WO2024044994A1 - Procédé d'accès au réseau, appareil, et support de stockage lisible - Google Patents
Procédé d'accès au réseau, appareil, et support de stockage lisible Download PDFInfo
- Publication number
- WO2024044994A1 WO2024044994A1 PCT/CN2022/115979 CN2022115979W WO2024044994A1 WO 2024044994 A1 WO2024044994 A1 WO 2024044994A1 CN 2022115979 W CN2022115979 W CN 2022115979W WO 2024044994 A1 WO2024044994 A1 WO 2024044994A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- target
- network
- proxy
- node
- proxy node
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 239000000523 sample Substances 0.000 claims abstract description 17
- 238000001514 detection method Methods 0.000 claims description 58
- 230000005540 biological transmission Effects 0.000 claims description 17
- 230000004044 response Effects 0.000 claims description 11
- 238000004590 computer program Methods 0.000 claims description 3
- 239000003795 chemical substances by application Substances 0.000 description 46
- 238000004891 communication Methods 0.000 description 15
- 238000010586 diagram Methods 0.000 description 15
- 238000012545 processing Methods 0.000 description 9
- 238000005516 engineering process Methods 0.000 description 7
- 230000003993 interaction Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/10—Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Definitions
- the present disclosure relates to the technical field of communications, and in particular, to a method, device and readable storage medium for accessing a network.
- terminal devices are developing from individual devices to whole-house intelligence. Different devices need to work together, but different devices belong to different manufacturers or use different connection protocols. , which will lead to poor interconnection and interoperability between devices.
- the smart home connection standard based on IP protocol - Matter protocol can be used to achieve interconnection and interoperability between different devices.
- the WiFi nodes in the Matter solution are star-shaped networks, which are limited by the distance between the nodes and the central AP router, and cannot solve the problem of extending the use distance of WiFi devices.
- the present disclosure provides a method, device and readable storage medium for accessing a network.
- a method for accessing a network including:
- the target proxy node includes a device connected to a gateway device of the target network.
- the first detection request frame includes network identification information of the network where the proxy node is located; and determining the target proxy node from the one or more proxy nodes according to the first probe request frame includes:
- agent node whose network identification information is the specified network identification information is the specified network identification information
- the target agent node is determined from the candidate agent nodes.
- the first detection request frame includes the data transmission power of the proxy node; and determining the target proxy node from the candidate proxy nodes includes:
- the candidate agent node with the highest data transmission power is used as the target agent node.
- accessing the target network through the target proxy node includes:
- Access the target network through network distribution equipment in the target network.
- the method further includes:
- the first device After reaching the preset time period, if the first detection request frame broadcast by one or more proxy nodes is not received, the first device is configured as the proxy node.
- configuring the first device as the proxy node includes:
- the gateway device of the target network Send the device information of the first device to the gateway device of the target network, where the device information is used to instruct the gateway device to determine whether the first device satisfies the proxy node configuration condition based on the device information;
- the gateway device determines that the first device satisfies the proxy node configuration condition based on the device information, receive the proxy node configuration information sent by the gateway device;
- the method also includes:
- a device for accessing a network including:
- a receiving module configured to receive a first detection request frame broadcast by one or more proxy nodes
- a first determination module configured to determine a target proxy node from the one or more proxy nodes according to the first probe request frame
- the first access module is configured to access the target network through the target proxy node; the target proxy node includes a device connected to a gateway device of the target network.
- the first detection request frame includes network identification information of the network where the proxy node is located; the first determination module includes:
- the first determination sub-module is configured to use the agent node whose network identification information is the specified network identification information as a candidate agent node;
- the second determination sub-module is configured to determine the target proxy node from the candidate proxy nodes.
- the first detection request frame includes the data transmission power of the proxy node; the second determination sub-module is configured to use the candidate proxy node with the largest data transmission power as the target proxy node. .
- the access module includes:
- the first sending sub-module is configured to send a detection response frame to the target agent node
- the first receiving sub-module is configured to receive the connection configuration message sent by the target proxy node
- the second receiving submodule is configured to access the target network through the network distribution device in the target network.
- the device also includes:
- the second determination module is configured to configure the first device as the proxy node if the first detection request frame broadcast by one or more proxy nodes is not received after the preset time period is reached.
