the third electronic device receives the encrypted distribution network information, decrypts the encrypted distribution network information based on the second key, obtains the distribution network information, and connects to the wireless local area network where the wireless access device is located based on the distribution network information. In this way, the wireless access device only needs to receive one user operation, and continuously sends the access information of the non-authenticated network. Before the wireless access device stops sending the access information of the non-authenticated network, one or more electronic devices may be connected to the non-authenticated network of the wireless access device, then the wireless access device may adopt the same configuration as the first electronic device.
- the network process completes the network distribution process with one or more other electronic devices (for example, the third electronic device).
- the wireless access device only needs to receive one user operation to complete the network distribution process with multiple electronic devices, compared with the current wireless access device that receives one user operation and can only complete the network distribution process with one electronic device , improving the distribution network efficiency of electronic equipment.
- the wireless access device after the wireless access device completes the network configuration process with the third electronic device, after the wireless access device determines that the number of electronic devices connected to the non-authentication network of the wireless access device is 0, the wireless access device The ingress device stops sending the access information of the non-authenticated network.
- the wireless access device determines that the number of electronic devices connected to the non-authenticated network of the wireless access device is 0 and waits for a period of time. During this period, the wireless access device still continuously sends the access information of the non-authentication network. If no other electronic device is connected to the non-authentication network of the wireless access device, the wireless access device stops sending the non-authentication Network access information.
- the network distribution system further includes a second electronic device, and before the server generates the first authorization code, the method further includes: the second electronic device receives an operation by the second user, and the second user The operation is used to instruct the wireless access device to send the access information of the non-authenticated network.
- the operation of the second user is used to control the wireless access device to send the access information of the non-authenticated network.
- the wireless access device displays prompt information on the application program on the mobile phone of the second electronic device that has been connected to the network through the server, so that the user can view
- the prompt information is used to prompt the user to input a second user operation on the network configuration interface on the application program, so that the wireless access device sends the access information of the non-authenticated network. That is to say, the user may not press the network allocation key on the wireless access device (that is, the first user operates), and the wireless access device may also send the access information of the non-authenticated network. It can ensure that when it is inconvenient for the user to press the network allocation key of the wireless access device, the user can control the wireless access device to send access information of the non-authenticated network on the application program.
- the second user operation may also be controlling the server to send the first authorization code to the wireless access device and the first electronic device.
- the server displays prompt information on the application program on the mobile phone of the second electronic device, so that the user can see the prompt information.
- the prompt information is used to prompt the user to input a second user operation on the network configuration interface of the application program, so that the server sends the first authorization code to the wireless access device and the first electronic device.
- the number of the first electronic device is one or more
- the method further includes: the second electronic device displays the first A user interface, the first user interface includes one or more device identifiers corresponding to one or more first electronic devices; after the second electronic device receives the user's second user operation, the method further includes: the second electronic device displays the first Two user interfaces, the second user interface includes one or more status identifiers corresponding to one or more first electronic devices, and the one or more status identifiers are used to indicate that one or more first electronic devices have completed network distribution, or, One or more first electronic devices are connected to the network.
- the second user interface may further include information such as one or more device identifiers corresponding to the one or more first electronic devices.
- the server After the server verifies that the first electronic device is a legitimate device, the server associates the first electronic device with the wireless access device with the same account. In this way, the user can check the networking status of the second electronic device on the application program of the second electronic device, and the networking status includes but not limited to online, offline, in network distribution, network distribution failure and so on.
- the method before the first electronic device accesses the non-authentication network of the wireless access device, the method further includes: the first electronic device broadcasts the network configuration information element of the first electronic device, Wherein, the distribution network information element is used to enable other electronic devices to discover the first electronic device that is in the state of waiting for network distribution.
- the distribution network information element of the first electronic device includes one or more of the following: an identifier of the first electronic device, whether the first electronic device supports interconnection capabilities, a physical address of the first electronic device, and the like.
- the network configuration information includes a name and a password of the wireless local area network where the wireless access device is located.
- the embodiment of the present application provides a network distribution method applied to the first electronic device, the method includes: accessing the non-authentication network of the wireless access device; obtaining the first authorization code, the first authorization code is provided by the server Generated, wherein the first authorization code is different from the authorization codes received by other electronic devices accessing the non-authentication network of the wireless access device; based on the first authorization code, negotiate with the wireless access device to determine the first key; receive The encrypted network distribution information sent by the wireless access device is decrypted based on the first key to obtain the network distribution information; based on the network distribution information, the wireless local area network where the wireless access device is located is connected.
- the first authorization code is randomly generated by the server in response to request messages from different electronic devices, wherein the authorization code may be randomly generated by the server according to a preset random number generation algorithm; in some implementations, it is also possible for the server to generate the same authorization code for different electronic devices.
- the server may also generate the first authorization code and the second authorization code, the server sends the first authorization code and the second authorization code to the wireless access device, and the wireless access device saves the first authorization code to Locally, the wireless access device sends the second authorization code to the first electronic device. Afterwards, the wireless access device negotiates with the first electronic device to obtain the first key based on the first authorization code and the second authorization code. When the first authorization code is the same as the second authorization code, the wireless access device and the first electronic device negotiate to obtain the first key based on the same authorization code. When the first authorization code is different from the second authorization code, the wireless access device and the first electronic device negotiate to obtain the first key based on different authorization codes.
- the first electronic device can be any of the following: smart lights, smart ovens, smart fans, smart air conditioners, smart TVs, smart big screens, smart bracelets, smart watches, smart speakers, smart refrigerators, smart doors and windows, smart cars, Smart monitors, smart robots, smart cameras, etc.
- the network distribution method does not require the user to input the name and password of the wireless local area network where the wireless access device is located, and the operation is simple.
- the wireless access device is always in the AP mode. In this way, ongoing services of other devices connected to the wireless access device will not be affected.
- the server generates different authorization codes for different electronic devices, which ensures that the high-density channels used by each electronic device are not the same. ) transfer security, ensuring the security of the distribution network process.
- the method before obtaining the first authorization code, further includes: sending the first authentication information locally stored by the first electronic device to the server through the wireless access device; wherein, the first The authentication information is used by the server to determine that the first electronic device is a legitimate device.
- the server judges that the first authentication information satisfies the first condition, it determines that the first electronic device is a legitimate device.
- the first authentication information includes first registration information.
- the server After the server receives the first request information and before the server receives the first authentication information sent by the wireless access device, the server generates the first registration information (such as a registration code), and saves the first registration information locally to obtain the second registration information information.
- the server sends the first registration information to the first electronic device through the wireless access device. After receiving the first registration information, the first electronic device saves the first registration information locally.
- the first condition includes: the first registration information in the first authentication information is the same as the second registration information of the first electronic device locally stored by the server. That is, when the server confirms that the first registration information sent by the first electronic device through the wireless access device is the registration information of the first electronic device previously sent by the server through the wireless access device, the server can preliminarily determine that the electronic device is a legitimate device.
- the first authentication information includes first registration information and first verification information.
- the first inspection information may be any one of a digital certificate or a KPI certificate.
- the first condition includes: the first registration information in the first authentication information is the same as the second registration information of the first electronic device locally stored by the server. And the first verification information is legal verification information.
- the server before the server determines that the first verification information is valid verification information, the server generates a first random number and sends the first random number to the first electronic device through the wireless access device. After receiving the first random number, the first electronic device encrypts the first random number according to the first private key to obtain the encrypted first random number. The first electronic device sends the encrypted first random number to the server through the wireless access device. After receiving the encrypted first random number, the server decrypts the encrypted first random number according to the first public key preset in the first verification information, and after obtaining the first random number, the server determines that the first verification information is Valid verification information.
- the server After the server determines that the first electronic device is a legitimate device through the first registration information, the server further verifies the legitimacy of the first electronic device according to the verification information. In this way, the security of subsequent transmission of distribution network information can be improved.
- the server will generate the first authorization code for the first electronic device to negotiate with the wireless access device to obtain the first key and transfer the distribution network information.
- the server determines that the first electronic device is not a legitimate device through the first authentication information, then the server will not generate the first authorization code, and the first electronic device cannot obtain network distribution information, and the first electronic device cannot join the wireless access device In this way, the security of the network distribution process is guaranteed.
- the method before sending the first authentication information locally stored by the first electronic device to the server through the wireless access device, the method further includes: based on the locally saved preset parameters and the wireless access The access device negotiates to obtain the second key based on the locally saved preset parameters; the wireless access device sends the first authentication information locally stored by the first electronic device to the server, which specifically includes: based on the second key, the first authentication information stored locally Encrypting the authentication information to obtain encrypted first authentication information; sending the encrypted first authentication information to the wireless access device; where the encrypted first authentication information is used by the wireless access device to encrypt the first authentication information based on the second key After the information is decrypted, the first authentication information is obtained, and the first authentication information is sent to the server.
- the wireless access device before the wireless access device sends the first registration information to the first electronic device, the wireless access device encrypts the first registration information with a second key to obtain encrypted first registration information. The wireless access device sends the encrypted first registration information to the first electronic device. In this way, the security of information transmission between the first electronic device and the wireless access device can be guaranteed.
- the first electronic device before the first electronic device initiates a registration request to the server (or before the first electronic device sends the first authentication information to the server through the wireless access device), if the first electronic device and the wireless access device can pass the local After the stored preset parameters are negotiated to obtain the second key, the first electronic device can be considered as a preliminary legal device, and the first electronic device can initiate a registration request to the server through the wireless access device.
- the first electronic device that initiates a registration request to the server is a preliminary legal electronic device, that is, the first electronic device stores preset parameters.
- the information transmitted between the first electronic device and the wireless access device is transmitted after being encrypted by the second key, which can ensure the security of information transmission between the first electronic device and the wireless access device.
- the first authorization code includes m authorization codes, where m is a positive integer greater than or equal to 1; based on the first authorization code, negotiate with the wireless access device to determine the first key , specifically includes: negotiating with the wireless access device based on x authorization codes in the first authorization code and obtaining the first key based on y authorization codes in the first authorization code; wherein, x is greater than or equal to 1 and less than or equal to m, and y is greater than Equal to 1 and less than or equal to m.
- the server sends the first authorization code to the wireless access device
- the wireless access device stores the first authorization code locally
- the wireless access device also needs to send the first authorization code to the first electronic device.
- the wireless access device and the first electronic device may select part or all of the authorization codes from the first authorization codes and negotiate to obtain the first key.
- the x authorization codes in the first authorization code are the same as the y authorization codes in the first authorization code, then the wireless access device and the first electronic device negotiate to obtain the first key based on the same authorization code .
- the x authorization codes in the first authorization code are different from the y authorization codes in the first authorization code, and the wireless access device and the first electronic device negotiate to obtain the first password based on different authorization codes. key.
- the method before accessing the non-authentication network of the wireless access device, the method further includes: receiving access information sent by the wireless access device;
- the authentication network specifically includes: a non-authentication network for accessing wireless access devices based on access information.
- the access information of the non-authenticated network may include the identifier of the non-authenticated network, the physical address of the wireless access device, and the like.
- the method before accessing the non-authentication network of the wireless access device, the method further includes: broadcasting a network configuration information element of the first electronic device, where the network allocation information element is used to The other electronic devices are made to discover the first electronic device in the state of waiting for network configuration.
- the network configuration information includes a name and a password of the wireless local area network where the wireless access device is located.
- the embodiment of the present application provides a network distribution method applied to a wireless access device, the method includes: after the first electronic device accesses the non-authentication network of the wireless access device, sending a first request to the server message; wherein, the first request message is used for the server to generate a first authorization code, wherein the first authorization code is different from the authorization code sent by the wireless access device to other electronic devices that access the non-authentication network of the wireless access device; obtain The first authorization code, and based on the first authorization code, negotiate with the first electronic device to determine the first key; encrypt the distribution network information of the wireless local area network where the wireless access device is located based on the first key, and obtain encrypted distribution network information, And send the encrypted distribution network information to the first electronic device; wherein, the encrypted distribution network information is used for the first electronic device to decrypt the encrypted distribution network information based on the first key to obtain the distribution network information, and based on the distribution network information Connect to the wireless LAN where the wireless access device is located.
- the first authorization code is randomly generated by the server in response to request messages from different electronic devices, wherein the authorization code may be randomly generated by the server according to a preset random number generation algorithm; in some implementations, it is also possible for the server to generate the same authorization code for different electronic devices.
- the server may also generate the first authorization code and the second authorization code, the server sends the first authorization code and the second authorization code to the wireless access device, and the wireless access device saves the first authorization code to Locally, the wireless access device sends the second authorization code to the first electronic device. Afterwards, the wireless access device negotiates with the first electronic device to obtain the first key based on the first authorization code and the second authorization code. When the first authorization code is the same as the second authorization code, the wireless access device and the first electronic device negotiate to obtain the first key based on the same authorization code. When the first authorization code is different from the second authorization code, the wireless access device and the first electronic device negotiate to obtain the first key based on different authorization codes.
- the network distribution method does not require the user to input the name and password of the wireless local area network where the wireless access device is located, and the operation is simple.
- the wireless access device is always in the AP mode. In this way, ongoing services of other devices connected to the wireless access device will not be affected.
- the server generates different authorization codes for different electronic devices, which ensures that the high-density channels used by each electronic device are not the same. ) transfer security, ensuring the security of the distribution network process.
- the method before obtaining the first authorization code, further includes: receiving the first authentication information locally stored in the first electronic device sent by the first electronic device; sending the first authentication information to the server. Authentication information; wherein, the first authentication information is used by the server to determine that the first electronic device is a legitimate device.
- the server judges that the first authentication information satisfies the first condition, it determines that the first electronic device is a legitimate device.
- the first authentication information includes first registration information.
- the server After the server receives the first request information and before the server receives the first authentication information sent by the wireless access device, the server generates the first registration information (such as a registration code), and saves the first registration information locally to obtain the second registration information information.
- the server sends the first registration information to the first electronic device through the wireless access device. After receiving the first registration information, the first electronic device saves the first registration information locally.
- the first condition includes: the first registration information in the first authentication information is the same as the second registration information of the first electronic device locally stored by the server. That is, when the server confirms that the first registration information sent by the first electronic device through the wireless access device is the registration information of the first electronic device previously sent by the server through the wireless access device, the server can preliminarily determine that the electronic device is a legitimate device.
- the first authentication information includes first registration information and first verification information.
- the first inspection information may be any one of a digital certificate or a KPI certificate.
- the first condition includes: the first registration information in the first authentication information is the same as the second registration information of the first electronic device locally stored by the server. And the first verification information is legal verification information.
- the server before the server determines that the first verification information is valid verification information, the server generates a first random number and sends the first random number to the first electronic device through the wireless access device. After receiving the first random number, the first electronic device encrypts the first random number according to the first private key to obtain the encrypted first random number. The first electronic device sends the encrypted first random number to the server through the wireless access device. After receiving the encrypted first random number, the server decrypts the encrypted first random number according to the first public key preset in the first verification information, and after obtaining the first random number, the server determines that the first verification information is Valid verification information.
- the server After the server determines that the first electronic device is a legitimate device through the first registration information, the server further verifies the legitimacy of the first electronic device according to the verification information. In this way, the security of subsequent transmission of distribution network information can be improved.
- the server will generate the first authorization code for the first electronic device to negotiate with the wireless access device to obtain the first key and transfer the distribution network information.
- the server determines that the first electronic device is not a legitimate device through the first authentication information, then the server will not generate the first authorization code, and the first electronic device cannot obtain network distribution information, and the first electronic device cannot join the wireless access device In this way, the security of the network distribution process is guaranteed.
- the method before receiving the first authentication information sent by the first electronic device and locally stored in the first electronic device, the method further includes: based on locally saved preset parameters and the first electronic The device negotiates to obtain the second key based on the preset parameters stored locally; receiving the first authentication information sent by the first electronic device and stored locally by the first electronic device specifically includes: receiving the encryption information based on the second key sent by the first electronic device; the first authentication information; before sending the first authentication information to the server, the method further includes: decrypting the encrypted first authentication information based on the second key to obtain the first authentication information.
- the wireless access device before the wireless access device sends the first registration information to the first electronic device, the wireless access device encrypts the first registration information with a second key to obtain encrypted first registration information. The wireless access device sends the encrypted first registration information to the first electronic device. In this way, the security of information transmission between the first electronic device and the wireless access device can be guaranteed.
- the first electronic device before the first electronic device initiates a registration request to the server (or before the first electronic device sends the first authentication information to the server through the wireless access device), if the first electronic device and the wireless access device can pass the local After the stored preset parameters are negotiated to obtain the second key, the first electronic device can be considered as a preliminary legal device, and the first electronic device can initiate a registration request to the server through the wireless access device.
- the first electronic device that initiates a registration request to the server is a preliminary legal electronic device, that is, the first electronic device stores preset parameters.
- the information transmitted between the first electronic device and the wireless access device is transmitted after being encrypted by the second key, which can ensure the security of information transmission between the first electronic device and the wireless access device.
- the first authorization code includes m authorization codes, where m is a positive integer greater than or equal to 1; negotiating with the first electronic device to determine the first key specifically includes: based on the first x authorization codes in one authorization code and the first electronic device negotiate to obtain a first key based on y authorization codes in the first authorization code; wherein, x is greater than or equal to 1 and less than or equal to m, and y is greater than or equal to 1 and less than or equal to m.
- the server sends the first authorization code to the wireless access device
- the wireless access device stores the first authorization code locally
- the wireless access device also needs to send the first authorization code to the first electronic device.
- the wireless access device and the first electronic device may select part or all of the authorization codes from the first authorization codes and negotiate to obtain the first key.
- the x authorization codes in the first authorization code are the same as the y authorization codes in the first authorization code, then the wireless access device and the first electronic device negotiate to obtain the first key based on the same authorization code .
- the x authorization codes in the first authorization code are different from the y authorization codes in the first authorization code, then the wireless access device and the first electronic device negotiate to obtain the first password based on different authorization codes. key.
- the method before the first electronic device accesses the non-authentication network of the wireless access device, the method further includes: in response to the first user operation, sending access information of the non-authentication network ; Wherein, the access information is used for the first electronic device to access the non-authentication network of the wireless access device.
- the first user operation group may be the pressing operation of the network configuration key of the wireless access device, and the access information of the non-authenticated network may include the identifier of the non-authenticated network and the physical address of the wireless access device. Only after the wireless access device receives the operation of the first user (that is, is authorized by the user), the wireless access device will send the access information of the non-authenticated network of the wireless access device.
- the wireless access device continuously sends the access information of the non-authenticated network in response to the first user operation.
- the third electronic device accesses the non-authentication network of the wireless access device.
- the wireless access device sends a second request message to the server.
- the server After receiving the second request message, the server generates a second authorization code, where the second authorization code is different from the authorization code generated by the server after receiving the request message of other electronic devices sent by the wireless access device.
- the wireless access device and the third electronic device obtain the second authorization code, and negotiate to obtain the second key based on the second authorization code.
- the wireless access device encrypts network distribution information of the wireless local area network where the wireless access device is located based on the second key, obtains encrypted network distribution information, and sends the encrypted network distribution information to the third electronic device.