- the second determination module includes:
- the second sending sub-module is configured to send the device information of the first device to the gateway device of the target network, where the device information is used to instruct the gateway device to determine whether the first device is based on the device information. Meet the agent node configuration conditions;
- the third receiving submodule is configured to receive the proxy node configuration information sent by the gateway device when the gateway device determines that the first device satisfies the proxy node configuration condition based on the device information;
- the configuration submodule is configured to configure the first device as the proxy node according to the proxy node configuration information.
- the device also includes:
- the second access module is configured to access the target network through the gateway device if the first detection request frame broadcast by one or more proxy nodes is not received after a preset time period.
- a device for accessing a network including:
- Memory used to store instructions executable by the processor
- the processor is configured to: receive a first detection request frame broadcast by one or more proxy nodes; determine a target proxy node from the one or more proxy nodes according to the first probe request frame; by The target proxy node accesses the target network; the target proxy node includes a device connected to a gateway device of the target network.
- a computer-readable storage medium on which computer program instructions are stored.
- the program instructions are executed by a processor, the steps of the method provided by the first aspect of the present disclosure are implemented.
- the target proxy node includes a device connected to a gateway device of the target network. In this way, when the first device wants to access the target network, it can first establish a connection with the target proxy node in the target network, and then access the target network through the target proxy node, which can avoid the device acting as a WiFi node in the original Matter solution.
- Figure 1 is a schematic diagram of a network according to an exemplary embodiment.
- Figure 2 is a flowchart of a method of accessing a network according to an exemplary embodiment.
- Figure 3 is a flow chart of another method of accessing a network according to an exemplary embodiment.
- Figure 4 is a block diagram of a device for accessing a network according to an exemplary embodiment.
- FIG. 5 is a block diagram of a first determination module according to the embodiment shown in FIG. 4 .
- FIG. 6 is a block diagram of a first access module according to the embodiment shown in FIG. 4 .
- FIG. 7 is a block diagram of another device for accessing a network according to the embodiment shown in FIG. 4 .
- FIG. 8 is a block diagram of a second determination module according to the embodiment shown in FIG. 7 .
- FIG. 9 is a block diagram of another device for accessing a network according to the embodiment shown in FIG. 7 .
- Figure 10 is a block diagram of a device for accessing a network according to an exemplary embodiment.
- the Matter protocol a smart home connection standard based on the IP protocol
- the Matter protocol can be used to achieve interconnection and interoperability between different devices.
- a smart kettle is used as a WIFI star network node and a smart socket is used as a Thread Mesh network node
- this method it will be limited because the smart kettle is a WIFI star network node and uses a star network. Due to the distance between the node and the central AP router, the usage distance of the smart kettle is limited, and when multiple devices are connected to the central AP router, the data communication is unstable due to the limited number of access devices to the central AP router. Problems that further affect user experience.
- A5 is a WiFi Mesh sub-device. After powering on, it joins the Mesh network and becomes a leaf node (terminal leaf node); B6 is a child node (terminal child node) in the Thread network; the mobile APP is used as a configuration Network device controller, connect A5 to the target network in the home.
- the native Matter network will be difficult to stabilize A5 and B6 due to the long distance between the B6 device and the A5 device in the user's home and the many obstacles between them.
- the Matter network based on WiFi Mesh can be used, so that the A5 device node can join the target network via the Mesh network and the mobile APP (distribution equipment) over a long distance.
- the present disclosure provides a method, device and readable storage medium for accessing a network.
- the first device wants to access the target network, it can first establish a connection with the target proxy node in the target network, and then access the target network through the target proxy node, which can avoid the limitation of the device as a WiFi node in the original Matter solution.
- Due to the distance problem between the node and the central AP router it can expand the application scenarios of the devices to be connected to the target network, and can solve the problem of unstable data communication when the number of access devices to the home router is limited and there are too many access devices, thereby affecting the user experience. The problem.
- Figure 2 is a flow chart of a method for accessing a network according to an exemplary embodiment. As shown in Figure 2, the method is used for a first device and includes the following steps.
- step S201 a first detection request frame broadcast by one or more proxy nodes is received.
- the proxy node may be a node device that can establish a connection with the device to be connected to the network to connect the device to the network where it is located.
- the proxy node may be a node device that connects and communicates with one or more first devices.
- the first detection request frame is used to detect the presence of a first device in the surroundings that is to be connected to the network, so as to notify the first device to establish a connection with it.
- the first device may actively scan all channels to search for surrounding networks to receive the first detection request frame broadcast by one or more proxy nodes, wherein one or more The proxy node may be a node belonging to a different network.
- step S202 a target proxy node is determined from the one or more proxy nodes according to the first detection request frame.
- the first detection request frame may include network identification information of the network where the proxy node is located, and may also include the data transmission power of the proxy node.
- the first device may determine the connection with the specified network based on the network identification information in the one or more first detection request frames. Identify the proxy nodes whose information matches, use the matched one or more proxy nodes as candidate proxy nodes, and then use the determined data transmission power according to the data transmission power information of the proxy node included in the first detection request frame. The largest candidate agent node is used as the target agent node.
- the first detection request frame broadcast by proxy node A may include network identification information a
- the first detection request frame broadcast by proxy node B may include network identification information b
- the first detection request frame broadcast by proxy node C may include network identification information b
- the network identification information c may be included
- the first detection request frame broadcast by the agent node D may include the network identification information d.
- the first device may receive the agent node A, the agent node B, the agent node C, and the agent node D, After broadcasting multiple first detection request frames, the agent node matching the designated network identification information is determined based on the designated network identification information and the network identification information a, b, c, d; in the agent node A, the agent node B.
- agent node A, agent node B, and agent node C can all be used as candidate agent nodes, and then Then, according to the data transmission power of agent node A, agent node B, and agent node C, the candidate agent node with the largest data transmission power is used as the target agent node.
- step S203 access the target network through the target proxy node.
- the target proxy node includes a device connected to a gateway device of the target network.
- the first device may first send a probe response frame to the target proxy node; and then receive a connection configuration message sent by the target proxy node according to the probe response frame; after the first device receives the connection configuration message , and after performing connection configuration according to the connection configuration message, a connection can be established with the target agent node; secondly, after establishing a connection with the target agent node, the target network can be accessed through the network distribution device in the target network.
- the first device after the first device establishes a connection with the target proxy node, it can receive a session request initiated by the distribution network device in the target network, establish a debugging channel with the distribution network device, and establish encryption through PASE negotiation. Key to encrypt the information transmitted by the debugging channel; then send the device certificate to the distribution network device so that the distribution network device performs device authentication based on the device certificate; receive the distribution network device when the device authentication passes , issue an operable certificate and configuration information; and configure network information according to the received configuration information, so that the first device accesses the target network.
- the target proxy node includes a device connected to a gateway device of the target network.
- the first device wants to access the target network, it can first establish a connection with the target proxy node in the target network, and then access the target network through the target proxy node, which can avoid the device acting as a WiFi node in the original Matter solution.
- Figure 3 is a flowchart of another method of accessing a network according to an exemplary embodiment. As shown in Figure 3, applied to a first device, the method may include:
- step S301 a first detection request frame broadcast by one or more proxy nodes is received.
- the first device may actively scan all channels to search for surrounding networks to receive the first detection request frame broadcast by one or more proxy nodes, wherein one or more The proxy node may be a node belonging to a different network.
- step S302 the agent node whose network identification information is the specified network identification information is used as a candidate agent node.
- the first detection request frame includes network identification information of the network where the proxy node is located.
- the first device may determine that the network identification information matches the specified network identification information based on the network identification information in the one or more first detection request frames. of agent nodes, and use one or more matching agent nodes as candidate agent nodes.
- step S303 the target agent node is determined from the candidate agent nodes.
- the first detection request frame includes the data transmission power of the proxy node.
- the target proxy may be determined by sorting the data transmission power information of the candidate proxy nodes according to the data transmission power information of the proxy node included in the first detection request frame. node; specifically, the candidate agent node with the largest data transmission power can be used as the target agent node.
- step S304 a detection response frame is sent to the target proxy node.
- the detection response frame may be response information sent in reply by the first device after receiving the detection request frame.