- the third electronic device receives the encrypted distribution network information, decrypts the encrypted distribution network information based on the second key, obtains the distribution network information, and connects to the wireless local area network where the wireless access device is located based on the distribution network information. In this way, the wireless access device only needs to receive one user operation, and continuously sends the access information of the non-authenticated network. Before the wireless access device stops sending the access information of the non-authenticated network, one or more electronic devices may be connected to the non-authenticated network of the wireless access device, then the wireless access device may adopt the same configuration as the first electronic device.
- the network process completes the network distribution process with one or more other electronic devices (for example, the third electronic device).
- the wireless access device only needs to receive one user operation to complete the network distribution process with multiple electronic devices, compared with the current wireless access device that receives one user operation and can only complete the network distribution process with one electronic device , improving the distribution network efficiency of electronic equipment.
- the wireless access device after the wireless access device completes the network configuration process with the third electronic device, after the wireless access device determines that the number of electronic devices connected to the non-authentication network of the wireless access device is 0, the wireless access device The ingress device stops sending the access information of the non-authenticated network.
- the wireless access device determines that the number of electronic devices connected to the non-authenticated network of the wireless access device is 0 and waits for a period of time. During this period, the wireless access device still continuously sends the access information of the non-authentication network. If no other electronic device is connected to the non-authentication network of the wireless access device, the wireless access device stops sending the non-authentication Network access information.
- the method before the first electronic device accesses the non-authentication network of the wireless access device, the method further includes: receiving the network distribution information of the first electronic device broadcast by the first electronic device; element, wherein, the distribution network information element is used to enable other electronic devices to discover the first electronic device in the state of waiting for network distribution.
- the network configuration information includes a name and a password of the wireless local area network where the wireless access device is located.
- the embodiment of the present application provides a method for network distribution, which is applied to a server, and the method includes: receiving a first request message, and generating a first authorization code, wherein the first authorization code is different from that received by the server from the wireless access device An authorization code generated after sending a request message from another electronic device; sending the first authorization code to the wireless access device and the first electronic device, wherein the first authorization code is obtained through negotiation between the wireless access device and the first electronic device
- the first key is used by the wireless access device to encrypt the distribution network information of the wireless local area network where the wireless access device is located based on the first key, to obtain encrypted distribution network information, and to send the encrypted network distribution information to the first electronic device
- Distribution network information the encrypted distribution network information is used by the first electronic device to decrypt the encrypted distribution network information based on the first key to obtain the distribution network information, and connect to the wireless local area network where the wireless access device is located based on the distribution network information.
- the first authorization code is randomly generated by the server in response to request messages from different electronic devices, wherein the authorization code may be randomly generated by the server according to a preset random number generation algorithm; in some implementations, it is also possible for the server to generate the same authorization code for different electronic devices.
- the server may also generate the first authorization code and the second authorization code, the server sends the first authorization code and the second authorization code to the wireless access device, and the wireless access device saves the first authorization code to Locally, the wireless access device sends the second authorization code to the first electronic device. Afterwards, the wireless access device negotiates with the first electronic device to obtain the first key based on the first authorization code and the second authorization code. When the first authorization code is the same as the second authorization code, the wireless access device and the first electronic device negotiate to obtain the first key based on the same authorization code. When the first authorization code is different from the second authorization code, the wireless access device and the first electronic device negotiate to obtain the first key based on different authorization codes.
- the first electronic device can be any of the following: smart lights, smart ovens, smart fans, smart air conditioners, smart TVs, smart big screens, smart bracelets, smart watches, smart speakers, smart refrigerators, smart doors and windows, smart cars, Smart monitors, smart robots, smart cameras, etc.
- the network distribution method does not require the user to input the name and password of the wireless local area network where the wireless access device is located, and the operation is simple.
- the wireless access device is always in the AP mode. In this way, ongoing services of other devices connected to the wireless access device will not be affected.
- the server generates different authorization codes for different electronic devices, which ensures that the high-density channels used by each electronic device are not the same. ) transfer security, ensuring the security of the distribution network process.
- the method before generating the first authorization code, further includes: receiving first authentication information locally stored on the first electronic device sent by the wireless access device, and The information determines that the first electronic device is a legitimate device.
- the server judges that the first authentication information satisfies the first condition, it determines that the first electronic device is a legitimate device.
- the first authentication information includes first registration information.
- the server After the server receives the first request information and before the server receives the first authentication information sent by the wireless access device, the server generates the first registration information (such as a registration code), and saves the first registration information locally to obtain the second registration information information.
- the server sends the first registration information to the first electronic device through the wireless access device. After receiving the first registration information, the first electronic device saves the first registration information locally.
- the first condition includes: the first registration information in the first authentication information is the same as the second registration information of the first electronic device locally stored by the server. That is, when the server confirms that the first registration information sent by the first electronic device through the wireless access device is the registration information of the first electronic device previously sent by the server through the wireless access device, the server can preliminarily determine that the electronic device is a legitimate device.
- the first authentication information includes first registration information and first verification information.
- the first inspection information may be any one of a digital certificate or a KPI certificate.
- the first condition includes: the first registration information in the first authentication information is the same as the second registration information of the first electronic device locally stored by the server. And the first verification information is legal verification information.
- the server before the server determines that the first verification information is valid verification information, the server generates a first random number and sends the first random number to the first electronic device through the wireless access device. After receiving the first random number, the first electronic device encrypts the first random number according to the first private key to obtain the encrypted first random number. The first electronic device sends the encrypted first random number to the server through the wireless access device. After receiving the encrypted first random number, the server decrypts the encrypted first random number according to the first public key preset in the first verification information, and after obtaining the first random number, the server determines that the first verification information is Valid verification information.
- the server After the server determines that the first electronic device is a legitimate device through the first registration information, the server further verifies the legitimacy of the first electronic device according to the verification information. In this way, the security of subsequent transmission of distribution network information can be improved.
- the server will generate the first authorization code for the first electronic device to negotiate with the wireless access device to obtain the first key and transfer the distribution network information.
- the server determines that the first electronic device is not a legitimate device through the first authentication information, then the server will not generate the first authorization code, and the first electronic device cannot obtain network distribution information, and the first electronic device cannot join the wireless access device In this way, the security of the network distribution process is guaranteed.
- the network configuration information includes a name and a password of the wireless local area network where the wireless access device is located.
- an embodiment of the present application provides an electronic device, which is a first electronic device, and the first electronic device includes: one or more processors, one or more memories; one or more memories and one or more The processors are coupled, and one or more memories are used to store computer program codes, the computer program codes include computer instructions, and one or more processors invoke computer instructions to make the first electronic device execute any of the above aspects in any possible implementation manner Method steps performed by the first electronic device.
- the embodiment of the present application provides a wireless access device, and the wireless access device includes: one or more processors, one or more memories; one or more memories are coupled to one or more processors, One or more memories are used to store computer program codes, and the computer program codes include computer instructions, and one or more processors call computer instructions to make the wireless access device execute any of the above aspects.
- the wireless access device in any possible implementation manner The method steps performed.
- the embodiment of the present application provides a chip device.
- the chip device includes at least one processor and a memory, and the memory is used to store computer program codes.
- the computer program codes include computer instructions.
- At least one processor calls the computer instructions so that the installed
- the first electronic device of the chip device executes the method steps executed by the first electronic device in any possible implementation manner of any aspect above.
- the embodiment of the present application provides a chip device.
- the chip device includes at least one processor and a memory, and the memory is used to store computer program codes.
- the computer program codes include computer instructions.
- At least one processor calls the computer instructions so that the installed
- the wireless access device of the chip device executes the method steps performed by the wireless access device in any possible implementation manner of any aspect above.
- the embodiment of the present application provides a readable storage medium for storing computer instructions, and when the computer instructions are run on the first electronic device, the first electronic device executes any possible implementation of any of the above aspects Method steps performed by the first electronic device in the manner.
- the embodiment of the present application provides a readable storage medium, which is used to store computer instructions, and when the computer instructions are run on the wireless access device, the wireless access device performs any possible implementation of any of the above aspects. Method steps performed by the wireless access device in the manner.
- the embodiment of the present application provides a computer program product.
- the computer program product runs on the first electronic device
- the first electronic device executes the first electronic program in any possible implementation manner of any of the above aspects. Method steps performed by the device.
- the embodiment of the present application provides a computer program product, which, when the computer program product runs on a wireless access device, enables the wireless access device to perform wireless access in any possible implementation manner of any of the above aspects. Method steps performed by the device.
- FIG. 1 is a flow chart of a method for a soft access point distribution method provided in an embodiment of the present application
- FIG. 1A is a distribution network interface diagram provided by the embodiment of the present application.
- FIG. 2 is a flow chart of a method for a multicast distribution network solution provided in an embodiment of the present application
- FIG. 3 is a flow chart of a method based on an artificial intelligence Internet of Things antenna distribution network solution provided by an embodiment of the present application;
- Fig. 3A-Fig. 3B are a set of distribution network interface diagrams provided by the embodiment of the present application.
- FIG. 4 is a schematic diagram of a system architecture provided by an embodiment of the present application.
- FIG. 5 is a schematic structural diagram of an electronic device 200 provided in an embodiment of the present application.
- FIG. 6 is a schematic structural diagram of a router 300 provided in an embodiment of the present application.
- FIG. 7 is a flowchart of a method for connecting an electronic device 200 to an open ssid of a router 300 provided in an embodiment of the present application;
- FIG. 8 is a flow chart of a method for the server 400 to generate the registration information of the electronic device 200 and complete the verification tasks of the electronic device 200 provided by the embodiment of the present application;
- FIG. 9 is a flowchart of a method for transmitting distribution network information between an electronic device 200 and a router 300 provided in an embodiment of the present application;
- Figures 9A-9F are UI diagrams of a group of "remote distribution network" provided by the embodiment of the present application.
- Fig. 10A-Fig. 10C are UI diagrams of a set of "one-key distribution network" provided by the embodiment of the present application.
- FIGS 11-13 are several flow charts of "one-key distribution network" provided by the embodiment of this application.
- FIG. 14 is a schematic flowchart of a network distribution method provided by an embodiment of the present application.
- first and second are used for descriptive purposes only, and cannot be understood as implying or implying relative importance or implicitly specifying the quantity of indicated technical features. Therefore, the features defined as “first” and “second” may explicitly or implicitly include one or more of these features. In the description of the embodiments of the present application, unless otherwise specified, the “multiple” The meaning is two or more.
- UI user interface
- the term "user interface (UI)" in the specification, claims and drawings of this application is a medium interface for interaction and information exchange between an application program or an operating system and a user, and it realizes the internal form of information Conversion to and from a form acceptable to the user.
- the user interface of the application program is the source code written in specific computer languages such as java and extensible markup language (XML). Such as images, text, buttons and other controls.
- Control also known as widget (widget), is the basic element of user interface.
- Typical controls include toolbar (toolbar), menu bar (menu bar), input box, button (button), scroll bar (scrollbar), images and text.
- the properties and contents of the controls in the interface are defined through labels or nodes.
- XML specifies the controls contained in the interface through nodes such as ⁇ Textview>, ⁇ ImgView>, and ⁇ VideoView>.
- a node corresponds to a control or property in the interface, and after the node is parsed and rendered, it is presented as the content visible to the user.
- the interfaces of many applications, such as hybrid applications usually include web pages.
- a web page, also called a page, can be understood as a special control embedded in an application program interface.
- a web page is a source code written in a specific computer language, such as hypertext markup language (HTML), cascading style Tables (cascading style sheets, CSS), java scripts (JavaScript, JS), etc.
- the source code of the web page can be loaded and displayed as user-recognizable content by a browser or a web page display component similar in function to the browser.
- the specific content contained in the webpage is also defined by the tags or nodes in the source code of the webpage. For example, HTML defines the elements and attributes of the webpage through ⁇ p>, ⁇ img>, ⁇ video>, and ⁇ canvas>.
- GUI graphical user interface
- Method 1 Soft access point (softAP) distribution network method
- FIG. 1 exemplarily shows a flow chart of a method in which the electronic device 100 configures a network for the electronic device 200 in a softAP network configuration manner.
- the softAP network allocation method may include steps S101-S108. in:
- the electronic device 200 is turned on, and is in a state of waiting for network distribution.
- the electronic device 200 is in the state of waiting for network configuration, which may also be referred to as the electronic device 200 is in the AP mode.
- the electronic device 100 may turn on the hotspot.
- the above-mentioned user operation for triggering the electronic device 200 to turn on and be in the state of network provisioning may be a long press operation (for example, long press for 3 seconds) on a relevant button (for example, a network distribution key) on the electronic device 200 .
- the network distribution key may be "Hi key” or "WPS key”, etc., and this application does not limit the name of the network distribution key.
- the type of the network distribution key is a push type, a rotary type, or a toggle type. This application does not limit the type of the network distribution key.
- the above-mentioned user operation for triggering the electronic device 200 to turn on and be in the state of waiting for network configuration may be the operation of powering on the electronic device 200 that has not been connected to the wireless network where other devices are located, or it may be the operation of making The operation of powering on the electronic device 200 after being connected to the wireless network where other devices are located, but restoring factory settings.
- the embodiment of the present application does not limit the above user operations for triggering the electronic device 200 to turn on and be in a state of waiting for network configuration.
- the electronic device 200 can enter the network-to-be-configured state through various methods, such as smart remote control or opening in a mobile phone APP, and so on.
- the electronic device 200 may send a distribution network information element (information element, IE) in a broadcast form.
- IE distribution network information element
- the electronic device 200 In response to the electronic device 200 being in the state of waiting for network configuration, the electronic device 200 broadcasts the network configuration IE of the electronic device 200 .
- the distribution network IE of the electronic device 200 may include but not limited to: the identification of the electronic device 200 , whether the electronic device 200 supports interconnection capability, the physical address of the electronic device 200 , and the like.
- the distribution network IE of the electronic device 200 may also include other more information, such as the manufacturer of the electronic device 200 , etc. This application does not limit the distribution network IE of the electronic device 200 .
- the electronic device 200 may continuously broadcast the network configuration IE of the electronic device 200 .
- the electronic device 100 may receive a distribution network IE from the electronic device 200 , and receive a user operation for selecting a hotspot to connect to the electronic device 200 .
- the electronic device 100 may connect to the hotspot of the electronic device 200 .
- the electronic device 100 may receive at least one configuration IE of the electronic device.
- the at least one electronic device includes the electronic device 200 .
- the electronic device 100 may display the name of the hotspot including the above at least one electronic device.
- the electronic device 100 may connect to the hotspot of the electronic device 200 according to the physical address of the electronic device 200 in the distribution network IE.
- the electronic device 100 and the electronic device 200 can establish a local area network between the devices.
- the local area network can be used for data transmission between the electronic device 100 and the electronic device 200 .
- the electronic device 100 may receive the network distribution information input by the user, and the network distribution information may include the name and password of the router.
- the electronic device 100 may display a user interface 10 as shown in FIG. 1A .
- the user interface 10 may include a distribution network information input box 1001 floating on the main interface of the smart life application program.
- the distribution network information input box 1001 may also be suspended and displayed on other user interfaces (such as the main interface of the electronic device 100 ), which is not limited in this application.
- the distribution network information input box 1001 may include a name input box 1002 , a password input box 1003 and a confirmation control 1004 .
- the name input field 1002 can be used to input or select the name of the router (ie, the name of the Wi-Fi access) from the list.
- the password input field 1003 can be used to input the password of the router (ie, the password for accessing Wi-Fi).
- the confirmation control 1004 can be used to trigger the electronic device 100 to send the received router name and password to the electronic device 200 .
- FIG. 1A is only an exemplary illustration of the user interface of the electronic device 100 for receiving user input of network distribution information in the present application, and does not limit the present application.
- the above-mentioned distribution network information is stored in the electronic device 100 .
- the electronic device 100 does not require the user to input distribution network information, that is, the name of the router in the name input column 1002 in the distribution network information input box 1001 shown in FIG. 1A and the router password in the password input column 1003 have been automatically filled in the corresponding location, the user is not required to enter the name of the router and the password of the router again.
- the user only needs to click the confirmation control 1004 , and the electronic device 100 can send the name and password of the router to the electronic device 200 .
- the electronic device 100 may send network distribution information to the electronic device 200 through the local area network.
- the electronic device 100 can send the above network distribution information to the electronic device 200 .
- the electronic device 200 may send a network distribution information reception response to the electronic device 100 . This step is optional.
- the electronic device 200 may send a network distribution information reception response to the electronic device 100 to indicate that the electronic device 100 itself has received the network distribution information.
- the electronic device 100 when it sends the network distribution information, it may encrypt the network distribution information. When receiving the encrypted network distribution information, the electronic device 200 can decrypt it to obtain the network distribution information.
- the embodiment of the present application does not limit the foregoing encryption and decryption methods.
- the electronic device 200 may stop broadcasting the distribution network IE, and use the received distribution network information to connect to the router.
- the electronic device 200 may stop broadcasting the distribution network IE. Using the received network distribution information, the electronic device 200 can establish a connection with the router 300 .
- the electronic device 200 works in the access point (access point, AP) mode, and the electronic device 100 connects to The hotspot of the electronic device 200 sends the distribution network information of the router 300 to the electronic device 200; when the electronic device 200 receives the distribution network information, the electronic device 200 switches from the AP mode to the station (station, STA) mode, and based on the distribution network information Connect to router 300.
- access point access point
- AP access point
- STA station
- the embodiment of the present application does not limit the softAP distribution method between the electronic device 100 and the electronic device 200 .
- the electronic device 100 and the electronic device 200 may also exchange more or less information.
- the electronic device 200 when the electronic device 200 is connected to the router 300 through a soft access point distribution network, the user needs to open the first application program (such as a smart life application program) to perform operations, such as entering the name and password of the router and clicking OK.
- the electronic device 200 can obtain the name and password of the router 300 and connect to the router 300 .
- the entire process requires user intervention to complete the network distribution process of the electronic device 200; and if there are multiple devices to be networked that need to be networked, the user needs to repeat the same operation multiple times to make multiple devices to be networked To complete the connection with the router 300 in sequence, the operation is relatively complicated.
- FIG. 2 exemplarily shows a flowchart of a method for the electronic device 100 to configure a network for the electronic device 200 using a multicast network configuration solution.
- the electronic device 200 (such as a smart speaker) is turned on, and the electronic device 200 is in a state of waiting for network distribution.
- the electronic device 200 sends the distribution network IE of the electronic device 200 in a broadcast form.
- the electronic device 200 is in the state of waiting for network provisioning, which may also be referred to as the electronic device 200 is in the AP mode.
- the electronic device 200 In response to the electronic device 200 being in the state of waiting for network configuration, the electronic device 200 broadcasts the network configuration IE of the electronic device 200 .
- the router 300 receives the distribution network IE of the electronic device 200, and the indicator light of the router 300 flickers.
- the router 300 receives the distribution network IE of the electronic device 200, and recognizes that the electronic device 200 is in the state of waiting for network distribution, and the indicator light of the router 300 flickers, thereby prompting the user that the router 300 has discovered a device (for example, the electronic device 200) to be distributed. .
- the router 300 may also use other methods to prompt the user that the router 300 has found a device to be configured, which is not limited in this application.
- the router 300 receives an operation of triggering (for example, pressing) the network allocation key by the user.