- the first device parses the detection request frame to detect whether the identification information, capability information, etc. carried in the detection request frame matches its own information, and whether the device to be connected to the network is allowed to access.
- the first device detects that the identification information, capability information, etc. match its own information and allows the device to be connected to the network to access, it generates a detection response frame, and then sends the detection response frame to the target agent node.
- step S305 the connection configuration message sent by the target proxy node is received, and a connection is established with the target proxy node according to the connection configuration message.
- step S306 access the target network through the network distribution device in the target network.
- the target proxy node includes a device connected to a gateway device of the target network.
- the newly connected first device needs to be able to safely join the target network and establish a control relationship with other devices in the target network, it needs to be debugged.
- Device debugging is to configure and access the first device. The process of the target network so that the devices in the target network can communicate with each other in the network.
- the first device In order for the newly connected first device to be able to debug, the first device must pass its security certificate to the network in order to check its validity. The device is then authorized to operate on the network.
- the first device after the first device establishes a connection with the target proxy node, it can receive a session request initiated by the distribution network device in the target network, establish a debugging channel with the distribution network device, and establish encryption through PASE negotiation. Key to encrypt the information transmitted by the debugging channel; then send the device certificate to the distribution network device so that the distribution network device performs device authentication based on the device certificate; receive the distribution network device when the device authentication passes , issue an operable certificate and configuration information; and configure network information according to the received configuration information, so that the first device accesses the target network.
- equipment debugging should be a time-limited process. Equipment debugging should be completed before the fail-safe timer expires. The fail-safe timer should be set at the beginning of debugging. If the fail-safe timer expires before debugging is completed, period, the distribution network equipment and the first equipment should terminate the equipment debugging process, and the fail-safe timer should be released after the equipment debugging is successfully completed.
- the first device that is ready for debugging should accept the request of the first distribution network device that initiates the establishment of a PASE (English: Passcode-Authenticated Session Establishment, Chinese: Password Authentication Session Establishment) session.
- a PASE English: Passcode-Authenticated Session Establishment, Chinese: Password Authentication Session Establishment
- the distribution network device is communicating with When the first device establishes a PASE session or successfully establishes a session, the first device should not accept any new PASE session request until the session establishment fails or the successfully established PASE session is interrupted in the debugging channel.
- step S307 if the first detection request frame broadcast by one or more proxy nodes is not received after the preset time period is reached, the first device is configured as the proxy node.
- the first device may first send device information of the first device to a gateway device of the target network, where the device information is used to instruct the gateway device to determine whether the first device satisfies the proxy node requirement based on the device information. Configuration conditions; then, when the gateway device determines that the first device satisfies the proxy node configuration conditions based on the device information, it receives the proxy node configuration information sent by the gateway device; secondly, according to the proxy node configuration information, the first device The device is configured as the proxy node.
- step S308 access the target network through the gateway device.
- the first device can be configured as the proxy node, and the first probe request frame can be configured through the gateway device.
- the gateway device By accessing the target network, when a new device to be connected to the network is connected to the target network, the first device as a new proxy node can be used to access the target network, thereby expanding the application scenarios of the devices to be connected to the target network.
- FIG. 4 is a block diagram of a device 400 for accessing a network according to an exemplary embodiment.
- the device includes a receiving module 401, a first determining module 402 and a first access module 403.
- the receiving module 401 is configured to receive the first detection request frame broadcast by one or more proxy nodes;
- the first determination module 402 is configured to determine a target proxy node from the one or more proxy nodes according to the first detection request frame;
- the first access module 403 is configured to access the target network through the target proxy node; the target proxy node includes a device connected to a gateway device of the target network.
- FIG. 5 is a block diagram of a first determination module according to the embodiment shown in FIG. 4 .
- the first detection request frame includes network identification information of the network where the proxy node is located;
- the first determination module 402 includes:
- the first determination sub-module 4021 is configured to use the agent node whose network identification information is the specified network identification information as a candidate agent node;
- the second determination sub-module 4022 is configured to determine the target proxy node from the candidate proxy nodes.
- the first detection request frame includes the data transmission power of the proxy node; the second determination sub-module 4022 is configured to select the candidate proxy node with the largest data transmission power as the target proxy node.
- FIG. 6 is a block diagram of a first access module according to the embodiment shown in FIG. 4 .
- the first access module 403 includes:
- the first sending sub-module 4031 is configured to send a detection response frame to the target agent node
- the first receiving sub-module 4032 is configured to receive the connection configuration message sent by the target proxy node
- the establishment sub-module 4033 is configured to establish a connection with the target proxy node according to the connection configuration message
- the second receiving sub-module 4034 is configured to access the target network through the network distribution equipment in the target network.
- FIG. 7 is a block diagram of another device for accessing a network according to the embodiment shown in FIG. 4 .
- the device also includes:
- the second determination module 404 is configured to configure the first device as the proxy node if the first detection request frame broadcast by one or more proxy nodes is not received after the preset time period reaches.
- FIG. 8 is a block diagram of a second determination module according to the embodiment shown in FIG. 7 .
- the second determination module 404 includes:
- the second sending sub-module 4041 is configured to send the device information of the first device to the gateway device of the target network.
- the device information is used to instruct the gateway device to determine whether the first device satisfies the proxy node configuration condition based on the device information. ;
- the third receiving sub-module 4042 is configured to receive the proxy node configuration information sent by the gateway device when the gateway device determines that the first device satisfies the proxy node configuration condition based on the device information;
- the configuration sub-module 4043 is configured to configure the first device as the proxy node according to the proxy node configuration information.
- FIG. 9 is a block diagram of another device for accessing a network according to the embodiment shown in FIG. 7 .
- the device also includes:
- the second access module 405 is configured to access the target network through the gateway device if the first detection request frame broadcast by one or more proxy nodes is not received after a preset time period.
- the present disclosure also provides a computer-readable storage medium on which computer program instructions are stored. When the program instructions are executed by a processor, the steps of the method for accessing a network provided by the present disclosure are implemented.
- Figure 10 is a block diagram of a device 1000 for accessing a network according to an exemplary embodiment.
- the device 1000 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, or the like.
- device 1000 may include one or more of the following components: processing component 1002, memory 1004, power supply component 1006, multimedia component 1008, audio component 1010, input/output interface 1012, sensor component 1014, and communication component 1016.
- Processing component 1002 generally controls the overall operations of device 1000, such as operations associated with display, phone calls, data communications, camera operations, and recording operations.
- the processing component 1002 may include one or more processors 1020 to execute instructions to complete all or part of the steps of the above method of accessing a network.
- processing component 1002 may include one or more modules that facilitate interaction between processing component 1002 and other components.
- processing component 1002 may include a multimedia module to facilitate interaction between multimedia component 1008 and processing component 1002.
- Memory 1004 is configured to store various types of data to support operations at device 1000 . Examples of such data include instructions for any application or method operating on device 1000, contact data, phonebook data, messages, pictures, videos, etc.
- Memory 1004 may be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EEPROM), Programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
- SRAM static random access memory
- EEPROM electrically erasable programmable read-only memory
- EEPROM erasable programmable read-only memory
- EPROM Programmable read-only memory
- PROM programmable read-only memory
- ROM read-only memory
- magnetic memory flash memory, magnetic or optical disk.
- Power supply component 1006 provides power to various components of device 1000.
- Power supply components 1006 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power to device 1000 .
- Multimedia component 1008 includes a screen that provides an output interface between the device 1000 and the user.
- the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from the user.
- the touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide action.
- multimedia component 1008 includes a front-facing camera and/or a rear-facing camera.
- the front camera and/or the rear camera may receive external multimedia data.
- Each front-facing camera and rear-facing camera can be a fixed optical lens system or have a focal length and optical zoom capabilities.
- Audio component 1010 is configured to output and/or input audio signals.
- audio component 1010 includes a microphone (MIC) configured to receive external audio signals when device 1000 is in operating modes, such as call mode, recording mode, and speech recognition mode. The received audio signals may be further stored in memory 1004 or sent via communications component 1016 .
- audio component 1010 also includes a speaker for outputting audio signals.
- the input/output interface 1012 provides an interface between the processing component 1002 and a peripheral interface module.