- the router 300 In response to the operation of the user triggering (for example, pressing) the network allocation key, the router 300 sends a multicast message, and the multicast message carries the name and password of the router 300.
- the indicator light of the router 300 flickers to remind the user that the router 300 has found a device to be configured.
- the router 300 receives the user's operation of triggering (for example, pressing) the network configuration key, and the router 300 sends a multicast message to the router, and the multicast message carries the name and password of the router 300 .
- the multicast message may also carry other information, which is not limited in this application.
- the router 300 may encrypt the multicast message according to a preset encryption and decryption method and then send it to the electronic device 200 .
- the electronic device 200 receives the multicast message, and obtains the name and password of the router 300 carried in the multicast message.
- the electronic device 200 receives the multicast message, and obtains the name and password of the router 300 carried in the multicast message.
- the electronic device 200 receives the multicast message encrypted in the preset encryption and decryption method, and decrypts the multicast message encrypted in the preset encryption and decryption method according to the preset decryption method, and parses out The name and password of router 300 carried in the multicast message.
- the preset encryption method and the preset decryption method are preset before the router 300 and the electronic device 200 leave the factory.
- the router 300 encrypts the multicast packet according to the encryption method specified in the preset protocol, and then the electronic device 200 can decrypt the encrypted multicast packet according to the decryption method specified in the preset protocol.
- the electronic device 200 connects to the router 300 based on the name and password of the router 300 .
- the electronic device 200 Before the electronic device 200 connects to the router 300 based on the name and password of the router 300 , the electronic device 200 is always in the AP mode, and the electronic device 100 has not established a connection with the router 300 .
- the electronic device 200 and the router 300 need to transmit network distribution information through the reserved field of the multicast message, which does not conform to the wireless local area network standard stipulated in the current 802.11 protocol.
- the electronic device 200 and the router 300 transmit the network configuration information of the router 300 through the multicast message, they need to follow the same encryption and decryption method, that is, the encryption and decryption method has been preset before the electronic device 200 and the router 300 leave the factory. If the electronic device 200 and the router 300 are not produced by the same manufacturer, the electronic device 200 cannot complete the network distribution process with the router 300 , and devices from different manufacturers have compatibility problems.
- Method 3 Distribution network scheme based on artificial intelligence of things (AIoT) antenna
- AIoT is a technology that combines artificial intelligence technology with IoT infrastructure to achieve more efficient IoT operations, improve human-computer interaction, and enhance data management and analysis capabilities.
- the third method may be used to complete the network distribution of the electronic device 200, wherein the AIoT antenna may refer to an antenna used to discover and connect to a device in a state to be networked.
- Method 3 By installing an AIoT antenna on the router 300, the router 300 can work in a manner similar to that of the electronic device 100 in the method 1, so that the router 300 can send the name and password of the router 300 to the computer with the distribution network through the AIoT antenna.
- device eg, electronic device 200).
- the router 300 needs to switch the working mode from AP mode to STA mode, and connect to the hotspot of the device to be distributed, so that the router 300 can The distribution network information can be sent to the device to be distributed.
- other electronic devices such as the electronic device 100
- the router 300 needs to switch the working mode from the AP mode to the STA mode
- other electronic devices such as the electronic device 100
- the router 300 is connected to the wireless network where the router 300 is located, and communicate with other electronic devices through the wireless network where the router 300 is located.
- Electronic devices (such as tablets) for video calls.
- the router 300 switches its working mode from the AP mode to the STA mode, the router 300 will not be able to provide network services for the electronic device 100 connected to the wireless network where the router 300 is located. At this time, the ongoing service of the electronic device 100 will be affected, for example, the video call between the electronic device 100 and the tablet may be stuck or even interrupted.
- the AIoT antenna on the router 300 can solve this problem very well. That is, the router 300 can receive the broadcast frame sent by the electronic device 200 through the AIoT antenna, and discover the electronic device 200 in the state of waiting for network configuration. Afterwards, the router 300 can connect to the hotspot of the electronic device 200 through the AIoT antenna, and the router 300 sends the distribution network information to the electronic device 200 through the AIoT antenna. In this way, the router 300 can always work in the AP mode without affecting the ongoing services of electronic devices connected to the wireless network where the router 300 is located.
- AIoT antennas may also be referred to as smart antennas for short.
- FIG. 3 exemplarily shows a flow chart of a method in which the electronic device 100 configures a network for the electronic device 200 by using an AIoT antenna.
- Method 3 may include the following steps:
- the electronic device 200 (such as a smart speaker) is turned on, and the electronic device 200 is in a state of waiting for network distribution.
- the state of waiting for network distribution is the state of waiting to receive network distribution information.
- the user operation that puts the electronic device 200 in the state of waiting for network distribution is the same as the user operation of putting the electronic device 200 in the state of waiting for network distribution in S101.
- the relevant description in S101 Let me repeat.
- the electronic device 200 In response to the electronic device 200 being in a state of waiting for network configuration, the electronic device 200 sends a network configuration IE of the electronic device 200 in a broadcast form.
- the router 300 discovers the distribution network IE of the electronic device 200, and connects to the hotspot of the electronic device 200.
- the router 300 sends information one to the server.
- the router 300 After the router 300 discovers the distribution network IE of the electronic device 200 , the smart antenna of the router 300 switches to the STA mode, and the smart antenna of the router 300 connects to the hotspot of the electronic device 200 . Afterwards, the router 300 sends information one to the server, the information one is used to instruct the server that the router 300 has discovered the electronic device 200 in the network to be provisioned. S305. The electronic device 100 pops up a window to display that the device to be distributed is found, and the electronic device 100 receives a confirmation operation from the user.
- the server 400 displays the prompt information that the router 300 finds the electronic device 200 to be distributed on the user interface of the first application program (such as a smart life application program), so that the user can see
- the electronic device 100 After receiving the prompt information, the electronic device 100 then receives the user's confirmation operation for agreeing to configure the network for the electronic device 200 . Only after the electronic device 100 receives the user's confirmation operation, the router 300 can send the network distribution information to the electronic device 200 .
- FIG. 3A exemplarily shows the user interface 20 on the electronic device 100 .
- the user interface 20 may include a prompt bar 2001 suspended and displayed on the main interface of the first application program (such as a smart life application program).
- the prompt bar 2001 may also be suspended and displayed on other user interfaces (such as the main interface of the electronic device 100 ), which is not limited in this application.
- the prompt column 2001 may include question prompt information "smart antenna finds smart speaker", control 2002 and control 2003 .
- the prompt bar 2001 is used to prompt the user to complete the verification process.
- the electronic device 100 may receive an operation of the user triggering (for example, clicking) the control 2002 , which indicates that the user does not agree to the router sending the distribution network information to the electronic device 200 .
- the electronic device 100 may also receive an operation of the user triggering (for example, clicking) the control 2003 , which indicates that the user agrees that the router 300 sends the distribution network information to the electronic device 200 .
- the electronic device 100 receives the operation of the user triggering (for example, clicking) the control 2003, and in response to the operation of the user triggering (for example, clicking) the control 2003, the electronic device 100 sends confirmation information to the server, and the server The confirmation information is sent to the router 300 , and the confirmation information is used to inform the router 300 that the user agrees that the router 300 sends the network distribution information to the electronic device 200 .
- the electronic device 100 After the electronic device 100 receives the user's operation of triggering (for example, clicking) the control 2003 , the electronic device 100 displays the user interface 30 as shown in FIG. 3B .
- the user interface 30 is used to prompt the user to associate the electronic device 200 and the electronic device 100 with the same account, that is, bind the electronic device 100 and the electronic device 200 .
- User interface 30 includes control 3001 , control 3002 and control 3003 .
- the electronic device 100 receives a user's trigger operation (such as a click operation) on the control 3003, and the electronic device 100 associates the electronic device 200 with the electronic device 100 with the same account, that is, the electronic device 100 and the electronic device 200 have a binding relationship.
- a user's trigger operation such as a click operation
- the server 400 may record that the electronic device 100 and the electronic device 200 are associated with the same account.
- the server 400 may receive an instruction from the electronic device 100 for controlling the electronic device 200 (such as an instruction to turn on the electronic device 200).
- the server 400 may send the control instruction to the electronic device 200, so that the electronic device 200 executes the operation corresponding to the control instruction.
- the server 400 may also receive a message from the electronic device 200 for reporting its state information to the electronic device 100 (for example, a message indicating the battery level of the electronic device 200 ).
- the server 400 may send the above message indicating the state information of the electronic device 200 to the electronic device 100, so that the electronic device 100 updates the state information of the electronic device 200.
- the electronic device 100 sends the information 2 to the router 300.
- the router 300 After the router 300 receives the information two, the router 300 sends the name and password of the router 300 to the electronic device 200 through the smart antenna.
- the electronic device 100 After the electronic device 100 receives the user operation for confirming the connection, the electronic device 100 sends information 2 to the server, and the server sends the information 2 to the router 300. After the router 300 receives the information 2 sent by the server, the router 300 sends the smart antenna to the STA. The mode is switched to AP mode. Afterwards, the router 300 sends the name and password of the router 300 to the electronic device 200 through the smart antenna, and waits for the electronic device 200 to connect to the router 300 .
- the electronic device 100 can directly send the information 2 to the router 300.
- the router 300 After the router 300 receives the information 1 sent by the electronic device 100, the router 300 sends the name and password of the router 300 to the electronic device 200 through the smart antenna.
- the electronic device 200 receives the name and password of the router 300, and connects to the router 300 through the name and password of the router.
- the essence of this solution is to add a smart antenna to the router 300.
- the router 300 discovers and connects to the hotspot of the device that is in the state of the network to be distributed. state of the device.
- the coverage of the smart antenna is within about 9 meters from the center of the router 300 radiating outward.
- the wall penetration of the signal sent by the smart antenna is very poor, that is, the signal sent by the smart antenna is almost attenuated and unusable after passing through obstacles, so that the electronic device 200 cannot receive the distribution network information sent by the smart antenna of the router 300, resulting in Network provisioning failed.
- an embodiment of the present application provides a network distribution method, which includes:
- the electronic device 200 is connected to the non-authenticated network (open ssid) of the router 300 .
- the electronic device 200 is in a state of waiting for network configuration, and the electronic device 200 broadcasts a network configuration IE of the electronic device 200 .
- the router 300 receives the distribution network IE of the electronic device 200, the router 300 sends the open ssid of the router 300, and the electronic device 200 receives the open ssid of the router 300, and then, the electronic device 200 connects to the open ssid of the router 300.
- the server 400 randomly generates an auth code (authorization code), and the electronic device 200 and the router 300 obtain the auth code.
- the router 300 and the electronic device 200 negotiate a key one, and the electronic device 200 encrypts the registration information and verification information of the electronic device 200 with the key one, and sends them to the server 400 through the router 300 .
- the server 400 determines that the electronic device 200 is a device that allows network distribution, and the server 400 associates the electronic device 200 and the router 300 with the same account.
- the server 400 randomly generates an auth code (authorization code), and the server 400 sends the auth code to the router 300.
- the router 300 receives the auth code sent by the server 400, and sends the auth code to the electronic device 200.
- both the router 300 and the electronic device 200 obtain the auth code randomly generated by the server 400.
- the router 300 sends the distribution network information encrypted with the key based on the auth code to the electronic device 200, and the electronic device 200 receives and decrypts it to obtain the distribution network information, and the electronic device 200 uses the distribution network information to access the router 300.
- the router 300 and the electronic device 200 obtain the key 2 through auth code negotiation, and the router 300 encrypts the name and password of the router 300 with the key 2 and sends it to the electronic device 200;
- the name and password of the router 300 encrypted by the key two are decrypted using the key two.
- the electronic device 200 obtains the name and password of the router 300 .
- the electronic device 200 uses the name and password of the router 300 to connect to the router 300 .
- the above-mentioned name and password of the router 300 may also be replaced with the name and password of the wireless local area network where the router 300 is located.
- sending in this embodiment of the present application may refer to device A sending directly to device B, or device A sending to device B through forwarding from one to multiple other devices.
- auth code sent by the server 400 to the electronic device 200 and the router 300 may be the same or different, and this embodiment of the application is not limited here.
- the auth code sent is the same as an example for illustration.
- Method 1 The server 400 generates an auth code set 1, the auth code set 1 includes m auth codes, and m is greater than or equal to 1.
- the server 400 sends the auth code set one to the router 300, and after the router 300 receives the auth code set one, the router 300 saves the auth code set one locally. Then, the router 300 sends the auth code set one to the electronic device 200, and the electronic device 200 obtains the auth code set one. Afterwards, the electronic device 200 and the router 300 negotiate to obtain the key 2 based on the m auth codes in the auth code set 1 through a preset algorithm.
- Method 2 The server 400 generates auth code set 1 and auth code set 2, auth code set 1 includes m auth codes, auth code set 2 includes m auth codes, m is greater than or equal to 1.
- the m auth codes in the auth code set 1 are the same as the m auth codes in the auth code set 2. It can also be said that the auth code set 1 and the auth code set 2 are the same.
- the server 400 sends the auth code set 1 and the auth code set 2 to the router 300. After the router 300 receives the auth code set 1 and the auth code set 2, the router 300 saves the auth code set 1 locally.
- the router 300 sends the second auth code set to the electronic device 200, and the electronic device 200 obtains the second auth code set. Afterwards, the electronic device 200 and the router 300 negotiate to obtain the key 2 based on the m auth codes in the auth code set 1 and the m auth codes in the auth code set 2 through a preset algorithm.
- Method 1 The server 400 needs to generate auth code set 1, auth code set 1 includes m auth codes, and m is greater than or equal to 2.
- the server 400 sends the auth code set one to the router 300, and after the router 300 receives the auth code set one, the router 300 saves the auth code set one locally. Then, the router 300 sends the auth code set one to the electronic device 200, and the electronic device 200 obtains the auth code set one. Afterwards, the electronic device 200 negotiates with the router 300 based on the x auth codes in the auth code set 1 to obtain the key 2 based on the y auth codes in the auth code set 1.
- x auth codes in auth code set 1 are different from y auth codes in auth code set 1, x is greater than or equal to 1 and less than or equal to m, and y is greater than or equal to 1 and less than or equal to m.
- the server 400 needs to generate different auth code sets (such as auth code set 1 and auth code set 2).
- the auth code contained in the second auth code set is different.
- the server 400 sends the auth code set 1 and the auth code set 2 to the router 300.
- the router 300 can save the auth code set 2 to the local, and then the router 300 saves the auth code set 2 to the local.
- the code set one is sent to the electronic device 200, and the electronic device 200 obtains the auth code set one.
- the router 300 may also save the auth code set one locally, the router 300 sends the auth code set two to the electronic device 200, and the electronic device 200 obtains the auth code set two.
- the electronic device 200 and the router 300 obtain the key 2 through negotiation based on the auth code set 1 and the auth code set 2 through a preset algorithm.
- the auth code set 2 can include one or more auth codes.
- the preset algorithm here may be the Diffie Hellman (DH) algorithm introduced in the following embodiments, and the preset algorithm may also be other algorithms, which are not limited in this embodiment of the present application.
- auth code set 1 may include one or more sets of auth codes
- auth code 2 may also include one or more auth codes.
- the network distribution method provided in the embodiment of the present application can reduce manual intervention in the network distribution process. Specifically, the network distribution method provided by the embodiment of the present application does not require the user to input the name and password of the router 300, and the operation is simple.
- the network distribution method provided in the embodiment of the present application does not modify the wireless local area network standard stipulated in the 802.11 protocol. Specifically, the electronic device 200 and the router 300 do not need to transmit the network configuration information through the reserved field of the multicast message.
- the network distribution method provided in the embodiment of the present application does not require additional hardware. Specifically, the router 300 does not need to install an additional AIoT antenna, and the router 300 can also be in the AP mode all the time during the network distribution process. In this way, ongoing services of other devices connected to the router 300 will not be affected.
- the network distribution method provided by the embodiment of the present application can improve the security of the network distribution process.
- the server 400 After the server 400 verifies that the electronic device 200 is a device that allows network distribution through the verification information, the server 400 randomly generates auth codes. It can be understood that the auth codes generated by the server 400 for different devices are different.
- the auth code is used for the router 300 and the electronic device 200 to negotiate a high-density channel so as to complete the transmission of sensitive information (name and password of the router 300).
- the auth codes of different devices are different, so the high-density channels used by each device to be distributed are different. This solution improves the security of sensitive information (such as the name and password of router 300) and ensures the network distribution process. security.
- the network configuration method provided in the embodiment of the present application can be applied to the application scenario of "one-key network configuration", that is, to configure the network for one or more devices to be configured at one time. Specifically, when the router 300 discovers one or more devices to be configured, the router 300 receives a user operation agreeing to configure the network. Afterwards, the router 300 continuously broadcasts the open ssid of the router 300. After the one or more network-to-be-distributed devices are connected to the open ssid of the router 300, the router 300 sequentially completes the network distribution process of the one or more network-to-be-distributed devices connected to the open ssid of the router 300.
- Router 300 only needs to receive one operation from the user to complete the network distribution process with one or more devices to be distributed. Compared with the current router 300 that receives one user operation, it can only complete the network distribution process with one device to be distributed. , the network distribution solution provided by the embodiment of the present application improves the network distribution efficiency of the router, saves the number of user operations, and improves user experience.
- the network distribution method provided in the embodiment of the present application can also be applied to the application scenario of "remote network distribution".
- the network distribution of the electronic device 200 is completed remotely by operating the electronic device 100 .
- the router 300 discovers the electronic device 200 in the state of waiting for network configuration, and the electronic device 100 displays a prompt message indicating that the electronic device 200 in the state of waiting for network distribution is found on the remote network configuration interface of the first application program.
- the electronic device 100 may receive user A's input operation on the remote network distribution interface of the first application program, and trigger the router 300 to send the network distribution information to the electronic device 200 in the state of network distribution, so that the electronic device 200 receives the router's
- the electronic device 200 connects to the router 300 through the distribution network information sent by the router 300 .
- User A and user B may not be the same user, and user A does not need to be near the router 300 and the electronic device 200, so that user A can remotely connect the electronic device 200 to the router 300.
- FIG. 4 is a schematic diagram of a system architecture provided by an embodiment of the present application.
- the communication system 40 may include an electronic device 100 , an electronic device 200 , a router 300 , and a server 400 .
- the electronic device 100 may be a mobile phone, a tablet computer, a desktop computer, a laptop computer, a handheld computer, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, and a personal digital assistant (personal digital assistant). assistant, PDA) and other equipment.
- UMPC ultra-mobile personal computer
- PDA personal digital assistant
- the electronic device 200 may be a smart lamp, a smart oven, a smart fan, a smart air conditioner, a smart TV, a smart large screen, a smart bracelet, a smart watch, a smart speaker, a smart refrigerator, smart doors and windows, a smart car, a smart monitor, a smart robot, smart camera etc.
- the embodiment of the present application does not limit the types of the electronic device 100 and the electronic device 200 .
- the following embodiments of the present application are described by taking the electronic device 100 as a mobile phone and the electronic device 200 as a smart speaker as an example.
- the electronic device 100 may be connected to the wireless local area network where the router 300 is located, or the electronic device 100 may not be connected to the wireless local area network where the router 300 is located.
- the embodiments of the present application are not limited here.