- the peripheral interface module may be a keyboard, a click wheel, a button, etc. These buttons may include, but are not limited to: Home button, Volume buttons, Start button, and Lock button.
- Sensor component 1014 includes one or more sensors for providing various aspects of status assessment for device 1000 .
- the sensor component 1014 can detect the open/closed state of the device 1000, the relative positioning of components, such as the display and keypad of the device 1000, and the sensor component 1014 can also detect a change in position of the device 1000 or a component of the device 1000. , the presence or absence of user contact with the device 1000 , device 1000 orientation or acceleration/deceleration and temperature changes of the device 1000 .
- Sensor assembly 1014 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
- Sensor assembly 1014 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
- the sensor component 1014 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
- Communication component 1016 is configured to facilitate wired or wireless communication between apparatus 1000 and other devices.
- Device 1000 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
- the communication component 1016 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
- the communications component 1016 also includes a near field communications (NFC) module to facilitate short-range communications.
- NFC near field communications
- the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
- RFID radio frequency identification
- IrDA infrared data association
- UWB ultra-wideband
- Bluetooth Bluetooth
- apparatus 1000 may be configured by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable Gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are implemented for executing the method of accessing the network.
- ASICs application specific integrated circuits
- DSPs digital signal processors
- DSPDs digital signal processing devices
- PLDs programmable logic devices
- FPGA field programmable Gate array
- controller microcontroller, microprocessor or other electronic components are implemented for executing the method of accessing the network.
- a non-transitory computer-readable storage medium including instructions such as a memory 1004 including instructions, which can be executed by the processor 1020 of the device 1000 to complete the method of accessing a network is also provided.
- the non-transitory computer-readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
La présente divulgation concerne un procédé d'accès au réseau, un appareil, et un support de stockage lisible. Le procédé comprend les étapes consistant à : recevoir une première trame de demande de sondage diffusée par un ou plusieurs nœuds mandataires ; selon la première trame de demande de sondage, déterminer un nœud mandataire cible parmi le ou les nœuds mandataires ; et accéder à un réseau cible au moyen du nœud mandataire cible, le nœud mandataire cible comprenant un dispositif connecté à un dispositif passerelle du réseau cible.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202280004491.XA CN117957913A (zh) | 2022-08-30 | 2022-08-30 | 接入网络的方法、装置及可读存储介质 |
PCT/CN2022/115979 WO2024044994A1 (fr) | 2022-08-30 | 2022-08-30 | Procédé d'accès au réseau, appareil, et support de stockage lisible |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2022/115979 WO2024044994A1 (fr) | 2022-08-30 | 2022-08-30 | Procédé d'accès au réseau, appareil, et support de stockage lisible |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024044994A1 true WO2024044994A1 (fr) | 2024-03-07 |
Family
ID=90099856
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/115979 WO2024044994A1 (fr) | 2022-08-30 | 2022-08-30 | Procédé d'accès au réseau, appareil, et support de stockage lisible |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN117957913A (fr) |
WO (1) | WO2024044994A1 (fr) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103607751A (zh) * | 2013-11-18 | 2014-02-26 | 深圳市通力科技开发有限公司 | 无线设备配置方法及系统 |
US9648548B1 (en) * | 2015-01-02 | 2017-05-09 | Sprint Spectrum L.P. | WiFi mesh configuration |
CN111757356A (zh) * | 2020-06-23 | 2020-10-09 | 四川虹美智能科技有限公司 | 设备配网系统及其配网方法 |
CN113115403A (zh) * | 2021-03-25 | 2021-07-13 | 北京小米移动软件有限公司 | 网络节点接入网络的方法、装置、电子设备及存储介质 |
CN113132989A (zh) * | 2021-04-20 | 2021-07-16 | 宁波奥克斯电气股份有限公司 | 配网方法及智能家居系统 |
CN113891429A (zh) * | 2021-09-27 | 2022-01-04 | 北京小米移动软件有限公司 | 设备入网方法及装置、系统和存储介质 |
CN114189950A (zh) * | 2021-11-24 | 2022-03-15 | 北京小米移动软件有限公司 | 信息交互方法、信息交互装置、服务器及存储介质 |
CN114884970A (zh) * | 2021-02-05 | 2022-08-09 | Oppo广东移动通信有限公司 | 一种信息处理方法及设备、存储介质 |
-
2022
- 2022-08-30 CN CN202280004491.XA patent/CN117957913A/zh active Pending
- 2022-08-30 WO PCT/CN2022/115979 patent/WO2024044994A1/fr active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103607751A (zh) * | 2013-11-18 | 2014-02-26 | 深圳市通力科技开发有限公司 | 无线设备配置方法及系统 |
US9648548B1 (en) * | 2015-01-02 | 2017-05-09 | Sprint Spectrum L.P. | WiFi mesh configuration |
CN111757356A (zh) * | 2020-06-23 | 2020-10-09 | 四川虹美智能科技有限公司 | 设备配网系统及其配网方法 |
CN114884970A (zh) * | 2021-02-05 | 2022-08-09 | Oppo广东移动通信有限公司 | 一种信息处理方法及设备、存储介质 |
CN113115403A (zh) * | 2021-03-25 | 2021-07-13 | 北京小米移动软件有限公司 | 网络节点接入网络的方法、装置、电子设备及存储介质 |
CN113132989A (zh) * | 2021-04-20 | 2021-07-16 | 宁波奥克斯电气股份有限公司 | 配网方法及智能家居系统 |
CN113891429A (zh) * | 2021-09-27 | 2022-01-04 | 北京小米移动软件有限公司 | 设备入网方法及装置、系统和存储介质 |
CN114189950A (zh) * | 2021-11-24 | 2022-03-15 | 北京小米移动软件有限公司 | 信息交互方法、信息交互装置、服务器及存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN117957913A (zh) | 2024-04-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10560491B2 (en) | Methods and apparatuses for binding with device | |
EP3057284B1 (fr) | Procédé et appareil pour lier ou fixer un dispositif | |
WO2017092417A1 (fr) | Procédé et dispositif d'accès au réseau basés sur un équipement de terminal intelligent | |
RU2643494C2 (ru) | Способ и устройство для доступа к сети | |
WO2016141690A1 (fr) | Procédé et dispositif de paramétrage pour gérer un compte de dispositif intelligent | |
EP3163803B1 (fr) | Procédé et dispositif pour établir une connexion | |
KR102339713B1 (ko) | 기기의 네트워크 구성 방법, 장치 및 매체 | |
RU2637470C2 (ru) | Способ и устройство для обнаружения интеллектуального устройства | |
US20170188397A1 (en) | Method and device for wireless connection establishment | |
US10027549B2 (en) | Method and apparatus for displaying router setup interface | |
CN105873106A (zh) | 无线网络连接的处理方法、装置和设备 | |
US11792886B2 (en) | Method for accessing network by network node, and electronic equipment | |
WO2016127669A1 (fr) | Procédé et appareil permettant d'accéder à un réseau sans fil grâce à un dispositif terminal | |
WO2017016057A1 (fr) | Procédé, appareil et système pour l'accès d'un dispositif intelligent à un routeur | |
WO2017128719A1 (fr) | Procédé, appareil et système pour accéder à un réseau local sans fil | |
CN110784908B (zh) | 无线配网方法、无线路由器及无线配网系统 | |
WO2024044994A1 (fr) | Procédé d'accès au réseau, appareil, et support de stockage lisible | |
WO2024036457A1 (fr) | Procédé d'enregistrement, appareil de communication et support de stockage | |
WO2023245519A1 (fr) | Procédé et appareil de mise en réseau de dispositif vocal, et support de stockage | |
WO2023216081A1 (fr) | Procédé et appareil de communication, et support de stockage | |
WO2023231018A1 (fr) | Procédé et appareil de configuration de justificatif d'identité de primitive de réseau ido personnel (pin), dispositif de communication, et support de stockage | |
WO2023240575A1 (fr) | Procédés de communication par relais, appareil de communication, et dispositif de communication | |
WO2023245354A1 (fr) | Procédé et appareil de protection de sécurité, dispositif de communication et support de stockage | |
CN113727416A (zh) | 节点接入网络的方法、装置、电子设备及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 202280004491.X Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22956826 Country of ref document: EP Kind code of ref document: A1 |