- the electronic device 100 and the router 300 may be associated with the same account, and the server 400 may record information that the electronic device 100 and the router 300 are associated with the same account.
- the electronic device 100 can communicate with the server 400 , and the electronic device 100 can also verify through the server 400 that the electronic device 100 and the router 300 are associated with the same account.
- the server 400 may receive an instruction from the electronic device 100 for controlling the router 300 (such as an instruction instructing the router 300 to be turned on).
- the server 400 may send the control instruction to the router 300, so that the router 300 executes the operation corresponding to the control instruction.
- the server 400 may also receive a message from the router 300 for reporting its state information (such as the number of devices connected to the router 300 ) to the electronic device 100 .
- the server 400 may send the above message indicating the state information of the router 300 to the electronic device 100, so that the electronic device 100 can receive the state information of the router 300.
- the electronic device 200 When the electronic device 200 needs to be connected to the router 300, the electronic device 200 receives the user's operation so that the electronic device 200 is turned on and is in the state of waiting for network distribution. Net IE.
- the router 300 After the router 300 receives and recognizes the distribution network IE of the electronic device 200 , the router 300 sends a request to the server 400 to generate registration information of the electronic device 200 .
- the server 400 receives and responds to the request, and the server 400 generates registration information of the electronic device 200 . Afterwards, the server 400 sends the registration information to the router 300 .
- router 300 After router 300 receives the registration information of electronic device 200 sent by server 400 , router 300 will negotiate key one with electronic device 200 through preset parameters, and encrypt the registration information by key one and send it to electronic device 200 . How the router 300 negotiates the key 1 with the electronic device 200 through preset parameters will be described in detail in subsequent embodiments, and details will not be described here in this embodiment of the present application. After the electronic device 200 receives the registration information of the electronic device 200 encrypted with the key one sent by the router 300, the electronic device 200 decrypts the registration information of the electronic device 200 encrypted with the key one according to the key one to obtain the electronic device 200 registration information.
- the electronic device 200 broadcasts the distribution network IE
- the server 400 generates the registration information of the electronic device 200
- the server 400 sends the registration information of the electronic device 200 to the router 300 and the electronic device 200. In FIG. 4 Not reflected.
- the electronic device 200 encrypts the registration information and verification information of the electronic device 200 with key one and sends them to the router 300 (corresponding to step 1 in FIG. 4 ), and the router 300 uses the key one to encrypt the information encrypted with the key one
- the registration information and verification information of the electronic device 200 are sent to the server 400 (corresponding to step 2 in FIG. 4 ).
- the server 400 After the server 400 receives the registration information and verification information of the electronic device 200, after the server 400 verifies that the electronic device 200 is a legal device according to the registration information and verification information of the electronic device 200, the server 400 will randomly generate auth code (such as auth code collection 1).
- the server 400 sends the auth code set one to the router 300 and the electronic device 200 (corresponding to step 3 in FIG. 4 ).
- the router 300 receives the auth code set one sent by the server 400, and the router 300 encrypts the auth code set one with the key one and sends it to the electronic device 200.
- the electronic device 200 After receiving the auth code set 1 encrypted with the key 1, the electronic device 200 decrypts the auth code set 1 encrypted with the key 1 with the key 1, and the electronic device 200 obtains the auth code set 1.
- the electronic device 200 and the router 300 will negotiate the key 2 through the auth code set 1, and the router 300 will share the network distribution information of the router 300 (such as the name and password of the router 300) through the key 2
- the electronic device 200 After sending to the electronic device 200 (corresponding to step 4 in FIG. 4 ), the electronic device 200 connects to the router 300 through the name and password of the router 300 after receiving the name and password of the router 300 .
- the electronic device 200 can establish a binding relationship with the electronic device 100 (for example, associate the same account).
- the electronic device 200 connects to the router 300 through the name and password of the router 300
- the router 300 sends information to the server 400
- the server 400 receives the information
- the server 400 can associate the electronic device 200 with the router 300 with the same account.
- the foregoing embodiments have introduced that the electronic device 100 and the router 300 have been associated with the same account, and at this time the electronic device 100, the router 300 and the electronic device 200 are also associated with the same account, so that the electronic device 200 can establish a binding relationship with the electronic device 100 .
- the electronic device 100 and the electronic device 200 are associated with the same account, and the server 400 records information that the electronic device 100 and the electronic device 200 are associated with the same account.
- the electronic device 100 can communicate with the server 400 , and the electronic device 100 can also verify through the server 400 that the electronic device 100 and the electronic device 200 are associated with the same account.
- the server 400 may receive an instruction from the electronic device 100 for controlling the electronic device 200 (such as an instruction to turn on the electronic device 200 ).
- the server 400 may send the control instruction to the electronic device 200, so that the electronic device 200 executes the operation corresponding to the control instruction.
- the server 400 may also receive a message from the electronic device 200 for reporting its own status information (such as a message indicating the battery level of the electronic device 200 ) to the electronic device 100 .
- the server 400 determines that the electronic device 100 and the electronic device 200 are associated with the same account, the server 400 can send the above message indicating the battery level of the electronic device 200 to the electronic device 100, so that the electronic device 100 can receive the message indicating the battery level of the electronic device 200.
- the electronic device 100 may communicate with the server 400 through any one of a cellular communication network, a wireless local area network (wireless local area network, WLAN), a wired network, and the like.
- a wireless local area network wireless local area network, WLAN
- the electronic device 100 can preferably communicate with the server 400 through the wireless local area network provided by the access router 300; when the electronic device 100 is not located near the router 300
- the electronic device 100 may communicate with the server 400 through any network provided by other devices, such as a wireless local area network, a cellular communication network, or a wired network. That is to say, the network distribution method provided by the embodiment of the present application does not require the electronic device 100 to access the wireless local area network of the router 300 , nor does it require the electronic device 100 to access the hotspot of the electronic device 200 .
- FIG. 5 exemplarily shows a schematic structural diagram of an electronic device 200 .
- the electronic device 200 may include: a processor 501, a memory 502, a wireless communication processing module 503, a wired LAN communication processing module 504, an HDMI communication processing module 505, a USB communication processing module 506, a display screen 507 and a power switch 508. in:
- Processor 501 may be used to read and execute computer readable instructions.
- the processor 501 may mainly include a controller, an arithmetic unit, and a register.
- the controller is mainly responsible for instruction decoding, and sends out control signals for the operations corresponding to the instructions.
- the arithmetic unit is mainly responsible for performing fixed-point or floating-point arithmetic operations, shift operations, and logic operations, and can also perform address operations and conversions.
- the register is mainly responsible for saving the register operands and intermediate operation results temporarily stored during the execution of the instruction.
- the hardware architecture of the processor 501 may be an application specific integrated circuit (ASIC) architecture, a MIPS architecture, an ARM architecture, or an NP architecture, and the like.
- ASIC application specific integrated circuit
- the processor 501 may be configured to analyze signals received by the wireless communication processing module 503 and/or the wired LAN communication processing module 504 , such as network configuration information sent by the router 300 and the like.
- the processor 501 may be configured to perform corresponding processing operations according to the analysis results, such as generating a probe response, or driving the display screen 507 to perform display according to the display request or display instruction, and so on.
- the processor 501 can also be used to generate a signal sent by the wireless communication processing module 503 and/or the wired LAN communication processing module 504, such as a Bluetooth broadcast signal, a beacon signal, or send a signal containing an electronic signal to the router 300.
- the signal of the distribution network IE of the device 200 can also be used to generate a signal sent by the wireless communication processing module 503 and/or the wired LAN communication processing module 504, such as a Bluetooth broadcast signal, a beacon signal, or send a signal containing an electronic signal to the router 300.
- the signal of the distribution network IE of the device 200 can also be used to generate a signal sent by the wireless communication processing module 503 and/or the wired LAN communication processing module 504, such as a Bluetooth broadcast signal, a beacon signal, or send a signal
- the memory 502 is coupled with the processor 501 for storing various software programs and/or sets of instructions.
- the memory 502 may include a high-speed random access memory, and may also include a non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices or other non-volatile solid-state storage devices.
- the memory 502 can store operating systems, such as embedded operating systems such as uCOS, VxWorks, RTLinux, and HarmonyOS.
- Memory 502 may also store a communication program that may be used to communicate with one or more servers, or additional devices.
- the wireless communication processing module 503 may include one or more of a WLAN communication processing module 5031 , a Bluetooth (BT) communication processing module 5032 , and an NFC processing module 5033 .
- BT Bluetooth
- the wireless communication processing module 503 may also include a cellular mobile communication processing module (not shown).
- the cellular mobile communication processing module can communicate with other devices (such as servers) through cellular mobile communication technology.
- the wired LAN communication processing module 504 can be used to communicate with other devices in the same LAN through the wired LAN, and can also be used to connect to the WAN through the wired LAN, and can communicate with devices in the WAN.
- the HDMI communication processing module 505 can be used to communicate with other devices through an HDMI interface (not shown).
- the USB communication processing module 506 can be used to communicate with other devices through a USB interface (not shown).
- the display screen 507 can be used to display images, videos and the like.
- the display screen 507 can be a liquid crystal display (liquid crystal display, LCD), an organic light-emitting diode (organic light-emitting diode, OLED) display screen, an active-matrix organic light-emitting diode (active-matrix organic light emitting diode, AMOLED) Display, flexible light-emitting diode (FLED) display, quantum dot light emitting diodes (QLED) display, etc.
- LCD liquid crystal display
- OLED organic light-emitting diode
- AMOLED active-matrix organic light-emitting diode
- FLED flexible light-emitting diode
- QLED quantum dot light emitting diodes
- the electronic device 200 may not include the display screen 507, which is not limited in this application.
- the power switch 508 can be used to control the power supply from the power source to the electronic device 200 .
- the structure shown in FIG. 5 does not constitute a specific limitation on the electronic device 200 .
- the electronic device 200 may include more or fewer components than shown in the figure, or combine certain components, or separate certain components, or arrange different components.
- the illustrated components can be realized in hardware, software or a combination of software and hardware.
- FIG. 6 exemplarily shows a schematic structural diagram of the router 300 .
- FIG. 6 shows a router provided by some embodiments of the present application.
- the router may include a processor 601, a memory 602, a WLAN communication module 603, an antenna 604, a wired local area network (local area network, LAN) communication processing module 605, and a bus 606.
- the processor 601 , the memory 602 , the WLAN communication module 603 , and the wired LAN communication processing module 605 may be connected through a bus 606 . in:
- the router shown in FIG. 6 is only an example, and the router may have more or fewer components than those shown in FIG. 6, may combine two or more components, or may have different components configuration.
- the various components shown in Figure 6 may be implemented in hardware, software, or a combination of hardware and software including one or more signal processing and/or application specific integrated circuits.
- a processor 601 may be used to read and execute computer readable instructions.
- the processor 601 may mainly include a controller, an arithmetic unit, and a register.
- the controller is mainly responsible for instruction decoding, and sends out control signals for the operations corresponding to the instructions.
- the arithmetic unit is mainly responsible for saving the register operands and intermediate operation results temporarily stored during the execution of the instruction.
- the hardware architecture of the processor 601 may be an application specific integrated circuit (ASIC) architecture, a MIPS architecture, an ARM architecture, or an NP architecture, and the like.
- ASIC application specific integrated circuit
- a memory may also be provided in the processor 601 for storing instructions and data.
- the memory in processor 601 is a cache memory.
- the memory may hold instructions or data that the processor 601 has just used or recycled. If the processor 601 needs to use the instruction or data again, it can be called directly from the memory. Repeated access is avoided, and the waiting time of the processor 601 is reduced, thus improving the efficiency of the system.
- the memory 602 is coupled with the processor 601 for storing various software programs and/or sets of instructions.
- the memory 602 may include a high-speed random access memory, and may also include a non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices or other non-volatile solid-state storage devices.
- the memory 602 can store operating systems, such as embedded operating systems such as uCOS, VxWorks, and RTLinux.
- the memory 602 can also store a communication program, which can be used to communicate with electronic devices or other devices.
- the memory 602 can also store the current configuration, routing table, and forwarding table. The routing table can be used to save routing information.
- the routing table is usually maintained by the routing protocol and the routing table management module, including more information (network address, next hop, timeout, etc.); the forwarding table can be generated based on the routing table, which is a router Used in actual forwarding, the router can send the data packet to the next-hop device according to the forwarding table.
- the WLAN communication module 603 can be used to modulate and demodulate electromagnetic wave signals, and the WLAN communication module 603 can convert the information and instructions sent by the processor 601 into electromagnetic wave signals.
- the received electromagnetic wave signal is converted into a digital signal and processed by the processor 601 .
- the antenna 604 can be used to transmit and receive electromagnetic wave signals, and the router can have one or more antennas.
- the wired LAN communication processing module may include one or more LAN physical interfaces, and the one or more LAN physical interfaces can be used for other electronic devices to establish connections with the router through network cables.
- the router can also include a wired wide area network (WAN) communication processing module, and the wired wide area network (WAN) communication processing module can include a WAN physical interface, and the WAN physical interface can be used to connect the router to the Internet.
- WAN wide area network
- the router may also include a network distribution key, which may be a "Hi key” or a "WPS key” and so on. This application does not limit the name of the network distribution key.
- the type of the network distribution key is a push type, a rotary type, or a toggle type. This application does not limit the type of the network distribution key.
- the router may also include a network distribution indicator light.
- the network distribution indicator light can flash to remind the user that the router has discovered a device to be network-provided.
- the router may also include a cellular communication module for communicating with a cellular communication base station. At this time, the router may not include the wired LAN communication processing module 605 .
- the router shown in FIG. 6 is only an implementation of the embodiment of the present application. In practical applications, the router may also include more or fewer components, which is not limited here.
- Step 1 The electronic device 200 is connected to the open ssid (non-authenticated network) of the router 300 .
- Step 2 The server 400 generates the registration information of the electronic device 200 and completes the verification tasks of the electronic device 200 .
- the router 300 sends a request to the server 400 to generate the registration information of the electronic device 200
- the server 400 receives and responds to the request
- the server 400 generates the registration information of the electronic device 200 .
- the server 400 sends the registration information of the electronic device 200 to the router 300
- the router 300 receives the registration information of the electronic device 200 sent by the server 400 and sends the registration information of the electronic device 200 to the electronic device 200 .
- the electronic device 200 sends the registration information and verification information to the server 400 through the router 300, and after the server 400 receives the registration information and verification information of the electronic device 200 and determines that the electronic device 200 is a legal device, the server 400 sends the electronic device 200 Bind with router 300.
- Step 3 After the server 400 determines that the electronic device 200 is a legal device, it sends the auth code set 1 to the router 300 , and the router 300 receives the auth code set 1 and sends the auth code set 1 to the electronic device 200 . Afterwards, the electronic device 200 and the router 300 negotiate a high-density channel through the auth code set one, and complete the transmission of distribution network information (such as the name and password of the router 300) through the high-density channel.
- distribution network information such as the name and password of the router 300
- Step 4 The electronic device 200 is connected to the WLAN where the router 300 is located.
- the electronic device 200 and the router 300 negotiate a high-density channel through the set of auth codes randomly issued by the server 400 , and different devices and the router 300 negotiate different high-density channels. Moreover, a device that fails the verification cannot establish a high-density channel with the router 300, thereby avoiding data eavesdropping and acquisition by the device that fails the verification. In this way, the security of network distribution information transmission between the electronic device 200 and the router 300 during the network distribution process is guaranteed.
- the electronic device 200 is connected to the open ssid of the router 300, and the two have only established a connection relationship.
- the electronic device 200 can transmit data with the router 300, but the electronic device 200 cannot use the wireless network of the router 300.
- the electronic device 200 is connected to the open ssid of the router 300 for subsequent electronic device 200 to transmit registration information and verification information to the server 400 through the router 300 and router 300 to transmit network distribution information to the electronic device 200.
- FIG. 7 exemplarily shows a flowchart of a method for connecting the electronic device 200 to the open ssid of the router 300 .
- S701-S705 exemplarily show the steps of the method for connecting the electronic device 200 to the open ssid of the router 300. It should be noted that, in some embodiments, the method for connecting the electronic device 200 to the open ssid of the router 300 may include more or less steps than S701-S705, which is not limited in this application. And this application does not limit the execution order of each step in S701-S705.
- the electronic device 200 is turned on, and the electronic device 200 is in a state of waiting for network distribution.
- the user operation for placing the electronic device 200 in the state of waiting for network distribution is the same as the user operation for placing the electronic device 200 in the state of waiting for network distribution in S101.
- the relevant description in S101 please refer to the relevant description in S101. Let me repeat.
- the electronic device 200 is in the state of waiting for network provisioning, which may also be referred to as the electronic device 200 is in the AP mode.
- the electronic device 200 sends the distribution network IE of the electronic device 200 in a broadcast form.
- the electronic device 200 In response to the electronic device 200 being in the configuration network state, the electronic device 200 sends the distribution network IE of the electronic device 200 in a broadcast form.
- the router 300 receives the network distribution IE of the electronic device 200, and receives the operation of the first user agreeing to network distribution.
- the router 300 sends a multicast packet, where the multicast packet carries the open ssid of the router 300.
- the router 300 receives the distribution network IE of the electronic device 200, and in response to the distribution network IE, the indicator light of the router 300 flickers, which is used to remind the user that the router 300 has found the electronic device 200 in the state of network distribution.
- the router 300 may also prompt the user in other ways that the router 300 has found the electronic device 200 that is in the state of network provisioning, which is not limited in this application.
- the router 300 When the indicator light of the router 300 is blinking, the router 300 receives a user operation agreeing to network distribution, and the user operation is used to indicate that the user agrees that the router 300 sends the open ssid to the electronic device 200 .
- the foregoing user operation may be an operation in which the router 300 receives a user trigger (for example, pressing) a network configuration key on the router 300 .
- the router 300 discovers the electronic device 200 to be network-distributed, the indicator light of the router 300 blinks, and at the same time, the router 300 sends information one to the server 400, and the information one is used for the server 400 to discover the router 300
- the prompt information of the electronic device 200 to be network-configured is displayed on the user interface of the first application program (for example, the smart life application program).
- the electronic device 100 can receive and respond to the user's input operation on the first application program, and the input operation indicates that the user agrees that the router 300 sends the open ssid to the device to be configured. Specifically, the electronic device 100 sends the information 2 to the server 400 through the first application program, and the server 400 forwards the information 2 to the router 300 .
- the router 300 After the router 300 receives the information two, the router 300 sends a multicast message, and the multicast message carries the open ssid of the router 300.
- the router 300 Before the router 300 sends the distribution network information to the electronic device 200, the router 300 continues to send the open ssid of the router 300.
- the electronic device 200 obtains the open ssid of the router 300 carried in the multicast packet sent by the router 300, and connects to the open ssid of the router 300.
- the electronic device 200 After the electronic device 200 receives the multicast message of the router 300 sent by the router 300, the electronic device 200 switches from the AP mode to the STA mode, and the electronic device 200 parses out the open ssid of the router 300 carried in the multicast message, and connects to the router 300 The open ssid.
- the electronic device 200 is connected to the open ssid of the router 300, and the two only establish a connection relationship, and the electronic device 200 can transmit data with the router 300.
- the electronic device 200 is connected to the open ssid of the router 300 for subsequent electronic device 200 to transmit registration information and verification information to the server 400 through the router 300 and router 300 to transmit network distribution information to the electronic device 200.
- the electronic device 200 sends a request to the server 400 to generate the registration information of the electronic device 200 through the router 300. After receiving the request, the server 400 generates the registration information of the electronic device 200 and completes the task of verifying the electronic device 200 .
- the router 300 After the electronic device 200 is connected to the open ssid of the router 300, the router 300 sends a request to the server 400 to generate the registration information of the electronic device 200, the server 400 receives and responds to the request, and the server 400 generates the registration information of the electronic device 200. Afterwards, the server 400 sends the registration information of the electronic device 200 to the router 300 , the router 300 receives the registration information of the electronic device 200 sent by the server 400 , and the router 300 sends the registration information of the electronic device 200 to the electronic device 200 . Afterwards, the electronic device 200 sends the registration information and verification information to the server 400 , and after the server 400 verifies that the electronic device 200 is a legitimate device, the server 400 binds the electronic device 200 to the router 300 .
- the server 400 first generates the registration information of the electronic device 200 , and the server 400 sends the registration information of the electronic device 200 to the electronic device 200 through the router 300 .
- the electronic device 200 sends the registration information and verification information of the electronic device 200 to the server 400 through the router 300 .
- the server 400 receives the registration information and verification information of the electronic device 200 sent by the electronic device 200 through the router 300 .
- the server 400 confirms that the registration information of the electronic device 200 sent by the electronic device 200 through the router 300 is the registration information sent by the server to the electronic device 200 through the router 300 before, and the server 400 preliminarily confirms that the electronic device 200 is a legal device.
- the server 400 further confirms that the verification information sent by the electronic device 200 through the router 300 is legal verification information, then the server 400 further determines that the electronic device 200 is a legal device, then the server 400 sends a message to the router 300, and the message uses The purpose is to inform the router 300 and the electronic device 200 that the distribution network information can be transmitted.
- the server 400 improves the security mechanism for the server 400 to verify the legitimacy of the device through the double verification mechanism. This ensures the security that the subsequent router 300 and the electronic device 200 can transmit distribution network information.
- the server 400 may not execute the steps in the tasks of generating the registration information of the electronic device 200 and completing the verification of the electronic device 200 shown in FIG. 8 . That is, in the embodiment shown in FIG. 7, after the electronic device 200 is connected to the open ssid of the router 300, the server 400 directly executes the embodiment shown in FIG. 9, that is, the server 400 directly randomly generates auth code (such as auth code set one) , and send the auth code set one to the router 300.
- the router 300 receives the auth code set one sent by the server 400 .
- the router 300 sends the auth code set one to the electronic device 200, and the electronic device 200 obtains the auth code set one.
- the embodiment of the present application does not limit whether the electronic device 200 , the router 300 and the server 400 execute each step in the tasks of generating the registration information of the electronic device 200 and completing the verification of the electronic device 200 shown in FIG. 8 .
- FIG. 8 exemplarily shows a flow chart of a method for the server 400 to generate registration information of the electronic device 200 and complete verification tasks of the electronic device 200 .
- S801-S808 exemplarily show the method steps for the server 400 to complete the registration and verification tasks of the electronic device 200 .
- the method steps for the server 400 to complete the registration and verification of the electronic device 200 may include more or less steps than S801-S808, which is not limited in this application. And this application does not limit the execution order of each step in S801-S808.
- the router 300 sends a request to the server 400 to generate registration information of the electronic device 200 .
- the router 300 After the electronic device 200 is connected to the open ssid of the router 300, the router 300 sends a request to the server 400 to generate the registration information of the electronic device 200. This request is used for the server 400 to generate registration information of the electronic device 200 .
- the server 400 receives and responds to the request for generating the registration information of the electronic device 200, and the server 400 generates the registration information of the electronic device 200.
- the server 400 sends the registration information of the electronic device 200 to the router 300.
- the router 300 obtains the registration information of the electronic device 200 .
- the server 400 After the server 400 receives the request sent by the router 300 to generate the registration information of the electronic device 200 , the server 400 agrees to the request sent by the router 300 , and the server 400 generates the registration information of the electronic device 200 . The server 400 sends the registration information of the electronic device 200 to the router 300 .
- the registration information may include, but not limited to, information such as a registration code of the electronic device 200 , and this application does not limit the type of information included in the registration information.
- the router 300 sends the registration information to the electronic device 200.
- the electronic device 200 acquires the registration information of the electronic device 200 .
- the router 300 and the electronic device 200 will negotiate a key through preset parameters— , and transmit registration information based on key one.
- preliminarily trusted devices may be referred to as "first-level whitelist devices". Only when the electronic device belongs to the "first-level white list device", the electronic device can initiate a registration request to the server, that is, the electronic device can access the server. In this way, it can be guaranteed that the device accessing the server is a trusted device.
- the router 300 and the electronic device 200 negotiate a key one through preset parameters.
- the router 300 After the router 300 receives the registration information of the electronic device 200 sent by the server 400, the router 300 and the electronic device 200 negotiate to obtain a key one through preset parameters.
- the key negotiation between the router 300 and the electronic device 200 through preset parameters can be completed before the router 300 sends a request for generating the registration information of the electronic device 200 to the server 400, or it can be completed after the router 300 sends the request for generating the registration information of the electronic device 200 to the server 400.
- the request for the registration information of the device 200 is completed later, which is not limited in this application.
- the key negotiation between the router 300 and the electronic device 200 through preset parameters may be completed before step S801, or may be completed after step S801, which is not limited in this application. As long as before step S804, the router 300 and the electronic device 200 have obtained the key one through negotiation of preset parameters.
- the router 300 and the electronic device 200 have been configured with the same preset parameters before leaving the factory.
- the router 300 and the electronic device 200 may download the preset parameters from the server and save them in the router 300 and the electronic device 200 . It should be noted that the preset parameters obtained by the router 300 and the electronic device 200 from the server are the same.
- the preset parameters may be integrated in a software development kit (software development kit,).
- SDK is a collection of relevant documents, examples and tools for the development of mobile application software (Application, APP).
- Application, APP mobile application software
- developers can hand over a certain function to a third party for development, and the third party will package a certain function into an SDK for developers to use. Therefore, it is only necessary to integrate the preset parameters into the SDK, and the router 300 and the electronic device 200 download the SDK from the server to obtain the preset parameters integrated in the SDK.
- the process of router 300 and electronic device 200 negotiating to obtain key 1 through preset parameters can refer to the process of router 300 and electronic device 200 negotiating to obtain key 2 through auth code set 1 introduced in the subsequent embodiments. I won't go into details here.
- the router 300 sends the registration information encrypted with the key one to the electronic device 200 .
- the router 300 In order to ensure the security of the data transmitted between the router 300 and the electronic device 200, the router 300 encrypts the registration information of the electronic device 200 with the key one, and sends the registration information of the electronic device 200 encrypted with the key one to the electronic device 200 .
- the electronic device 200 obtains the registration information.
- the electronic device 200 when the electronic device 200 receives the registration information encrypted with the key one sent by the router 300, the electronic device 200 decrypts the registration information encrypted with the key one through the key one to obtain the registration information.
- the electronic device 200 sends the registration information and verification information to the router 300.
- router 300 obtains registration information and verification information.
- the verification information may include one or more of the following: public key infrastructure (public key Infrastructure, KPI) certificate, software license (license).
- KPI public key Infrastructure
- license software license
- the electronic device 200 After the electronic device 200 obtains the registration information, the electronic device 200 will initiate a registration request to the server 400 , that is, the electronic device 200 will send the registration information and verification information to the router 300 .
- the electronic device 200 may also only send registration information to the router 300 .
- the electronic device 200 may also only send verification information to the router 300 .
- the electronic device 200 sends the registration information encrypted with the key one and the verification information encrypted with the key one to the router 300 .
- the electronic device 200 may also only send the registration information encrypted with key one to the router 300 .
- the electronic device 200 may also only send the verification information encrypted with the key one to the router 300 .
- the router 300 sends the registration information and verification information to the server 400.
- the server 400 obtains registration information and verification information.
- router 300 After router 300 acquires the registration information and verification information, router 300 sends the registration information and verification information to server 400 .
- the router 300 receives the registration information sent by the electronic device 200 , and the router 300 sends the registration information to the server 400 .
- the router 300 receives the verification information sent by the electronic device 200 , and the router 300 sends the verification information to the server 400 .
- the router 300 receives the registration information encrypted with the key one and the verification information encrypted with the key one sent by the electronic device 200, and the router 300 converts the registration information encrypted with the key one and the verification information encrypted with the key one based on the key one.
- the key-encrypted verification information is decrypted to obtain unencrypted registration information and unencrypted verification information, and the router 300 sends the unencrypted registration information and unencrypted verification information to the server 400 .
- the router 300 when the electronic device 200 only sends the registration information encrypted with the key one to the router 300, the router 300 receives the registration information encrypted with the key one sent by the electronic device 200, and the router 300 uses the key one based on the key one.
- the encrypted registration information is decrypted to obtain unencrypted registration information, and the router 300 sends the unencrypted registration information to the server 400 .
- the router 300 when the electronic device 200 only sends the verification information encrypted with the key one to the router 300, the router 300 receives the verification information encrypted with the key one sent by the electronic device 200, and the router 300 uses the key one based on the key one.
- the key-encrypted verification information is decrypted to obtain unencrypted verification information, and the router 300 sends the unencrypted verification information to the server 400 .
- the electronic device 200 when the electronic device 200 needs to send verification information to the server 400 through the router 300, before the server 400 verifies that the electronic device 200 is a legal device, the electronic device 200 obtains the verification information in advance and saves the verification information locally. That is, the acquisition and saving of the verification information by the electronic device 200 needs to be completed before S807.
- the electronic device 200 generates a pair of public-private keys (public key 1 and private key 1). After device A encrypts data with the private key 1, device B can encrypt the data with the private key 1 according to the public key 1 corresponding to the private key 1. After the encrypted data is decrypted and the unencrypted data is obtained, device A can also use the private key to encrypt the data, and device B can decrypt the data encrypted with the private key according to the private key corresponding to the public key. And get unencrypted data. After the electronic device 200 generates a pair of public and private keys, the electronic device 200 sends the public key one and a request for obtaining verification information to the server 400 .
- the server 400 After the server 400 receives the public key one and the request for obtaining the verification information, in response to the request for obtaining the verification information, the server 400 presets the public key one in the verification information, and then the server 400 will preset the public key one
- the verification information of is sent to the electronic device 200, and the electronic device 200 obtains the verification information preset with the public key one. It should be noted that the verification information is stored locally in the server 400 .
- the server 400 determines that the electronic device 200 is a legal device based on the registration information and the verification information, and binds the electronic device 200 to the router 300 .
- the server 400 may consider the electronic device 200 to be a safe device.
- secure devices may be referred to as "secondary whitelisted devices.” Only when the electronic device belongs to the "secondary white list device", the electronic device can obtain the distribution network information and connect to the wireless local area network where the router is located through the distribution network information. In this way, it can be ensured that the electronic equipment connected to the wireless local area network where the router is located is a safe equipment.
- the server 400 After receiving the registration information and verification information of the electronic device 200 forwarded by the router 300 , the server 400 will verify whether the electronic device 200 is a legitimate device according to the registration information and verification information of the electronic device 200 .
- the server 400 will verify whether the electronic device 200 is a legitimate device according to the registration information of the electronic device 200 .
- the server 400 will verify whether the electronic device 200 is a legitimate device according to the verification information of the electronic device 200 .
- the server 400 may verify whether the electronic device 200 is a legal device according to any of the following methods.
- Way 1 The server 400 verifies that the electronic device 200 is a legitimate device through the registration information and verification information.
- the server 400 can preliminarily determine that the electronic device 200 is legal. device of.
- the server 400 further verifies that the electronic device 200 is a legitimate device through the verification information.
- the following describes how the server 400 further verifies that the electronic device 200 is a legitimate device according to the verification information.
- the server 400 can obtain the public key 1 preset in the verification information, and the server 400 will randomly generate a random number, and pass the random number and verification The public key one preset in the information verifies the legitimacy of the electronic device 200 .
- the attacker's electronic device sends the verification information preset with the public key one to the server 400 through the router 300 .
- the server 400 may confirm the attacker's electronic device as a legitimate device. Therefore, in order to prevent this from happening, the server 200 will further verify the legitimacy of the electronic device 200 according to the random number after receiving the verification information preset with the public key one sent by the electronic device 200 . In this way, the security of the distribution network information of the subsequent transmission router 300 can be improved.
- the server 400 will randomly generate a random number, and send the random number to the electronic device 200 through the router 300 .
- the electronic device 200 After the electronic device 200 receives the random number through the router 300 , the electronic device 200 encrypts the random number with the private key one, and then the electronic device 200 sends the random number encrypted with the private key one to the server 400 through the router 300 .
- the server 400 receives the random number encrypted with the private key 1 sent by the electronic device 200 through the router 300 , and the server 400 decrypts the random number encrypted with the private key 1 with the public key 1 corresponding to the private key 1 .
- the server 400 can receive the random number encrypted with the private key sent by the electronic device 200, and decrypt the random number encrypted with the private key with the corresponding public key, then the server 400 determines that the electronic If the device 200 is a legitimate device, the router 300 and the electronic device 200 can transmit network distribution information.
- the server 400 can receive the verification information and registration information sent by the electronic device 200 , but the server 400 cannot receive the private key-encrypted random number sent by the electronic device 200 . Because the private key one is generated by the legitimate device before applying for verification information to the server 400 , illegal devices cannot obtain the private key one in the electronic device 200 . In this way, the server 400 further improves the security mechanism for the server 400 to verify the legitimacy of the device through the double verification mechanism. This ensures the security that the subsequent router 300 and the electronic device 200 can transmit distribution network information.
- the server 400 after the server 400 receives the registration information and verification information of the electronic device 200 sent by the electronic device 200 through the router 300, the server 40 does not need to generate random numbers to verify the legitimacy of the electronic device 200.
- the server 400 only needs to confirm that the registration information of the electronic device 200 sent by the electronic device 200 through the router 300 is the registration information previously sent by the server to the electronic device 200 through the router 300, and the server 400 obtains the pre-registered information in the verification information from the verification information. Once the public key is set, the server 400 can confirm that the electronic device 200 is a legitimate device.
- Method 2 The server 400 only verifies that the electronic device 200 is a legal device through the registration information.
- the electronic device 200 only needs to send the registration information to the server 400, and the server 400 only needs to verify that the electronic device 200 is a legal device through the registration information of the electronic device 200.
- the electronic device 200 sends the registration information of the electronic device 200 to the server 400 through the router 300.
- the registration information of the electronic device 200 sent is the same as the registration information sent by the server to the electronic device 200 through the router 300 before, and the server 400 can confirm that the electronic device 200 is a legal device.
- the server 400 only verifies that the electronic device 200 is a legitimate device through the verification information.
- the electronic device 200 only needs to send the verification information to the server 400, and the server 400 only needs to verify that the electronic device 200 is a legitimate device through the verification information of the electronic device 200.
- the electronic device 200 only needs to send the verification information of the electronic device 200 to the server 400 through the router 300.
- the server 400 After the server 400 receives the verification information of the electronic device 200 sent by the electronic device 200 through the router 300, the server 400 passes the verification information. The information verifies that the electronic device 200 is a legitimate device.
- the server 400 After the server 400 verifies that the electronic device 200 is a legitimate device, the server 400 stores the binding relationship between the electronic device 200 and the router 300 . And associate the electronic device 200 and the router 300 with the same account. After the electronic device 200 and the router 300 are associated with the same account, the server 400 records information that the electronic device 200 and the router 300 are associated with the same account.
- the electronic device 200 can communicate with the server 400 , and the electronic device 200 can also verify through the server 400 that the electronic device 200 and the router 300 are associated with the same account.
- the server 400 may receive an instruction from the electronic device 200 for controlling the router 300 (such as an instruction instructing the router 300 to turn on).
- the server 400 may send the control instruction to the router 300, so that the router 300 executes the operation corresponding to the control instruction.
- the server 400 After verifying that the electronic device 200 is a legal device, the server 400 sends the auth code set one to the router 300, the router 300 receives the auth code set one sent by the server 400, and the router 300 sends the auth code set one to the electronic device 200. Afterwards, the electronic device 200 and the router 300 negotiate the key 2 through the auth code set 1, and complete the transfer of distribution network information (such as the name and password of the router 300) through the key 2.
- distribution network information such as the name and password of the router 300
- the auth code set one is randomly generated by the server 400, and the auth code set one may include one or more auth codes.
- FIG. 9 exemplarily shows a flowchart of a method for transmitting network distribution information between the electronic device 200 and the router 300 .
- S901-S906 exemplarily show the method steps for the electronic device 200 and the router 300 to transmit network distribution information. It should be noted that, in some embodiments, the steps of the method for transmitting network distribution information between the electronic device 200 and the router 300 may include more or less steps than S901-S906, which is not limited in this application. And the present application does not limit the execution order of each step in S901-S906.
- the server 400 sends the auth code set one to the router 300.
- the router 300 sends the auth code set one to the electronic device 200.
- the server 400 After the server 400 verifies that the electronic device 100 is a legal device, the server 400 randomly generates auth code (auth code set one), and sends the auth code set one to the router 300, and the router 300 receives the auth code set one sent by the server 400, and the router 300 then sends the auth code set 1 to the electronic device 200, so that the subsequent router 300 and the electronic device 200 can negotiate the key 2 according to the auth code set 1 to transmit network distribution information.
- auth code auth code set one
- the set of auth codes randomly generated by the server 400 is different for different network devices to be provisioned. Therefore, the keys 2 negotiated by different network devices to be provisioned and the router 300 according to the auth code set 1 are also different. In this way, the security of the transmission of network distribution information between the electronic device 200 and the router 300 is further improved.
- the electronic device 200 and the router 300 negotiate key two according to the auth code set one.
- the electronic device 200 and the router 300 may negotiate the key 2 according to the auth code set 1 according to the Diffie Hellman (DH) algorithm.
- the electronic device 100 and the router 300 may negotiate to obtain the key 2 according to the auth code set 1 through other algorithms, which is not limited in this embodiment of the present application.
- the electronic device 200 and the router 300 negotiate the key 2 according to the auth code set 1 through the DH algorithm for illustration.
- the electronic device 200 and the router 300 will only pass the parameters in the formula that calculates the key 2 through the formula, and will not directly pass the key 2. In this way, if an attacker is monitoring the communication process between the electronic device 200 and the router 300, even if the attacker obtains the parameters in the formula for calculating the key 2, the attacker does not know which formula is used to obtain the key 2, so the attack It is difficult for the reader to obtain the key two.
- the electronic device 200 and the router 300 negotiate the key 2 in this way, which ensures that the key 2 cannot be stolen by an attacker, and ensures the security of the electronic device 200 and the router 300 transmitting distribution network information.
- the DH algorithm can include but not limited to the following steps:
- Step 1 The router 300 sends the prime number P and the prime number G to the electronic device 200 .
- prime number P is a very large number
- prime number G may be a relatively small number, which is not limited in this application.
- the prime number P and the prime number G may also be generated by the electronic device 200 and sent to the router 300, which is not limited in this embodiment of the present application.
- Step 2 The electronic device 200 calculates the value of (GA ) mod P, and sends the value of (GA ) mod P to the router 300 .
- Step 3 The router 300 calculates the value of ( GB ) mod P, and sends the value of ( GB ) mod P to the electronic device 200 .
- the auth code set 1 includes m auth codes, where m is greater than or equal to 1.
- A represents the auth code in the auth code set one.
- m is greater than or equal to 2
- A represents the product of m auth codes in auth code set 1.
- the calculation principle of B is similar to that of A.
- Step 4 The electronic device 200 can calculate the key 2 according to formula 1 according to the value of ( GB ) mod P sent by the router 300 .
- K G A*B mod P.
- A is the auth code set 1 sent by the server 400 to the electronic device 200
- K is the key 2 obtained through negotiation between the electronic device 200 and the router 300 .
- Step 5 The router 300 can calculate the key 2 according to the formula 2 according to the value of (GA ) mod P sent by the electronic device 200 .
- K G A*B mod P.
- B is the auth code set 1 sent by the server 400 to the router 300
- K is the key 2 obtained through negotiation between the electronic device 200 and the router 300 .
- the key 2 obtained through negotiation between the electronic device 200 and the router 300 is the same. Afterwards, the electronic device 200 and the router 300 can transmit network configuration information through the second key.
- the formula shown in the above embodiment is only for explaining the process of negotiating the key 2 between the electronic device 200 and the router 300.
- the formula for calculating the key in the DH algorithm can be the same as that calculated in the above steps
- the formulas for obtaining the second key are the same or different, which is not limited in this application.
- the way in which the electronic device 200 and the router 300 negotiate to obtain the key 2 through the DH algorithm can improve the security of subsequent transmission of distribution network information.
- the electronic device 200 and the router 300 negotiate to obtain the key 2 through the DH algorithm.
- the electronic device 200 and the router 300 only pass the parameter value in the formula, even if an attacker is monitoring the communication between the electronic device 200 and the router 300 process, and intercepted the parameter value in the formula passed between the electronic device 200 and the router 300, it is also difficult to calculate the real key according to the parameter value in the formula; on the other hand, the server 400 has verified that the electronic device 200 is After the legitimate device, the server 400 will send auth code set 1 to the router 400 and the electronic device 200, that is, after different devices initiate verification to the server 400 at different times, the server 400 randomly sends the auth code set 1 to different electronic devices It is also different, that is, different devices and the router 300 negotiate different keys through the DH algorithm, and it is difficult for an attacker to obtain the key. In this way, the security of transmission of distribution network information between different devices and the router 300 is further improved.
- the router 300 sends the network distribution information encrypted with the second key to the electronic device 200.
- the electronic device 200 obtains the network distribution information encrypted with the second key.
- the electronic device 200 decrypts the distribution network information encrypted with the key 2 through the key 2 to obtain the distribution network information.
- the router 300 encrypts the network distribution information with the second key, and sends the network distribution information encrypted with the second key to the electronic device 200 .
- the electronic device 200 After the electronic device 200 receives the network distribution information encrypted with the key 2, the electronic device 200 decrypts the network distribution information encrypted with the key 2 according to the key 2 to obtain the network distribution information of the router 300 .
- the router 300 After the router 300 sends the network distribution information encrypted with the key 2 to the electronic device 200, the router 300 stops sending the open ssid of the router 300.
- the electronic device 200 connects to the router 300 based on the network distribution information of the router 300 .
- the network distribution information may include but not limited to the name and password of the router 300, etc.
- the network distribution information may also include other more information, which is not limited in this application.
- the electronic device 200 After the electronic device 200 obtains the network configuration information of the router 300, the electronic device 200 connects to the router 300 based on the network configuration information of the router. In this way, the electronic device 200 can access the Internet through the router 300 .
- the remote distribution network application scenario refers to that user A who operates electronic device 100 can also remotely guide user B who operates electronic device 200 to power on electronic device 200, and user A remotely completes the configuration of electronic device 200 by operating electronic device 100.
- network Specifically, the router 300 discovers the electronic device 200 in the state of waiting for network distribution, and the electronic device 100 displays that the electronic device 200 in the state of waiting for network distribution is found on the remote network distribution interface of the first application program (such as a smart life application program). prompt information.
- the electronic device 100 may receive user A's input operation on the remote network distribution interface of the first application program, and trigger the router 300 to send the network distribution information to the electronic device 200 in the state of network distribution, so that the electronic device 200 receives the router's
- the electronic device 200 connects to the router 300 through the distribution network information sent by the router 300 .
- User A and user B may not be the same user, and user A does not need to be near the router 300 and the electronic device 200. In this way, even if user A does not operate the router 300 and the electronic device 200, he can remotely set the The electronic device 200 is connected to the router 300 .
- a child buys a smart product (such as a smart speaker) for the parents at home
- the parents do not know how to connect the smart speaker to the router at home.
- the children guide their parents by phone to power on the smart speaker and put it in the state of waiting for network distribution.
- the smart speaker broadcasts network distribution cells.
- the indicator light of the router is flashing at this time. If the parents do not know how to press the network distribution button of the router, or the router is in a place where it is inconvenient to obtain, such as a weak current box or the top of a cabinet.
- the child can enter the remote network distribution interface of the first application program (such as the smart life application program) through his mobile phone, and the child's mobile phone can display on the remote network distribution network interface of the smart life application program that it has found a device that is in the state of waiting for network distribution.
- the prompt information of the device the child confirms that the device to be distributed on the remote network distribution interface is the smart speaker bought by the parents, then the mobile phone can receive the input operation of the child on the remote network distribution interface, and in response to the input operation, the router 300 Send the distribution network information to the smart speaker, and the smart speaker will connect to the home router after obtaining the distribution network information.
- the home application scene includes a first room area 901 , a second room area 902 and a living room area 903 .
- the first room area 901 includes a smart TV 9012
- the second room area 902 includes a smart speaker 9013
- the living room area 903 includes a router 300 and a smart projector 9014 and so on.
- the user who turns on the electronic device 200 so that the electronic device 200 is in the state of waiting for network distribution may not be the same user as the user who inputs operations on the electronic device 100, It can also be the same user.
- user B the user who turns on the electronic device 200 so that the electronic device 200 is in the state of waiting for network distribution
- user A the user who enters the operation on the electronic device 100
- user B needs to be in the home shown in Figure 9A to turn on the electronic device 200 so that the electronic device 200 is in the state of waiting for network distribution
- user A may not be in the home shown in Figure 9A, and does not need to access the A router 300 in a home is shown.
- User A can remotely instruct user B to power on the electronic device 200 , and then remotely operate the electronic device 100 to complete the network distribution of the electronic device 200 . Therefore, remote network distribution can be realized by applying this solution.
- the network distribution method provided by the embodiment of the present application is applied to the remote network distribution scene. On the one hand, it can reduce the learning cost of user B, simplify the operation of user B, and the remote user A can complete the network distribution operation for user B.
- the server 400 before the router 300 sends the distribution network information to the electronic device 200, the server 400 will check whether the electronic device 200 is a legitimate device.
- the server 400 After the server 400 verifies that the electronic device 200 is a legitimate device, the server 400 randomly generates a set of auth codes and sends them to the router 300 and the electronic device 200, and the router 300 and the electronic device 200 use the set of auth codes to negotiate a key to encrypt the transmission configuration. network information. It can be seen from the analysis of the foregoing embodiments that after different devices initiate verification to the server 400 at different times, the set of auth codes randomly sent by the server 400 to different devices is also different. The security of network distribution information transmission between the router 300 and the electronic device 200 is further improved.
- FIG. 9B-FIG. 9F exemplarily show UI diagrams of the user controlling the connection of the electronic device 200 to the router 300 on the remote network configuration interface of the first application program.
- FIG. 9B exemplarily shows a user interface 910 of the electronic device 100 .
- the user interface 910 may include icons of some application programs. For example, icon 9001 for file management, icon 9002 for email, icon 9003 for music, icon 9004 for smart life, icon 9005 for sports and health, icon 9006 for weather, icon 9007 for camera, icon 9008 for address book, and icon for phone 9009. Information icon 9010.
- user interface 910 may include icons for more or fewer applications.
- the user interface 910 may include icons of some application programs different from those shown in FIG. 9B , which is not limited here.
- the electronic device 100 may start the smart life in response to a user operation acting on the smart life icon 9004 on the user interface 910 .
- FIG. 9C exemplarily shows a user interface 920 displayed after the electronic device 100 starts the smart life.
- the user interface 920 is the main page provided by the smart life application.
- the user interface 920 includes one or more electronic devices associated with the same account, and the one or more electronic devices associated with the same account have a binding relationship.
- the user interface 920 exemplarily shows the router 300 , the router 300 is in an online state, and the router 300 is placed in the living room area 903 shown in FIG. 9A .
- the smart TV 9012 is online, and the smart TV 9012 is placed in the first room area 901 shown in FIG. 9A .
- the smart projector 9014 is offline, and the smart projector 9014 is placed in the living room area 903 shown in FIG. 9A .
- online state may refer to a state in which the electronic device 200 can communicate with the server 400 or with the electronic device 100, and the user A can control the electronic device 200 in the online state through the electronic device 100, or obtain status information of the electronic device 200;
- offline state may refer to a state in which the electronic device 200 cannot communicate with the server 400 or the electronic device 100 , and the user A cannot control the electronic device 200 in the offline state through the electronic device 100 .
- the electronic device 200 When the user B operating the electronic device 200 needs to establish a connection between the electronic device 200 and the router 300 , the electronic device 200 is already in a state of waiting for network distribution and is near the router 300 . But user B is not familiar with the operation of establishing a connection between the electronic device 200 and the router 300 . Then user A who operates the electronic device 100 can check in the remote network configuration interface of the first application program to see if there is a prompt message about the router 300 finding the electronic device 200 that is in the state of network distribution, if user A confirms the remote network configuration The prompt information displayed on the interface is exactly the information of the electronic device 200 that needs network distribution, then the electronic device 100 can receive the confirmation operation of user A, and the router 300 sends the network distribution information of the router 300 to the electronic device 200 .
- the icon 9201 may receive a user's trigger (for example, click) operation, and in response to the user's trigger operation, the electronic device 200 displays the user interface 930 as shown in FIG. 9D .
- a user's trigger for example, click
- the user interface 930 includes an information bar 9301, and the information bar 9301 includes an icon 9302.
- the icon 9302 can receive a user's trigger (for example, click) operation, and in response to the user's trigger operation, the electronic device 100 displays the remote distribution network as shown in FIG. 9E
- the user interface 940 of the contains the text "remote distribution network", but it should be understood that the text information can also be “distribution network", that is to say, whether it is remote distribution network or non-remote distribution network, the implementation of this application All the network distribution methods provided in the examples are applicable, and the content shown in the drawings does not constitute a limitation to the embodiments of the present application.
- the user interface 940 may include a prompt bar 9401 , and the prompt bar 9401 includes icons, names (for example, smart speakers) and controls 9402 of devices found by the router 300 to be provisioned.
- the electronic device 100 can receive and respond to the user's trigger operation (for example, single click) on the control 9402, which means that the user agrees that the router 300 will send the open ssid to the device to be configured. Specifically, the electronic device 100 sends the information 2 to the server 400 through the first application (such as the smart life application mentioned here), and the server 400 forwards the information 2 to the router 300 .
- the user's trigger operation for example, single click
- the electronic device 100 sends the information 2 to the server 400 through the first application (such as the smart life application mentioned here), and the server 400 forwards the information 2 to the router 300 .
- the electronic device 100 may also automatically pop up and display the prompt bar 9401 in its user interface in response to the prompt information sent by the server 400 that the electronic device 200 is found to be in the state of network provisioning. Instead of requiring the user to click the icon 9302, the prompt bar 9401 is displayed.
- the electronic device 100 before the electronic device 100 automatically pops up and displays the prompt bar 9401, the electronic device 100 can be in any user interface, such as the main screen, the negative screen, the interface of other application programs, the interface of the smart life application program, the lock screen interface, and the screen-off interface. interface etc. In this way, the user A can obtain the prompt information related to the distribution network of the electronic device 200 at any time, so as to respond in time and make user operations in time.
- the router 300 After the router 300 receives the information 2, the router 300 sends the open ssid to the device (such as the electronic device 200) to be configured.
- the device such as the electronic device 200
- the electronic device 200 receives the open ssid of the router 300 and connects to the open ssid of the router 300 . Afterwards, after the electronic device 200 establishes a binding relationship with the router 300 through the embodiment shown in FIG. 8 , the electronic device 200 and the router 300 are associated with the same account. Then the icon, name and connection status of the electronic device 200 can be displayed in the user interface 950 .
- the user interface 950 includes one or more electronic devices associated with the same account, and the one or more electronic devices associated with the same account have a binding relationship.
- the router 300, the smart TV 9012, the smart projector 9014 and the electronic device 200 are all associated with the same account.
- the user interface 950 exemplarily shows that the router 300 is in an online state. Smart TV 9012 is online. Smart projector 9014 is offline. The electronic device 200 is in an online state.
- the status of the electronic device 200 can be displayed as “Connecting”, “distributing network”, “configuring”, etc.; when the electronic device 200 completes the entire network distribution process, the status of the electronic device 200 can be displayed as "online” or "connected” in the user interface 950 , "Network distribution completed” and so on. Therefore, the user A can accurately perceive the network distribution progress of the electronic device 200 through the electronic device 100 .
- the user interface of the electronic device 100 may also display a failure prompt message to inform user A of the network distribution process. failure, so that user A can take action in time to troubleshoot the cause, for example, user A can call user B to ask whether the power supply of electronic device 200 is plugged in firmly, whether the router is working normally, etc.
- the electronic device 200 and the router 300 can obtain the distribution network information of the router 300 through the embodiment shown in FIG. 9 , and the electronic device 200 is connected to the router 300 through the distribution network information of the router 300 where the wireless LAN is located. In this way, the whole process of remote network distribution for the electronic device 200 is completed.
- One-click network configuration refers to the network configuration for one or more devices to be configured at one time. That is, the user only needs to operate once, and the router 300 continuously sends the open ssid, and completes the network distribution process of multiple devices to be configured connected to the open ssid of the router 300 in turn, and determines the open ssid connected to the router 300 on the router 300 After the number of is 0, the router 300 stops sending open ssid.
- router 300 discovers the smart speakers and smart projectors that are waiting for network distribution. After the smart speaker and the smart projector are connected to the open ssid of the router 300, the router 300 can complete the network distribution process with the smart speaker and the smart projector in turn. It can be seen that the router 300 only needs to receive a user operation agreeing to network distribution to complete the network distribution process with multiple smart single products. Compared with the current router 300 that can only complete the network distribution process of one device after receiving a user operation that agrees to network distribution, the embodiment of the present application can realize simultaneous network distribution of multiple devices and improve the efficiency of multi-device network distribution.
- the router 300 After the router 300 receives a message carrying a distribution network IE sent by one or more nearby electronic devices that are in the state of waiting for network distribution, the router 300 is not limited to the blinking of the indicator light of the router 300, and the router 300 can also pass other The method prompts the user that the router 300 has found one or more electronic devices that are in the state of network distribution, which is not limited in this application.
- the router 300 After the indicator light of the router 300 flickers, the router 300 receives the first user operation agreeing to network distribution, and the first user operation is used to indicate that the user agrees that the router 300 sends the open ssid to one or more electronic devices in the state of network distribution.
- the first user operation may also be an input operation on the one-key network configuration interface of the first application program, and the first user operation may also be an operation in which the router 300 receives a user trigger (for example, pressing) the network configuration key on the router 300; the present application
- a user trigger for example, pressing
- the embodiment does not limit the specific implementation of the operation of the first user agreeing to network allocation.
- 10A-10B are schematic diagrams of the electronic device 100 receiving a first user operation on the one-key network configuration interface of the first application program.
- the electronic device 100 receives a user operation to open a first application program (such as a smart life application program).
- a first application program such as a smart life application program
- the electronic device 100 receives the user's operation of opening the one-key network configuration interface in the first application program.
- the icon 9201 may receive a user's trigger (for example, click) operation, and in response to the user's trigger operation, the electronic device 100 displays the user interface 960 as shown in FIG. 10A .
- a user's trigger for example, click
- the user interface 960 includes an information bar 1001, and the information bar 1001 includes an icon 1002.
- the icon 1002 can receive a user's trigger (for example, click) operation, and in response to the user's trigger operation, the electronic device 100 displays the one-key configuration The user interface 970 of the web.
- the user interface 970 may include one or more icons of electronic devices in a state of waiting for network configuration discovered by the router 300 and a control 1003 .
- the icons of the electronic devices in the network-to-be-configured state discovered by the router 300 are the icons of the electronic device 200 (smart speaker) and the icon of the electronic device 500 (smart camera).
- the electronic device 100 can receive and respond to the user's trigger operation (such as clicking) on the control 1003. This operation means that the user agrees that the router 300 will send the open ssid, and the electronic device 100 can use the first application program (such as the wisdom described here) life application program) sends the information two to the server 400, and the server 400 forwards the information two to the router 300.
- the first application program such as the wisdom described here
- the router 300 After the router 300 receives the message 2, the router 300 sends the open ssid. It can be understood that, in the application scenario of one-key network configuration, the router 300 continuously sends the open ssid. The user can only click the icon 1003 once to make multiple devices to be configured to complete the network configuration process with the router 300 at one time.
- the router 300 After the router 300 continuously sends the open ssid in the form of broadcast, one or more electronic devices in the state of waiting for network distribution receive the open ssid sent by the router 300. Afterwards, through the embodiments shown in FIGS. 7-9 above, the router 300 establishes connections with the one or more electronic devices in turn, so that the one or more electronic devices can pass through the embodiments shown in FIGS. 7-9 above. Obtain the network distribution information of the router 300, and connect to the router 300 through the network distribution information of the router 300.
- the electronic device 200 (smart speaker) and the electronic device 500 (smart camera) receive and connect to the open ssid of the router 300.
- the server 400 will sequentially associate the smart speaker, the smart camera and the router 300 with the same account through the embodiment of FIG. 8 .
- the smart speaker, smart camera and router 300 are associated with the same account.
- the icon, name and connection status of the smart speaker and the icon, name and connection status of the smart camera can be displayed in the user interface 920 .
- the user interface 980 includes one or more electronic devices associated with the same account, and the one or more electronic devices associated with the same account have a binding relationship.
- the router 300, the smart TV 9012, the smart projector 9014, the smart speaker and the smart camera are all linked to the same account.
- the user interface 980 exemplarily shows that the router 300 is in an online state.
- Smart TV 9012 is online.
- Smart projector 9014 is offline.
- the smart speaker 200 is online.
- Smart Camera 500 is online.
- the smart speaker and the smart camera After the smart speaker and the smart camera are connected to the open ssid of the router 300, the smart speaker and the smart camera can obtain the distribution network information of the router 300 through the embodiment shown in FIG.
- the distribution network information of the router 300 is connected to the wireless local area network.
- the router 300 continuously sends the open ssid of the router 300, in some embodiments, during the process of establishing a connection between the router 300 and one or more electronic devices in the state of the network to be distributed, there are other The electronic device in the state of network distribution is connected to the open ssid of the router 300 .
- the router 300 will determine the number of electronic devices connected to the open ssid of the router 300, if If the number of electronic devices connected to the open ssid of the router 300 is greater than or equal to 1, the router arbitrarily selects a device from the electronic devices connected to the open ssid of the router 300 to complete the network distribution process until the router 300 determines the open ssid connected to the router 300 The number of electronic devices is 0.
- the router 300 After the router 300 determines that the number of electronic devices connected to the open ssid of the router 300 is 0, the router will continue to continuously send the open ssid of the router 300 for a certain period of time. If within a certain period of time, other devices to be distributed are connected to the open ssid of router 300, other devices to be distributed will obtain the distribution network information of router 300 through the embodiments shown in Figures 7-9 above, And connect to the router 300 through the distribution network information of the router 300 . If within a certain period of time, no other device to be distributed is connected to the open ssid of the router 300, then the router 300 will disable the function of sending the open ssid, and the distribution network connection ends.
- the router 300 only needs to receive one user operation to complete the network distribution task items with one or more network devices to be distributed, realizing "one-key network distribution", and improving the communication between multiple network devices to be distributed.
- the network distribution efficiency of the router 300 is the reason for the router 300.
- FIGS 11-13 exemplarily show several "one-key network configuration" flow charts provided by the embodiment of this application.
- the "one-key network configuration" process may include S1101-S1106.
- the router discovers the device to be distributed, and responds to the first user operation, continuously sends the open ssid of the router (that is, executes S1101, S1102), and starts sending the open ssid at the moment
- investigate whether there is one or more electronic devices accessing the open ssid of the router within the first preset time after this moment that is, execute the judgment step of S1103).
- the router completes one or more electronic devices connected to the open ssid of the router in turn.
- the network distribution process until the number of electronic devices connected to the open ssid of the router is 0 that is, execute S1104.
- the router can continue to continuously send open ssid, so during this process, one or more electronic devices that are in the state of waiting for network distribution can also be continuously connected to the open ssid of the router , the router will also complete the network distribution process with these newly connected one or more electronic devices in sequence, until the number of electronic devices connected to the open ssid of the router is 0.
- the router can also start the timer again to investigate whether there is one or more electronic devices connected to the open ssid of the router within the second preset time after executing S1104 (that is, execute the judgment step of S1105) , if yes, execute S1104 again, otherwise execute S1106.
- the router can also start the timer again, and the moment when it is judged as "No” is used as the starting point of timing (or , taking the timing end time of the first preset time as the starting point of timing), investigate whether there is one or more electronic devices connected to the open ssid of the router within the second preset time after this moment (that is, execute the judgment step of S1105 ), if there is (that is, S1105 judges as "yes"), then execute S1104, otherwise execute S1106, end distribution network, router stops sending open ssid.
- the second preset time may be the same as or different from the first preset time.
- the router will wait for a period of time after sending the open ssid to check whether there are one or more electronic devices connected during this period of time. If so, the router will complete the communication with the one or more distribution network of electronic devices.
- the router can still continue to send open ssid continuously, so that during this period, new devices that are waiting to be networked can be connected to the open ssid of the router, and the router can also sequentially Complete the network configuration process for these newly connected devices.
- the router will also execute the judgment step of S1105, that is, when the router judges that the number of electronic devices currently connected to the router's open ssid is 0, the router will It is not to end the distribution network directly and stop sending open ssid, but to wait for a period of time to check whether there are new electronic devices to be connected to the open ssid of the router during this period of time. If so, the router will also Complete the network configuration process for these newly connected devices.
- FIG. 12 is similar to FIG. 11 , S1201 is similar to S1101 , and S1202 is similar to S1102 .
- the difference is that the process shown in Figure 12 may not include S1105 in the embodiment of Figure 11, that is, after S1203 is judged as "No" or after S1204 is executed, the router can directly end the network configuration without waiting for the second preset time .
- the embodiment of the present application also provides a "one-key network distribution process" as shown in FIG. 13 .
- FIG. 13 is similar to FIG. 11
- S1301 is similar to S1101
- S1302 is similar to S1102 .
- the router does not wait for the second preset time, and the router can directly execute S1306 to end the network configuration.
- the flow process shown in FIG. 13 still includes S1303 (equivalent to S1103 in the embodiment of FIG. 11 ), S1304 (equivalent to S1104 in the embodiment of FIG. 11 ), and S1305 (equivalent to S1105 in the embodiment of FIG. 11 )
- S1303 Equivalent to S1103 in the embodiment of FIG. 11
- S1304 equivalent to S1104 in the embodiment of FIG. 11
- S1305 equivalent to S1105 in the embodiment of FIG. 11
- FIG. 14 is a schematic flowchart of a method for network distribution provided by an embodiment of the present application.
- the electronic device 200 accesses the non-authentication network of the router 300.
- the electronic device 200 may also be called a first electronic device.
- Router 300 may be called a wireless access device.
- the electronic device 200 broadcasts the distribution network information element of the electronic device 200, wherein the distribution network information element is used to make other electronic devices discover the Electronic device 200.
- the distribution network information element of the electronic device 200 includes one or more of the following: the identification of the electronic device 200 , whether the electronic device 200 supports interconnection capability, the physical address of the electronic device 200 , and the like.
- the router 300 After the router 300 receives the distribution network IE of the electronic device 200, the router 300 sends the access information of the router 300.
- the access information of the router 300 may include the identification of the non-authenticated network, the physical address of the non-authenticated network, etc., and the electronic device 200 receives The access information to the router 300, and then the electronic device 200 connects to the non-authentication network of the router 300 based on the access information of the router 300.
- the router 300 sends a first request message to the server 400.
- the router 300 After the electronic device 200 accesses the non-authentication network of the router 300, the router 300 sends a first request message to the server 400, and the first request message is used by the server 400 to generate a first authorization code. That is, in the embodiment of FIG. 7, after S705 is executed, in the embodiment of FIG. 9, before the server 400 executes 901, the router 300 sends the first request message to the server 400, and only the server 400 receives the first request message After that, the server 400 will generate the first authorization code (that is, execute S901).
- the first request message may also be used by the server 400 to generate registration information of the electronic device 200 .
- the first request message may be the request for generating registration data described in S801 in the embodiment of FIG. 8 .
- the server 400 receives the first request message, and generates a first authorization code.
- the first authorization code may also be referred to as authcode set one.
- the router 300 sends the first request message to the server 400, and the server 400 will generate the first authorization code after the server 400 receives the first request message.
- the first authorization code (that is, execute S901).
- the server 400 When the first request message can also be used by the server 400 to generate the registration information of the electronic device 200 , after the server 400 receives the first request message, the server 400 generates the registration information of the electronic device 200 . Afterwards, the electronic device 200, router 300 and server 400 go through steps S803-S808, the server 400 verifies that the electronic device 200 is a legal device, and binds the electronic device 200 and the router 300 to the same account. Afterwards, the server 400 executes S901 to generate a first authorization code.
- the first authorization code is randomly generated by the server 400 in response to request messages from different electronic devices, wherein the authorization code may be randomly generated by the server 400 according to a preset random number generation algorithm; in some implementations Among them, it is also possible for the server 100 to generate the same authorization code for different electronic devices.
- the server 400 may also generate the first authorization code and the second authorization code (also referred to as authcode set two), the server 400 sends the first authorization code and the second authorization code to the router 300, and the router 300 saves the first authorization code locally, and the router 300 sends the second authorization code to the electronic device 200 . Afterwards, the router 300 negotiates with the electronic device 200 to obtain the first key based on the first authorization code and the second authorization code.
- the router 300 and the electronic device 200 negotiate to obtain the first key based on the same authorization code.
- the router 300 and the electronic device 200 negotiate to obtain the first key based on different authorization codes.
- the second electronic device receives a second user operation, and the second user operation is used to instruct the router 300 to send the access information of the non-authenticated network.
- the operation of the second user is used to control the router 300 to send the access information of the non-authenticated network.
- the router 300 displays prompt information on the application program on the mobile phone of the electronic device 100 that has been connected to the Internet through the server 400, so that the user can see the prompt information, the prompt information is used to prompt the user to input a second user operation on the network configuration interface on the application program, so that the router 300 sends the access information of the non-authenticated network.
- the user does not need to press the network configuration key on the router 300 (that is, the first user operation), and the router 300 can also send the access information of the non-authenticated network. It can be ensured that when the user is inconvenient to press the network configuration key of the router 300, the user can control the router 300 on the application program to send the access information of the non-authenticated network.
- the second user operation may also be that the control server 400 sends the first authorization code to the router 300 and the electronic device 200 .
- the server 400 displays prompt information on the application program on the mobile phone of the electronic device 100, so that the user can see the prompt information, and the prompt information It is used to prompt the user to input a second user operation on the network configuration interface on the application program, so that the server 400 sends the first authorization code to the router 300 and the electronic device 200 .
- the router 300 and the electronic device 200 acquire the first authorization code, and negotiate to obtain the first key based on the first authorization code.
- the first key may also be referred to as key two.
- the first authorization code includes m authorization codes, where m is a positive integer greater than or equal to 1.
- Router 300 negotiates with the electronic device 200 to obtain a first key based on x authorization codes in the first authorization code and y authorization codes in the first authorization code; wherein, x is greater than or equal to 1 and less than or equal to m, and y is greater than or equal to 1 and less than equal to m.
- the server 400 sends the first authorization code to the router 300 , the router 300 stores the first authorization code locally, and the router 300 also needs to send the first authorization code to the electronic device 200 .
- the router 300 and the electronic device 200 may select part or all of the authorization codes from the first authorization codes and negotiate to obtain the first key.
- the x authorization codes in the first authorization codes are the same as the y authorization codes in the first authorization codes, then the router 300 and the electronic device 200 negotiate to obtain the first key based on the same authorization codes.
- the router 300 and the electronic device 200 negotiate to obtain the first key based on different authorization codes.
- how the router 300 and the electronic device 200 negotiate to obtain the first key based on the first authorization code can refer to the related description in the embodiment of FIG.
- the electronic device 200 sends the first authentication certificate locally stored in the electronic device 200 to the server 400 through the router 300 information; the server 400 receives the first authentication information, and determines that the electronic device 200 is a legitimate device according to the first authentication information.
- the server 400 will generate the first authorization code for the electronic device 200 and the router 300 to negotiate to obtain the first key transfer network distribution information.
- the server 400 determines that the router 300 is not a legitimate device through the first authentication information, the server 400 will not generate the first authorization code, and the router 300 cannot obtain the distribution network information, and the router 300 cannot join the wireless local area network where the router 300 is located. , to ensure the security of the network distribution process.
- the server 400 judges that the first authentication information satisfies the first condition, it determines that the electronic device 200 is a legitimate device.
- the first authentication information includes first registration information (the first registration information may be the registration information described in the embodiment of FIG. 8 ).
- the server 400 After the server 400 receives the first request information and before the server 400 receives the first authentication information sent by the router 300, the server 400 generates the first registration information (such as a registration code), and saves the first registration information locally to obtain the second authentication information. registration message.
- the server 400 sends the first registration information to the electronic device 200 through the router 300 . After receiving the first registration information, the electronic device 200 saves the first registration information locally.
- the first condition includes: the first registration information in the first authentication information is the same as the second registration information of the electronic device 200 stored locally by the server 400 . That is, when the server 400 confirms that the first registration information sent by the electronic device 200 through the router 300 is the registration information of the electronic device 200 sent by the server 400 through the router 300 before, the server 400 can preliminarily determine that the electronic device 200 is a legitimate device.
- the first authentication information includes first registration information and first verification information (the first verification information may be the verification information described in the embodiment in FIG. 8 ).
- the first inspection information may be any one of a digital certificate or a KPI certificate.
- the first condition includes: the first registration information in the first authentication information is the same as the second registration information of the electronic device 200 stored locally by the server 400 .
- the first verification information is legal verification information.
- the server 400 determines that the first verification information is legitimate verification information
- the server 400 generates a first random number and sends the first random number to the electronic device 200 through the router 300 .
- the electronic device 200 After receiving the first random number, the electronic device 200 encrypts the first random number according to the first private key to obtain the encrypted first random number.
- the electronic device 200 sends the encrypted first random number to the server 400 through the router 300 .
- the server 400 After receiving the encrypted first random number, the server 400 decrypts the encrypted first random number according to the first public key preset in the first verification information, and after obtaining the first random number, the server 400 determines the first verification The information is valid verification information.
- the server 400 After the server 400 determines that the electronic device 200 is a legitimate device through the first registration information, the server 400 further verifies the legitimacy of the electronic device 200 according to the verification information. In this way, the security of subsequent transmission of distribution network information can be improved.
- how the server 400 verifies the legitimacy of the electronic device 200 according to the first registration information and the first verification information may refer to the relevant description in the embodiment of FIG. 8 , which will not be repeated here in this embodiment of the application.
- the electronic device 200 negotiates with the router 300 based on the locally stored preset parameters to obtain the first authentication information based on the locally stored preset parameters.
- Second key (also referred to as key one); the electronic device 200 sends the first authentication information locally stored in the electronic device 200 to the server 400 through the router 300, specifically including: the electronic device 200 sends the first authentication information based on the second key to the server 400 The information is encrypted to obtain encrypted first authentication information; the electronic device 200 sends the encrypted first authentication information to the router 300; after receiving the encrypted first authentication information, the router 300 converts the encrypted first authentication information based on the second key to Decrypt to obtain the first authentication information; the router 300 sends the first authentication information to the server 400 .
- the router 300 before the router 300 sends the first registration information to the electronic device 200, the router 300 encrypts the first registration information with a second key to obtain encrypted first registration information. The router 300 sends the encrypted first registration information to the electronic device 200 . In this way, the security of information transmission between the electronic device 200 and the router 300 can be guaranteed.
- the electronic device 200 before the electronic device 200 initiates a registration request to the server 400 (or before the electronic device 200 sends the first authentication information to the server 400 through the router 300), if the electronic device 200 and the router 300 can pass the locally stored preset parameter If the second key is obtained through negotiation, the electronic device 200 can be considered as a preliminary legal device, and the electronic device 200 can initiate a registration request to the server 400 through the router 300 .
- the electronic device 200 that initiates the registration request to the server 400 is a preliminary legal electronic device, that is, the electronic device 200 stores preset parameters.
- the information transmitted between the electronic device 200 and the router 300 is transmitted after being encrypted by the second key, which can ensure the security of the information transmitted between the electronic device 200 and the router 300 .
- the router 300 encrypts the network distribution information of the wireless local area network where the router 300 is located based on the first key, obtains the encrypted network distribution information, and sends the encrypted network distribution information to the electronic device 200.
- the network distribution information may include but not limited to the name and password of the router 300, etc.
- the network distribution information may also include other more information, which is not limited in this application.
- the router 300 and the electronic device 200 After the router 300 and the electronic device 200 obtain the first authorization code, and negotiate to obtain the first key based on the first authorization code, the router 300 encrypts the distribution network information of the wireless LAN where the router 300 is located based on the first key, and obtains the encrypted distribution network information, and send encrypted network distribution information to the electronic device 200. In this way, the electronic device 200 can obtain the distribution network information of the wireless local area network where the router 300 is located.
- the electronic device 200 receives the encrypted network distribution information, decrypts the encrypted network distribution information based on the first key, obtains the network distribution information, and connects to the wireless local area network where the router 300 is located based on the network distribution information.
- the electronic device 200 After receiving the encrypted network distribution information, the electronic device 200 decrypts the encrypted network distribution information based on the first key to obtain the network distribution information, and connects to the wireless local area network where the router 300 is located based on the network distribution information. In this way, the electronic device 200 can access the Internet through the router 300 .
- the router 300 sends access information of the non-authentication network in response to the first user operation.
- the electronic device 200 receives the access information, and accesses the authentication-free network of the router 300 based on the access information.
- the first user operation group may be the pressing operation of the network configuration key of the router 300
- the access information of the non-authenticated network may include the identification of the non-authenticated network and the physical address of the router 300 and so on. Only after the router 300 receives the operation of the first user (that is, is authorized by the user), the router 300 will send the access information of the non-authenticated network of the router 300 .
- the router 300 continuously sends the access information of the non-authenticated network in response to the first user operation.
- the third electronic device (electronic device 500 ) is connected to the non-authentication network of the router 300 .
- the router 300 sends the second request message to the server 400 .
- the server 400 After receiving the second request message, the server 400 generates a second authorization code, wherein the second authorization code is different from the authorization code generated by the server 400 after receiving the request message from other electronic devices sent by the router 300 .
- the router 300 and the electronic device 500 obtain the second authorization code, and negotiate to obtain the second key based on the second authorization code.
- the router 300 encrypts the network distribution information of the WLAN where the router 300 is located based on the second key, obtains the encrypted network distribution information, and sends the encrypted network distribution information to the electronic device 500 .
- the electronic device 500 receives the encrypted network distribution information, decrypts the encrypted network distribution information based on the second key, obtains the network distribution information, and connects to the wireless local area network where the router 300 is located based on the network distribution information. In this way, the router 300 only needs to receive one user operation, and continuously sends the access information of the non-authenticated network.
- the router 300 Before the router 300 stops sending the access information of the non-authenticated network, one or more electronic devices can be connected to the non-authenticated network of the router 300, then the router 300 can adopt the same distribution process as the electronic device 200 to complete the connection with the other one. or a network distribution process of multiple electronic devices (such as the electronic device 500). That is to say, the router 300 only needs to receive one user operation, and can complete the network distribution process with multiple electronic devices. Equipment distribution network efficiency.
- the router 300 After the router 300 completes the network configuration process with the electronic device 500, and the router 300 determines that the number of electronic devices connected to the non-authenticated network connected to the router 300 is 0, the router 300 stops sending the non-authenticated network connection. input information.
- the router 300 waits for a period of time after determining that the number of electronic devices connected to the router 300's non-authenticated network is 0, during this period During the period, the router 300 still continuously sends the access information of the non-authenticated network, and if no other electronic device is connected to the non-authenticated network of the router 300, the router 300 stops sending the access information of the non-authenticated network.
- how the router 300 implements "one-key network configuration" can refer to the embodiments shown in FIG. 10A-FIG. 10C and FIG. 11-FIG. 13 , which will not be repeated here in this embodiment.
- the number of electronic devices 200 is one or more.
- the electronic device 100 displays the first user interface (the user interface 940 shown in FIG. 9E or the user interface shown in FIG. 10B ).
- the first user interface includes one or more device identifiers corresponding to one or more electronic devices 200; after the electronic device 100 receives the user's second user operation, the electronic device 100 displays the second user interface (Fig. 9F, or the user interface 980 shown in FIG. Multiple electronic devices 200 have completed network configuration, or one or more electronic devices 200 have been connected to the network.
- the second user interface may also include information such as one or more device identifiers corresponding to one or more electronic devices 200 .
- the server 400 associates the electronic device 200 with the router 300 with the same account.
- the user can view the networking status of the electronic device 200 on the application program in the electronic device 100 .
- the networking status includes but not limited to online, offline, network distribution, network distribution failure and so on.
- the term “when” may be interpreted to mean “if” or “after” or “in response to determining" or “in response to detecting".
- the phrases “in determining” or “if detected (a stated condition or event)” may be interpreted to mean “if determining" or “in response to determining" or “on detecting (a stated condition or event)” or “in response to detecting (a stated condition or event)”.
- the processes can be completed by computer programs to instruct related hardware.
- the programs can be stored in computer-readable storage media.
- When the programs are executed may include the processes of the foregoing method embodiments.
- the aforementioned storage medium includes: ROM or random access memory RAM, magnetic disk or optical disk, and other various media that can store program codes.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (30)
- 一种配网方法,应用于包括第一电子设备、无线接入设备和服务器的配网系统中,其特征在于,所述方法包括:所述第一电子设备接入所述无线接入设备的无认证网络;所述无线接入设备向所述服务器发送第一请求消息;所述服务器接收所述第一请求消息,生成第一授权码,其中,所述第一授权码不同于所述服务器接收无线接入设备发送的其他电子设备的请求消息后生成的授权码;所述无线接入设备、所述第一电子设备获取所述第一授权码,并基于所述第一授权码协商得到第一密钥;所述无线接入设备基于所述第一密钥加密所述无线接入设备所在的无线局域网的配网信息,得到加密的配网信息,并向所述第一电子设备发送所述加密的配网信息;所述第一电子设备接收所述加密的配网信息,基于所述第一密钥对所述加密的配网信息进行解密,得到所述配网信息,并基于所述配网信息连接上所述无线接入设备所在的无线局域网。
- 根据权利要求1所述的方法,其特征在于,在所述无线接入设备、所述第一电子设备获取所述第一授权码之前,所述方法还包括:所述第一电子设备通过所述无线接入设备向所述服务器发送所述第一电子设备本地存储的第一认证信息;所述服务器接收所述第一认证信息,并根据所述第一认证信息确定所述第一电子设备为合法设备。
- 根据权利要求2所述的方法,其特征在于,在所述第一电子设备通过所述无线接入设备向所述服务器发送所述第一电子设备本地存储的第一认证信息之前,所述方法还包括:所述第一电子设备基于本地保存的预置参数和所述无线接入设备基于本地保存的预置参数协商得到第二密钥;所述第一电子设备通过所述无线接入设备向所述服务器发送所述第一电子设备本地存储的第一认证信息,具体包括:所述第一电子设备基于所述第二密钥将所述第一认证信息加密,得到加密的第一认证信息;所述第一电子设备向所述无线接入设备发送所述加密的第一认证信息;所述无线接入设备在接收到所述加密的第一认证信息后,基于所述第二密钥将所述加密的第一认证信息解密,得到所述第一认证信息;所述无线接入设备将所述第一认证信息发送至所述服务器。
- 根据权利要求1-3任一项所述的方法,其特征在于,所述第一授权码包括m个授权码,m为大于等于1的正整数;所述无线接入设备、所述第一电子设备基于所述第一授权码协商得到第一密钥,具体包括:所述无线接入设备基于所述第一授权码中的x个授权码和所述第一电子设备基于所述第一授权码中的y个授权码协商得到所述第一密钥;其中,x大于等于1小于等于m,y大于等 于1小于等于m。
- 根据权利要求1-4中任一项所述的方法,其特征在于,在所述第一电子设备接入所述无线接入设备的无认证网络之前,所述方法还包括:所述无线接入设备响应于第一用户操作,发送所述无认证网络的接入信息;所述第一电子设备接入所述无线接入设备的无认证网络,具体包括:所述第一电子设备接收所述接入信息,基于所述接入信息接入所述无线接入设备的所述无认证网络。
- 根据权利要求1-5中任一项所述的方法,其特征在于,所述配网系统还包括第二电子设备,在所述服务器生成所述第一授权码之前,所述方法还包括:所述第二电子设备接收第二用户操作,所述第二用户操作用于指示所述无线接入设备发送所述无认证网络的接入信息。
- 根据权利要求6所述的方法,其特征在于,所述第一电子设备的数量为一个或多个,在所述第二电子设备接收用户的第二用户操作之前,所述方法还包括:所述第二电子设备显示第一用户界面,所述第一用户界面包括所述一个或多个第一电子设备对应的一个或多个设备标识;在所述第二电子设备接收用户的第二用户操作之后,所述方法还包括:所述第二电子设备显示第二用户界面,所述第二用户界面包括所述一个或多个第一电子设备对应的一个或多个状态标识,所述一个或多个状态标识用于表示所述一个或多个第一电子设备已完成配网,或者,所述一个或多个第一电子设备已连接网络。
- 根据权利要求1-7中任一项所述的方法,其特征在于,在所述第一电子设备接入所述无线接入设备的无认证网络之前,所述方法还包括:所述第一电子设备广播所述第一电子设备的配网信元,其中,所述配网信元用于使得其他电子设备发现处于待配网状态的所述第一电子设备。
- 根据权利要求1-8中任一项所述的方法,其特征在于,所述配网信息包括,所述无线接入设备所在的无线局域网的名称和密码。
- 一种配网方法,应用于第一电子设备,其特征在于,所述方法包括:接入无线接入设备的无认证网络;获取第一授权码,所述第一授权码是由服务器生成的,其中,所述第一授权码不同于接入所述无线接入设备的所述无认证网络的其他电子设备接收到的授权码;基于所述第一授权码,与所述无线接入设备协商确定第一密钥;接收所述无线接入设备发送的加密的配网信息,并基于所述第一密钥对所述加密的配网信息进行解密,得到配网信息;基于所述配网信息连接上所述无线接入设备所在的无线局域网。
- 根据权利要求10所述的配网方法,其特征在于,在获取第一授权码之前,所述方法 还包括:通过所述无线接入设备向所述服务器发送所述第一电子设备本地存储的第一认证信息;其中,所述第一认证信息用于所述服务器确定所述第一电子设备为合法设备。
- 根据权利要求11所述的配网方法,其特征在于,在通过所述无线接入设备向所述服务器发送所述第一电子设备本地存储的第一认证信息之前,所述方法还包括:基于本地保存的预置参数和所述无线接入设备基于本地保存的预置参数协商得到第二密钥;通过所述无线接入设备向所述服务器发送所述第一电子设备本地存储的第一认证信息,具体包括:基于所述第二密钥将本地存储的所述第一认证信息加密,得到加密的第一认证信息;向所述无线接入设备发送所述加密的第一认证信息;其中,所述加密的第一认证信息用于所述无线接入设备基于所述第二密钥将所述加密的第一认证信息解密后得到所述第一认证信息,并将所述第一认证信息发送至所述服务器。
- 根据权利要求10-12任一项所述的方法,其特征在于,所述第一授权码包括m个授权码,m为大于等于1的正整数;基于所述第一授权码,与所述无线接入设备协商确定第一密钥,具体包括:基于所述第一授权码中的x个授权码和所述无线接入设备基于所述第一授权码中的y个授权码协商得到所述第一密钥;其中,x大于等于1小于等于m,y大于等于1小于等于m。
- 根据权利要求10-13任一项所述的方法,其特征在于,在接入无线接入设备的无认证网络之前,所述方法还包括:接收所述无线接入设备发送的接入信息;接入无线接入设备的无认证网络,具体包括:基于所述接入信息接入所述无线接入设备的所述无认证网络。
- 根据权利要求10-14任一项所述的方法,其特征在于,在接入无线接入设备的无认证网络之前,所述方法还包括:广播所述第一电子设备的配网信元,其中,所述配网信元用于使得其他电子设备发现处于待配网状态的所述第一电子设备。
- 根据权利要求10-15任一项所述的方法,其特征在于,所述配网信息包括,所述无线接入设备所在的无线局域网的名称和密码。
- 一种配网方法,应用于无线接入设备,其特征在于,所述方法包括:在第一电子设备接入所述无线接入设备的无认证网络后,向服务器发送第一请求消息;其中,所述第一请求消息用于所述服务器生成第一授权码,其中,所述第一授权码不同于所述无线接入设备向接入所述无线接入设备的所述无认证网络的其他电子设备发送的授权码;获取所述第一授权码,并基于所述第一授权码,与所述第一电子设备协商确定第一密钥;基于所述第一密钥加密所述无线接入设备所在的无线局域网的配网信息,得到加密的配 网信息,并向所述第一电子设备发送所述加密的配网信息;其中,所述加密的配网信息用于所述第一电子设备基于所述第一密钥对所述加密的配网信息进行解密,得到所述配网信息,并基于所述配网信息连接上所述无线接入设备所在的无线局域网。
- 根据权利要求17所述的方法,其特征在于,在获取所述第一授权码之前,所述方法还包括:接收所述第一电子设备发送的所述第一电子设备本地存储的第一认证信息;向所述服务器发送所述第一认证信息;其中,所述第一认证信息用于所述服务器确定所述第一电子设备为合法设备。
- 根据权利要求18所述的方法,其特征在于,在接收所述第一电子设备发送的所述第一电子设备本地存储的第一认证信息之前,所述方法还包括:基于本地保存的预置参数和所述第一电子设备基于本地保存的预置参数协商得到第二密钥;接收所述第一电子设备发送的所述第一电子设备本地存储的第一认证信息,具体包括:接收所述第一电子设备发送的基于所述第二密钥加密的第一认证信息;在向所述服务器发送所述第一认证信息之前,所述方法还包括:基于所述第二密钥将所述加密的第一认证信息解密,得到所述第一认证信息。
- 根据权利要求17-19任一项所述的方法,其特征在于,所述第一授权码包括m个授权码,m为大于等于1的正整数;与所述第一电子设备协商确定第一密钥,具体包括:基于所述第一授权码中的x个授权码和所述第一电子设备基于所述第一授权码中的y个授权码协商得到所述第一密钥;其中,x大于等于1小于等于m,y大于等于1小于等于m。
- 根据权利要求17-20任一项所述的方法,其特征在于,在第一电子设备接入所述无线接入设备的无认证网络之前,所述方法还包括:响应于第一用户操作,发送所述无认证网络的接入信息;其中,所述接入信息用于所述第一电子设备接入所述无线接入设备的所述无认证网络。
- 根据权利要求17-21任一项所述的方法,其特征在于,在第一电子设备接入所述无线接入设备的无认证网络之前,所述方法还包括:接收所述第一电子设备广播的所述第一电子设备的配网信元,其中,所述配网信元用于使得其他电子设备发现处于待配网状态的所述第一电子设备。
- 根据权利要求17-22任一项所述的方法,其特征在于,所述配网信息包括,所述无线接入设备所在的无线局域网的名称和密码。
- 一种配网方法,应用于服务器,其特征在于,所述方法包括:接收所述第一请求消息,生成第一授权码,其中,所述第一授权码不同于所述服务器接收无线接入设备发送的其他电子设备的请求消息后生成的授权码;将所述第一授权码发送至无线接入设备和第一电子设备,其中,所述第一授权码用于所述无线接入设备和所述第一电子设备协商得到第一密钥;所述第一密钥用于所述无线接入设备基于所述第一密钥加密所述无线接入设备所在的无线局域网的配网信息,得到加密的配网信息,并向所述第一电子设备发送所述加密的配网信息;所述加密的配网信息用于所述第一电子设备基于所述第一密钥对所述加密的配网信息进行解密,得到所述配网信息,并基于所述配网信息连接上所述无线接入设备所在的无线局域网。
- 根据权利要求24所述的方法,其特征在于,在生成所述第一授权码之前,所述方法还包括:接收所述无线接入设备发送的所述第一电子设备本地存储的第一认证信息,并根据所述第一认证信息确定所述第一电子设备为合法设备。
- 根据权利要求24-25任一项所述的方法,其特征在于,所述配网信息包括,所述无线接入设备所在的无线局域网的名称和密码。
- 一种电子设备,其特征在于,所述电子设备包括:一个或多个处理器、一个或多个存储器;所述一个或多个存储器与所述一个或多个处理器耦合,所述一个或多个存储器用于存储计算机程序代码,所述计算机程序代码包括计算机指令,所述一个或多个处理器调用所述计算机指令以使得所述电子设备执行上述权利要求10-16、权利要求17-23或权利要求24-26中的任一项所述的方法。
- 一种芯片装置,其特征在于,所述芯片装置包括至少一个处理器以及存储器,所述存储器用于存储计算机程序代码,所述计算机程序代码包括计算机指令,所述至少一个处理器调用所述计算机指令使得安装有所述芯片装置的电子设备执行上述权利要求10-16、权利要求17-23或权利要求24-26中的任一项所述的方法。
- 一种计算机可读存储介质,用于存储计算机指令,当所述计算机指令在电子设备上运行时,使得所述电子设备执行上述权利要求10-16、权利要求17-23或权利要求24-26中的任一项所述的方法。
- 一种计算机程序产品,其特征在于,当所述计算机程序产品在电子设备上运行时,使得所述电子设备执行上述权利要求10-16、权利要求17-23或权利要求24-26中的任一项所述的方法。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP22845247.0A EP4344274A4 (en) | 2021-07-19 | 2022-07-15 | METHOD AND APPARATUS FOR NETWORK CONFIGURATION |
US18/577,933 US20240323675A1 (en) | 2021-07-19 | 2022-07-15 | Network configuration method and apparatus |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110814541.8 | 2021-07-19 | ||
CN202110814541.8A CN115643565A (zh) | 2021-07-19 | 2021-07-19 | 一种配网方法及装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023001082A1 true WO2023001082A1 (zh) | 2023-01-26 |
Family
ID=84940622
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/106098 WO2023001082A1 (zh) | 2021-07-19 | 2022-07-15 | 一种配网方法及装置 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20240323675A1 (zh) |
EP (1) | EP4344274A4 (zh) |
CN (1) | CN115643565A (zh) |
WO (1) | WO2023001082A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116887250A (zh) * | 2023-09-07 | 2023-10-13 | 飞天诚信科技股份有限公司 | 一种智能设备的网络连接实现方法及系统 |
CN116887385A (zh) * | 2023-09-06 | 2023-10-13 | 博为科技有限公司 | 一种无线设备接入优化方法、装置及存储介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107426722A (zh) * | 2016-05-23 | 2017-12-01 | 北京京东尚科信息技术有限公司 | 接入方法、智能设备、配置服务器和认证服务器 |
US20180206117A1 (en) * | 2015-07-02 | 2018-07-19 | Telefonaktiebolaget Lm Ericsson (Publ) | Method for obtaining initial access to a network, and related wireless devices and network nodes |
CN110336720A (zh) * | 2019-06-29 | 2019-10-15 | 华为技术有限公司 | 设备控制方法和设备 |
CN110891299A (zh) * | 2019-11-15 | 2020-03-17 | 北京小米移动软件有限公司 | 配网方法及装置、电子设备及存储介质 |
CN112291100A (zh) * | 2020-11-03 | 2021-01-29 | 北京小米移动软件有限公司 | 配网方法、配网装置及存储介质 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110995665B (zh) * | 2019-11-15 | 2023-04-18 | 北京小米移动软件有限公司 | 配网方法及装置、电子设备及存储介质 |
-
2021
- 2021-07-19 CN CN202110814541.8A patent/CN115643565A/zh active Pending
-
2022
- 2022-07-15 WO PCT/CN2022/106098 patent/WO2023001082A1/zh active Application Filing
- 2022-07-15 US US18/577,933 patent/US20240323675A1/en active Pending
- 2022-07-15 EP EP22845247.0A patent/EP4344274A4/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180206117A1 (en) * | 2015-07-02 | 2018-07-19 | Telefonaktiebolaget Lm Ericsson (Publ) | Method for obtaining initial access to a network, and related wireless devices and network nodes |
CN107426722A (zh) * | 2016-05-23 | 2017-12-01 | 北京京东尚科信息技术有限公司 | 接入方法、智能设备、配置服务器和认证服务器 |
CN110336720A (zh) * | 2019-06-29 | 2019-10-15 | 华为技术有限公司 | 设备控制方法和设备 |
CN110891299A (zh) * | 2019-11-15 | 2020-03-17 | 北京小米移动软件有限公司 | 配网方法及装置、电子设备及存储介质 |
CN112291100A (zh) * | 2020-11-03 | 2021-01-29 | 北京小米移动软件有限公司 | 配网方法、配网装置及存储介质 |
Non-Patent Citations (1)
Title |
---|
See also references of EP4344274A4 |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116887385A (zh) * | 2023-09-06 | 2023-10-13 | 博为科技有限公司 | 一种无线设备接入优化方法、装置及存储介质 |
CN116887385B (zh) * | 2023-09-06 | 2023-12-12 | 博为科技有限公司 | 一种无线设备接入优化方法、装置及存储介质 |
CN116887250A (zh) * | 2023-09-07 | 2023-10-13 | 飞天诚信科技股份有限公司 | 一种智能设备的网络连接实现方法及系统 |
CN116887250B (zh) * | 2023-09-07 | 2023-11-07 | 飞天诚信科技股份有限公司 | 一种智能设备的网络连接实现方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
EP4344274A4 (en) | 2024-09-11 |
EP4344274A1 (en) | 2024-03-27 |
US20240323675A1 (en) | 2024-09-26 |
CN115643565A (zh) | 2023-01-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10278058B2 (en) | Wireless communication device information processing device, and communication method | |
WO2021036513A1 (zh) | 一种智能设备的配网方法、系统以及可读介质 | |
US20230093016A1 (en) | Discovery and provisioning method, electronic device, and system | |
WO2021018153A1 (zh) | 一种设备配网注册的方法、设备及系统 | |
WO2023001082A1 (zh) | 一种配网方法及装置 | |
CA2605682C (en) | Wireless device discovery and configuration | |
CN111459433B (zh) | 一种传屏方法、设备及存储介质 | |
EP2885936B1 (en) | Configuration of a new enrollee device for use in a communication network | |
JP6929390B2 (ja) | ワイヤレス・ローカル・エリア・ネットワーク構成方法及びデバイス | |
WO2017148308A1 (zh) | 一种物联网设备接入网络的方法、装置及系统 | |
JP2015507387A (ja) | メッシュネットワークを形成する無線デバイスのためのワンクリック接続/切断機能 | |
CN113347741B (zh) | 网关设备的上线方法及系统 | |
CN105284178A (zh) | 配置无线附件设备 | |
GB2494062A (en) | Establishing pairing between two devices using probes | |
JP2007104310A (ja) | ネットワーク装置、ネットワークシステム及び鍵更新方法 | |
CN112566113B (zh) | 密钥生成以及终端配网方法、装置、设备 | |
WO2014166206A1 (zh) | 安全网络接入处理方法及装置 | |
WO2022028333A1 (zh) | 一种自动控制方法、电子设备及计算机可读存储介质 | |
WO2015139401A1 (zh) | 无线网络的建立方法、系统及无线路由装置 | |
WO2022042170A1 (zh) | 一种IoT设备及其授权方法 | |
WO2019015041A1 (zh) | 一种物联网中继器数据的分时段加密方法及装置 | |
WO2022042740A1 (zh) | 一种数据传输方法及电子设备 | |
WO2019015039A1 (zh) | 一种基于物联网中继器的选择加密方法及装置 | |
WO2023230975A1 (zh) | 建立互操作通道的方法、装置、芯片和存储介质 | |
WO2023230983A1 (zh) | 建立互操作通道的方法、装置、芯片和存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22845247 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2022845247 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2022845247 Country of ref document: EP Effective date: 20231222 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 18577933 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |