WO2024093640A1 - 配置网络方法和设备 - Google Patents

配置网络方法和设备 Download PDF

Info

Publication number
WO2024093640A1
WO2024093640A1 PCT/CN2023/124307 CN2023124307W WO2024093640A1 WO 2024093640 A1 WO2024093640 A1 WO 2024093640A1 CN 2023124307 W CN2023124307 W CN 2023124307W WO 2024093640 A1 WO2024093640 A1 WO 2024093640A1
Authority
WO
WIPO (PCT)
Prior art keywords
mac address
access point
wireless access
indication information
network
Prior art date
Application number
PCT/CN2023/124307
Other languages
English (en)
French (fr)
Inventor
张沐杰
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2024093640A1 publication Critical patent/WO2024093640A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers

Definitions

  • Embodiments of the present application relate to the field of electronic technology, and more specifically, to a method and device for configuring a network.
  • PLC power line communication
  • wireless communication When such devices are connected to a wireless network for the first time, users are required to manually configure the network.
  • the embodiments of the present application provide a method and device for configuring a network.
  • This technical solution can enable the device to automatically configure the network and establish a network connection, avoiding the need for users to manually enter configuration network parameters, thereby improving the intelligence level of the entire house and the efficiency of configuring the network.
  • a method for configuring a network comprising: the first device receiving a first MAC address and first indication information of the second device sent by a second device; the first device enabling a wireless access point whose service set identifier SSID is the first MAC address according to the first indication information; the first device receiving a first connection request message sent by a third device requesting access to the wireless access point, the first connection request message including the first MAC address; the first device allowing the third device to access the wireless access point and establishing a network connection with the third device.
  • the first MAC address may also be replaced by other information that can be used to identify the second device.
  • the first device can receive the first MAC address and the first indication information of the second device sent by the second device, and open the wireless access point with the SSID of the first MAC address according to the first indication information; the first device receives the first connection request message sent by the third device requesting to access the wireless access point, and allows the third device to access the wireless access point.
  • This technical solution can enable the third device to automatically access the wireless access point according to the first MAC address of the second device obtained when configuring the network, and establish a network connection with the first device, without the need for the user to manually enter the configuration network parameters, thereby improving the intelligence level of the whole house and the efficiency of configuring the network.
  • the method also includes: the first device receives a second MAC address and second indication information of the third device sent by the second device; the first device allows the third device to access the wireless access point, including: the first device allows the third device corresponding to the second MAC address to access the wireless access point according to the second indication information.
  • the first device may also receive the second MAC address and the second indication information of the third device sent by the second device, and determine that the third device can access the wireless access point according to the second indication information.
  • the first device may also store the second MAC address according to the second indication information, and mark that the device corresponding to the second MAC address can access the wireless access point.
  • the first device may also allow all devices requesting to access the wireless access point whose SSID is the first MAC address to access the wireless access point, without determining that the device can access the wireless access point according to the second indication information.
  • the first connection request message also includes the second MAC address
  • the first device allows the third device corresponding to the second MAC address to access the wireless access point according to the second indication information, including: the first device adds the second MAC address to the whitelist of the wireless access point according to the second indication information; and the first device allows the third device to access the wireless access point after the second MAC address is verified according to the whitelist and passes.
  • the first device may also store the second MAC address according to the second indication information, and mark that the device corresponding to the second MAC address can access the wireless access point.
  • the first connection request message may include the second MAC address of the third device, and the first device may add the second MAC address to the white list of the wireless access point according to the second indication information, so as to facilitate the first device to verify the second MAC address according to the white list, and when it is determined that the second MAC address is in the white list, the third device may be allowed to access the wireless access point.
  • the first device receives a first MAC address and first indication information of the second device sent by the second device, including: the first device receives the first MAC address, the second MAC address and the first indication information sent by the second device, and the first indication information is also used to indicate the first device to allow a third device corresponding to the second MAC address to access the wireless access point.
  • This technical solution helps the first device determine which devices can access the wireless access point.
  • the wireless access point is a wireless access point for which no access password is set.
  • the wireless access point may also be set with a password, for example, the password is also set to the first MAC address, and the first connection request message may also include information that the password is the first MAC address, thereby facilitating the third device to conveniently access the wireless access point.
  • the wireless access point is a hidden wireless access point.
  • the wireless access point is a hidden wireless access point, so that other devices cannot obtain the name of the wireless access point through normal scanning, so as to further improve the security of device configuration network.
  • the first device is connected to the second device by wire, and the second device is connected to the third device by wire.
  • the first device and the second device may be connected via a network cable, and the second device and the second device may be connected via a power line.
  • a method for configuring a network which is applied to a second device, and the method includes: the second device determines a first media access control MAC address and first indication information of the second device, the first indication information being used to instruct the first device to enable a wireless access point whose service set identifier SSID is the first MAC address; the second device sends the first MAC address and the first indication information to the first device.
  • the second device can determine its own first MAC address and first indication information, and send the first MAC address and first indication information to the first device.
  • This technical solution is conducive to the first device opening a wireless access point with the SSID of the first MAC address according to the first indication information, so that other devices can execute the corresponding network configuration process.
  • the method also includes: the second device obtains a second MAC address of the third device; the second device sends the second MAC address and second indication information to the first device, and the second indication information is used to indicate the first device to allow the third device corresponding to the second MAC address to access the wireless access point.
  • the second device can also obtain the second MAC address of the third device, and send the second MAC address and second indication information to the first device, so that the first device determines that the third device corresponding to the second MAC address is a device that can access the wireless access point according to the second indication information.
  • This technical solution is conducive to the first device determining which devices can access the wireless access point.
  • the method before the second device sends the first MAC address and the first indication information to the first device, the method also includes: the second device obtains the second MAC address of the third device; at the same time or after the second device sends the first MAC address and the first indication information to the first device, it also includes: the second device sends the second MAC address to the first device, and the first indication information is also used to indicate the first device to allow the third device corresponding to the second MAC address to access the wireless access point.
  • the second device may also obtain the second MAC address of the third device and send the second MAC address to the first device.
  • the first indication information may also instruct the first device to determine the wireless access point that the third device corresponding to the second MAC address can access. This technical solution is helpful for the first device to determine which devices can access the wireless access point.
  • the wireless access point is a hidden wireless access point.
  • the wireless access point is a wireless access point for which no password is set.
  • the first device is connected to the second device by wire, and the second device is connected to the third device by wire.
  • a method for configuring a network which is applied to a third device, and includes: the third device obtains a first media access control MAC address of a second device; the third device sends a first connection request message to the first device, the first connection request message is used to request access to a wireless access point whose service set identifier SSID is the first MAC address, and the first connection request message includes the second MAC address of the third device; the third device accesses the wireless access point and establishes a network connection with the first device.
  • the third device can obtain the first MAC address of the second device, and send a request to the first device to access the wireless access point whose SSID is the first MAC address, and access the wireless access point to establish a network connection with the first device.
  • This technical solution can enable the third device to automatically access the wireless access point and establish a network connection with the first device by only obtaining the first MAC address of the second device when configuring the network.
  • the device establishes a network connection, avoiding the need for users to manually enter network configuration parameters, thus improving network configuration efficiency.
  • the wireless access point is a hidden wireless access point.
  • the wireless access point is a wireless access point for which no password is set.
  • a device comprising a module for implementing a method for configuring a network as described in the first to third aspects and any possible implementation manner thereof.
  • a first device comprising: one or more processors; one or more memories; the one or more memories storing one or more programs, the one or more programs comprising instructions, which, when executed by the one or more processors, enable the method for configuring a network as described in the first aspect and any possible implementation thereof to be executed.
  • a second device comprising: one or more processors; one or more memories; the one or more memories storing one or more programs, the one or more programs comprising instructions, which, when executed by the one or more processors, enable the network configuration method as described in the second aspect and any possible implementation thereof to be executed.
  • a third device comprising: one or more processors; one or more memories; the one or more memories storing one or more programs, the one or more programs comprising instructions, which, when executed by the one or more processors, enable the network configuration method as described in the third aspect and any possible implementation thereof to be executed.
  • a chip comprising a processor and a communication interface, wherein the communication interface is used to receive a signal and transmit the signal to the processor, and the processor processes the signal so that the network configuration method described in the first aspect and any possible implementation thereof is executed.
  • a chip comprising a processor and a communication interface, wherein the communication interface is used to receive a signal and transmit the signal to the processor, and the processor processes the signal so that the network configuration method described in the second aspect and any possible implementation thereof is executed.
  • a chip comprising a processor and a communication interface, wherein the communication interface is used to receive a signal and transmit the signal to the processor, and the processor processes the signal so that the network configuration method as described in the third aspect and any possible implementation thereof is executed.
  • a readable storage medium wherein instructions are stored in the readable storage medium.
  • the instructions are executed on a first device, the method for configuring a network as described in the first aspect and any possible implementation thereof is executed.
  • a readable storage medium wherein instructions are stored in the readable storage medium.
  • the instructions are executed on a second device, the method for configuring a network as described in the second aspect and any possible implementation thereof is executed.
  • a computer-readable storage medium wherein instructions are stored in the computer-readable storage medium.
  • the instructions are executed on a third device, the method for configuring a network as described in the third aspect and any possible implementation thereof is executed.
  • a program product comprising a program code, and when the program code runs on a first device, the method for configuring a network as described in the first aspect and any possible implementation thereof is executed.
  • a program product comprising a program code, and when the program code runs on a second device, the method for configuring a network as described in the second aspect and any possible implementation thereof is executed.
  • a program product comprising a program code, and when the program code runs on a third device, the method for configuring a network as described in the third aspect and any possible implementation thereof is executed.
  • FIG1 is a schematic diagram of the structure of a device provided in an embodiment of the present application.
  • FIG. 2 is a block diagram of the software structure of the device provided in an embodiment of the present application.
  • FIG3 is a schematic diagram of a system framework provided in an embodiment of the present application.
  • FIG4 is a schematic interaction diagram of a method for configuring a network provided in an embodiment of the present application.
  • FIG5 is a schematic interaction diagram of another method for configuring a network provided in an embodiment of the present application.
  • FIG6 is a schematic interaction diagram of a method for configuring a network provided in an embodiment of the present application.
  • FIG. 7 is a schematic block diagram of a device provided in an embodiment of the present application.
  • the network configuration method in the embodiment of the present application can be applied to devices, control devices, network devices, etc.
  • the device in the embodiment of the present application may be a wireless device or a wired device in a smart home, a wireless device or a wired device in transportation safety, a wireless device or a wired device in a smart city, a wireless device or a wired device in a smart grid, etc., and the embodiment of the present application is not limited to this.
  • the device may be a smart home device that supports wired communication protocols and wireless communication protocols, such as a whole-house smart panel, a control panel, etc.
  • the control device in the embodiment of the present application may be a smart host, etc.
  • the network device in the embodiment of the present application may be a device for communicating with a control device.
  • the network device may be a router, a gateway, a switch, a relay station, an access point, an on-board device, a 5G network, and a network device in a future communication network, etc., but the embodiment of the present application is not limited thereto.
  • FIG1 is a schematic diagram of the structure of a device.
  • the device may be a router.
  • the device 100 may include a processor 110 , a memory 120 , a wireless communication circuit 130 , an antenna 132 , and a network port 140 .
  • the structure illustrated in the embodiment of the present application does not constitute a specific limitation on the device 100.
  • the device 100 may include more or fewer components than shown in the figure, or combine some components, or split some components, or arrange the components differently.
  • the components shown in the figure may be implemented in hardware, software, or a combination of software and hardware.
  • the memory 120 can be used to store instructions and data.
  • the processor 110 can call the instructions or data stored in the memory 120.
  • the network port 140 may include a wired network interface, which can be configured to be connected to the Internet through a wired network such as broadband, and can provide access to the Internet for multiple terminals.
  • the network port 140 may also include a mobile communication module, which can be configured to be connected to the core network through wireless communication technology.
  • the wireless communication circuit 130 can be configured to communicate via a wireless local area network standard such as a Wi-Fi network.
  • the wireless communication circuit 130 can be one or more devices integrating at least one communication processing module.
  • the wireless communication circuit 130 can receive electromagnetic waves via the antenna 132, frequency modulate and filter the electromagnetic wave signal, and send the processed signal to the processor 110.
  • the wireless communication module can also receive the signal to be sent from the processor 110, frequency modulate it, amplify it, and convert it into electromagnetic waves for radiation through the antenna 132.
  • Fig. 2 is a schematic diagram of the software structure of a device.
  • the software structure of the device 100 can be divided into a service plane, a control plane, and a forwarding plane according to corresponding functions.
  • the forwarding plane determines how to process the data packets that flow into the interface. For example, according to the destination Internet Protocol (IP) address and other attribute parameters in the packet, the appropriate routing path is selected according to the routing table for forwarding.
  • IP Internet Protocol
  • the business plane is responsible for the calculation and processing of user business data (such as virtual LAN, virtual private network, and business data such as dynamic host configuration protocol, domain name system, network control message protocol, etc.), which is mainly completed by the router processor.
  • user business data such as virtual LAN, virtual private network, and business data such as dynamic host configuration protocol, domain name system, network control message protocol, etc.
  • the control plane can be used to realize the interconnection of network topology structures. It is mainly controlled by various routing protocols to control which routes will enter the corresponding protocol routing table. For example, when the route reachability, route attributes or applied routes change, corresponding route adjustments can be made in time.
  • the function of the service plane may also be implemented by the control plane, which is not limited in the embodiments of the present application.
  • the software structure of the device 100 may include a control plane and a forwarding plane.
  • Power line communication refers to a communication method that uses power lines to transmit data and media signals.
  • MAC address an address used to identify the location of a device, also known as a physical address or hardware address.
  • a wireless AP is an access point for devices to access a wired network. It is mainly used in broadband homes, inside buildings, and inside campuses, and can cover tens to hundreds of meters.
  • an embodiment of the present application provides a method and device for configuring a network.
  • This technical solution can enable the device to automatically configure the network, avoid manual participation of the user, and improve the intelligence level of the whole house.
  • FIG3 is a schematic diagram of a system framework provided in an embodiment of the present application.
  • the framework may include a third device 410, a second device 420, and a first device 430 that support wired communication protocols and wireless communication protocols.
  • the third device 410 is connected to the second device 420 in a wired manner, for example, by a power line.
  • the second device 420 is connected to the first device 430 in a wired manner, for example, by a network cable.
  • the third device 410 is connected to the first device 430 in a wireless manner.
  • the first device 430 is equivalent to the network device mentioned above.
  • the first device can be a wireless router, a smart gateway, or a wireless router. wait.
  • the second device 420 is equivalent to the control device mentioned above.
  • the second device may be a smart host.
  • the third device 410 is equivalent to the device mentioned above.
  • the third device can be a whole-house smart panel, a control panel, etc.
  • the embodiment of the present application is described by taking the third device 410 as a control panel, the second device 420 as a smart host, and the first device 430 as a wireless router as an example, but this should not cause any limitation to the embodiment of the present application.
  • the embodiment of the present application does not limit the number of the third device 410.
  • Fig. 4 is a schematic interaction diagram of a method for configuring a network provided in an embodiment of the present application. As shown in Fig. 4 , the method 500 may include steps 510 to 580 .
  • the second device sends a first address and first indication information of the second device to the first device.
  • the first device receives the first address and the first indication information.
  • the first address may be a MAC address of the second device.
  • the first indication information may be used to instruct the first device to turn on a wireless access point.
  • the first indication information may be used to indicate that the first address is the MAC address of the second device, for example, the first indication information is an identifier used to indicate that the first address is the MAC address of the second device.
  • the first indication information can be used to indicate that the second device is a central coordinator (CCO).
  • CCO central coordinator
  • the first address may also be replaced by identification information, or other information for identifying the second device.
  • the first device turns on the wireless access point according to the first indication information, and the service set identifier (SSID) of the wireless access point is set to the first address.
  • SSID service set identifier
  • the first device may enable a wireless access point according to the received first indication information, and the SSID of the wireless access point is set to the first address of the second device.
  • the name of the wireless access point is the first address.
  • the wireless access point is an open wireless access point, and the first device does not set an access password for the wireless access point.
  • the wireless access point may be a hidden wireless access point. In this case, other devices cannot obtain the wireless access point through scanning, and only devices that obtain the SSID can access it, thereby preventing other devices from accessing the wireless access point, which is beneficial to improving security.
  • a whitelist check may be set for the wireless access point to allow devices in the whitelist to access the wireless access point to ensure security.
  • the second device when the second device is connected to the first device via the network cable for the first time, the second device can execute step 510 and the first device can execute step 520.
  • the wireless access point of the first device remains turned on, and when a subsequent device needs to access the wireless access point of the first device, it can access the wireless access point at any time.
  • the third device obtains the first address of the second device, and the second device obtains the second address of the third device.
  • the second address is the MAC address of the third device.
  • the second address may also be other information used to identify the third device, which is not limited in the embodiment of the present application.
  • step 530 after the third device is connected to the second device via the power line, the third device can obtain the first address of the second device via the power line, and the second device can obtain the second address of the third device via the power line.
  • the third device sends the second address to the second device via the power line, and the second device sends the first address to the third device via the power line.
  • the second device sends a second address and second indication information to the first device.
  • the first device receives the second address and second indication information.
  • the second indication information may be used to instruct the first device to add the second address to the whitelist.
  • the second indication information may be used to indicate that the second address is the MAC address of the third device, for example, the second indication information is an identifier used to indicate that the second address is the MAC address of the third device.
  • the first device adds the second address to the whitelist according to the second indication information.
  • the first device adds the second address to the whitelist.
  • the first device may allow the third device corresponding to the second address to access the wireless access point.
  • the first device may also store the second address according to the second indication information, and identify the second address as an address that allows access to the wireless access point.
  • the third device sends a first connection request message to the first device requesting access to a wireless access point whose SSID is the first address, and the first The connection request message includes the first address and the second address. Accordingly, the first device receives the first connection request message.
  • the third device can send a first connection request message to the first device requesting access to a wireless access point with the first address as the SSID, and the first connection request message may include the first address and the second address. Including the second address in the first connection request message can help the first device verify the legitimacy of the third device.
  • the first device determines, according to the second address and the white list, that the third device can access the wireless access point.
  • the first device can compare the second address in the first connection request message with the whitelist. When it is determined that the second address is in the whitelist, it can be determined that the third device corresponding to the second address can access the wireless access point. In other examples, when it is determined that the second address is not in the whitelist, the first device can determine that the third device corresponding to the second address cannot access the wireless access point.
  • the third device accesses the wireless access point and establishes a network connection with the first device.
  • step 580 the third device accesses the wireless access point, establishes a network connection with the first device, and completes the network configuration process.
  • step 580 may be a part of step 570, which is not limited in the present embodiment.
  • step 510 to step 580 does not limit the specific execution order of step 510 to step 580.
  • some steps of step 510 to step 580 may not be executed, or may be replaced by other steps.
  • the second device when the second device establishes a wired connection with the first device, the second device can send its own MAC address and first indication information to the first device, and the first device can open a wireless access point whose SSID is the MAC address of the second device according to the first indication information; when the third device is connected to the second device through a power line, they can obtain each other's MAC address, and then the second device sends the MAC address of the third device and the second indication information to the first device; the first device can add the MAC address of the third device to the whitelist according to the second indication information; at this time, the third device can send a connection request message to the first device requesting access to the wireless access point with the MAC address of the second device as the SSID; after the first device passes the verification, the third device can automatically access the wireless network and establish a network device with the first device.
  • the third device when configuring the network for the third device, the third device can automatically configure the network without the user manually entering the wireless parameters.
  • the third device when
  • steps 540, 550, and 570 are optional steps. In other embodiments, steps 540, 550, and 570 may not be performed.
  • the first device can turn on the wireless access point with the SSID of the first address according to the first indication information.
  • the third device can directly send a first connection request message to the first device requesting access to the wireless access point with the SSID of the first address, and access the wireless access point to establish a network connection with the first device without verification by the first device.
  • the first device can allow all devices requesting access to the wireless access point with the SSID of the first address to access the wireless access point and establish a network connection with it.
  • the network configuration process of the third device is simple, and there is no need for the user to manually participate in configuring the network.
  • Fig. 5 is a schematic interaction diagram of another method for configuring a network provided in an embodiment of the present application. As shown in Fig. 5 , the method 600 may include steps 610 to 670.
  • the third device obtains the first address of the second device, and the second device obtains the second address of the third device.
  • the third device when the third device is connected to the second device via the power line, the third device can obtain the first address of the second device via the power line, and the second device can obtain the second address of the third device.
  • the third device when the third device is connected to the second device via the power line, the third device can obtain the first address of the second device via the power line, and the second device can obtain the second address of the third device.
  • the second device sends the first address, the second address, and the third indication information to the first device.
  • the first device receives the first address, the second address, and the third indication information.
  • the second device may send the first address, the second address and the third indication information to the first device simultaneously, or may send them one after another, which is not limited in the embodiment of the present application.
  • the third indication information can be used to indicate that the first address is the address of the second device, and the second address is the address of the third device.
  • the third indication information can be used to instruct the first device to turn on the wireless access point, set the service set identifier SSID of the wireless access point to the first address, and add the second address to the whitelist of the wireless access point.
  • the first device turns on the wireless access point according to the third indication information, sets the SSID of the wireless access point to the first address, and adds the second address to the whitelist.
  • the first device after the first device receives the first address, the second address and the third indication information, it can open a wireless access point with an SSID of the first address according to the third indication information, and the wireless access point has a whitelist verification function. Only devices in the whitelist can access the wireless access point. The first device adds the second address to the whitelist to ensure security.
  • the wireless access point can be a hidden wireless access point. In this case, other devices cannot obtain it through scanning. Only devices that have obtained the SSID can access the wireless access point, thus preventing other devices from accessing the wireless access point, which is beneficial to improving security.
  • the wireless access point may be a hidden wireless access point without a password, so that a third device can conveniently access the wireless access point.
  • the third device sends a second connection request message to the first device requesting to access the wireless access point whose SSID is the first address, the second connection request message including the first address and the second address.
  • the first device receives the second connection request message.
  • the third device can send a second connection request message to the first device requesting access to a wireless access point with the first address as the SSID, and the second connection request message may include the first address and the second address. Including the second address in the second connection request message can help the first device verify the legitimacy of the third device.
  • the first device determines, according to the second address and the white list, that the third device can access the wireless access point.
  • the first device can compare the second address in the second connection request message with the whitelist. When it is determined that the second address is in the whitelist, it can be determined that the third device corresponding to the second address can access the wireless access point.
  • the third device accesses the wireless access point and establishes a network connection with the first device.
  • step 660 the third device accesses the wireless access point, establishes a network connection with the first device, and completes the network configuration process.
  • step 660 may be a part of step 650, which is not limited in the present embodiment.
  • the third device and the second device when they are connected via a power line, they can obtain each other's MAC address. After that, the second device sends the MAC address of the third device, the MAC address of the second device and the third indication information to the first device; the first device can open a wireless access point with an SSID of the MAC address of the second device according to the third indication information, and add the MAC address of the third device to the whitelist of the wireless access point; at this time, the third device can send a connection request message to the first device requesting access to the wireless access point with the MAC address of the second device as the SSID. After the first device passes the verification, the third device can automatically access the wireless network and establish a network connection with the first device. In this technical solution, when configuring the network for the device, the third device can automatically configure the network without the user manually entering the wireless parameters. In addition, since there is no need to use power lines to transmit encrypted wireless parameters, the speed of configuring the network can be further improved.
  • the method 600 may also include step 670 .
  • the first device shuts down the wireless access point whose SSID is the first address.
  • the second device may send instruction information to the first device to close the wireless access point with the SSID of the first address.
  • the first device may close the wireless access point with the SSID of the first address according to the instruction information.
  • the execution process of the above method 600 can be triggered, so that the first device only turns on the wireless access point with the SSID of the first address when needed, and when the third device is disconnected from the second device, the first device can turn off the wireless access point with the SSID of the first address.
  • This technical solution can prevent the first device from always turning on the hidden wireless access point, thereby reducing the power consumption of the first device.
  • the third device and the second device when they are connected via a power line, they can obtain each other's MAC address. Afterwards, the second device can send the first address, the second address and the third indication information to the first device, and the first device can open the wireless access point with the SSID of the first address according to the third indication information; the third device sends a first connection request message to the first device requesting access to the wireless access point with the SSID of the first address, and accesses the wireless access point without verification by the first device.
  • the network configuration process of the third device is simple, and the user does not need to manually participate in the network configuration.
  • Fig. 6 is a schematic interaction diagram of a method for configuring a network provided in an embodiment of the present application. As shown in Fig. 6 , the method 700 may include steps 710 to 740 .
  • the second device sends a first MAC address and first indication information of the second device to the first device.
  • the first device receives the first MAC address and the first indication information.
  • the first indication information may be used to instruct the first device to enable a wireless access point whose SSID is the first MAC address.
  • the first indication information may be information agreed upon by the first device and the second device.
  • the first indication information may be carried in a field A of the message.
  • the field A may carry information "SET AP".
  • the first device When the first device receives the message, it may obtain the information in the field A and enable the wireless access point whose SSID is the first MAC address according to the information in the field A.
  • the first MAC address may also be replaced by other information that can be used to identify the second device, or replaced by identification information agreed upon by both parties.
  • first MAC address may also be replaced by other information, such as indication information and name information agreed upon by both parties.
  • the first device turns on the wireless access point whose SSID is the first MAC address according to the first indication information.
  • the first device After receiving the first MAC address and the first indication information, the first device can enable a wireless access point according to the first indication information and set the SSID of the wireless access point to the first MAC address.
  • the first device setting the SSID of the wireless access point to the first MAC address can be understood as the first device setting the name of the wireless access point to the first MAC address.
  • the wireless access point is a hidden wireless access point. In this case, other devices cannot obtain the wireless access point through normal scanning if they cannot obtain the first MAC address.
  • the wireless access point may be a wireless access point for which no access password is set.
  • the wireless access point may also be set with an access password, for example, the first device also sets the access password of the wireless access point to the first MAC address, so that the third device can conveniently access the wireless access point.
  • the second device may send the first MAC address to the first device instead of sending the first indication information, and the first device may enable a wireless access point whose SSID is the first MAC address based on the first MAC address.
  • the third device sends a first connection request message to the first device requesting to access a wireless access point whose SSID is the first MAC address, wherein the first connection request message includes the first MAC address.
  • the first device receives the first connection request message.
  • the third device may send a request message to the first device requesting access to the wireless access point whose SSID is the first MAC address.
  • the third device accesses the wireless access point whose SSID is the first MAC address, and establishes a network connection with the first device.
  • the third device may access the wireless access point, establish a network connection with the first device, and complete the configuration of the network.
  • the first device may be the network device mentioned above, for example, a router, an intelligent gateway, etc.
  • the second device may be the control device mentioned above, for example, an intelligent host.
  • the third device may be the device mentioned above, for example, a whole-house intelligent panel, a control panel, etc.
  • the first device can receive the first MAC address and the first indication information of the second device sent by the second device, and open the wireless access point with the SSID of the first MAC address according to the first indication information; the first device receives the first connection request message sent by the third device requesting access to the wireless access point, and allows the third device to access the wireless access point.
  • This technical solution can enable the third device to automatically access the wireless access point according to the first MAC address when configuring the network, and establish a network connection with the first device, without the need for the user to manually enter the configuration network parameters, thereby improving the intelligence level of the whole house and the efficiency of configuring the network.
  • the method 700 may further include:
  • the first device receives the second MAC address and second indication information of the third device sent by the second device;
  • the first device allows the third device to access the wireless access point, including
  • the first device allows the third device corresponding to the second MAC address to access the wireless access point according to the second indication information.
  • the second MAC address may also be replaced by other information that can identify the third device.
  • the first device may also store the second MAC address according to the second indication information, and mark that the device corresponding to the second MAC address can access the wireless access point.
  • the second indication information may be information agreed upon by the first device and the second device.
  • the second indication information may be carried in a field B of the message.
  • the field B may carry information "ALLOWED".
  • the first device When the first device receives the message, it may obtain the information in the field B and allow the third device corresponding to the second MAC address to access the wireless access point according to the information in the field B.
  • the first device may also receive the second MAC address and second indication information of the third device sent by the second device, and determine that the third device can access the wireless access point according to the second indication information.
  • the first device may also allow all devices that request to access the wireless access point to access the wireless access point. This embodiment of the present application is not limited thereto.
  • the first connection request message also includes a second MAC address
  • the first device allows a third device corresponding to the second MAC address to access the wireless access point according to the second indication information, including:
  • the first device adds the second MAC address to the whitelist of the wireless access point according to the second indication information
  • the first device After the first device passes the second MAC address verification according to the whitelist, the first device allows the third device to access the wireless access point.
  • the first device when it turns on the wireless access point, it can turn on the whitelist verification function to allow devices in the whitelist to access the wireless access point.
  • Wireless access point After the first device receives the second MAC address and the second indication information, the second MAC address can be added to the whitelist so that the third device corresponding to the second MAC address can access the wireless access point.
  • the first connection request message may also include a second MAC address of the third device, and the first device may add the second MAC address to the whitelist of the wireless access point according to the second indication information, thereby facilitating the first device to verify the second MAC address according to the whitelist.
  • the third device may be allowed to access the wireless access point.
  • the first device receives the first MAC address and the first indication information of the second device sent by the second device, including:
  • the first device receives the first MAC address, the second MAC address, and the first indication information sent by the second device, where the first indication information is also used to instruct the first device to allow a third device corresponding to the second MAC address to access the wireless access point.
  • the first indication information may be the third indication information in the above step 620.
  • This technical solution helps the first device determine which devices can access the wireless access point.
  • the method 700 may further include:
  • the second device obtains a second MAC address of the third device
  • the second device sends the second MAC address and second indication information to the first device, where the second indication information is used to instruct the first device to allow the third device corresponding to the second MAC address to access the wireless access point.
  • the second device when the second device is connected to the third device via the power line, the second device may obtain the second MAC address of the third device via the power line.
  • the second device may also obtain the second MAC address of the third device, and send the second MAC address and second indication information to the first device, so that the first device determines, according to the second indication information, that the third device corresponding to the second MAC address is a device that can access the wireless access point. This technical solution is helpful for the first device to determine which devices can access the wireless access point.
  • the method 700 may further include:
  • the second device obtains a second MAC address of the third device
  • the method may further include:
  • the second device sends the second MAC address to the first device, and the first indication information is further used to instruct the first device to allow a third device corresponding to the second MAC address to access the wireless access point.
  • the second device may obtain the second MAC address of the third device through the power line.
  • the second device may also obtain the second MAC address of the third device and send the second MAC address to the first device, and the first indication information may also instruct the first device to determine the wireless access point that the third device corresponding to the second MAC address can access. This technical solution is helpful for the first device to determine which devices can access the wireless access point.
  • the first device turns on the wireless access point whose SSID is the first MAC address only when needed. This technical solution can prevent the first device from turning on the hidden wireless access point all the time, thereby reducing the power consumption of the first device.
  • the method 700 may further include:
  • the third device obtains the first MAC address of the second device.
  • the third device when the third device establishes a connection with the second device via a power line, the third device can obtain the first MAC address via the power line.
  • the third device can obtain the first MAC address of the second device, send a request to the first device to access the wireless access point whose SSID is the first MAC address, and access the wireless access point.
  • This technical solution allows the third device to automatically access the wireless access point by only obtaining the first MAC address of the second device when configuring the network, avoiding the user from manually entering the configuration network parameters, thereby improving the efficiency of configuring the network.
  • the first device is connected to the second device by wire, and the second device is connected to the third device by wire.
  • the first device and the second device may be connected via a network cable, and the third device and the second device may be connected via a power line.
  • Figure 7 is a schematic block diagram of a device provided by an embodiment of the present application.
  • the device 800 may include one or more processors 810; one or more memories 820; the one or more memories 820 store one or more programs, and the one or more programs include instructions.
  • the instructions are executed by the one or more processors 810, the method for configuring the network described in any possible implementation in the foregoing text is executed.
  • the device 800 may be the third device or device mentioned above (such as a whole-house smart panel, a control panel).
  • the device 800 can execute the steps performed by the third device or device mentioned above to implement corresponding functions.
  • the device 800 may be the second device or control device (such as a smart host) mentioned above.
  • the device 800 may execute the steps performed by the second device or control device mentioned above to implement the corresponding functions.
  • the device 800 may be the first device or network device (such as a router or a gateway) mentioned above.
  • the device 800 may execute the steps performed by the first device or network device mentioned above to implement the corresponding functions.
  • An embodiment of the present application also provides a chip, which includes a processor and a communication interface, wherein the communication interface is used to receive a signal and transmit the signal to the processor, and the processor processes the signal so that the network configuration method described in any possible implementation method in the foregoing text is executed.
  • the device includes hardware and/or software modules corresponding to the execution of each function.
  • the present application can be implemented in the form of hardware or a combination of hardware and software. Whether a function is executed in a hardware or software-driven hardware manner depends on the specific application and design constraints of the technical solution. Those skilled in the art can use different methods to implement the described functions for each specific application in combination with the embodiments, but such implementation should not be considered to be beyond the scope of the present application.
  • the functional modules of the device can be divided according to the above method example.
  • each functional module can be divided according to each function, or two or more functions can be integrated into one processing module.
  • the above integrated module can be implemented in the form of hardware. It should be noted that the division of modules in this embodiment is schematic and is only a logical function division. There may be other division methods in actual implementation.
  • This embodiment also provides a computer-readable storage medium, in which instructions are stored.
  • the instructions When the instructions are executed on a device, the device executes the above-mentioned related method steps to implement the network configuration method in the above-mentioned embodiment.
  • This embodiment also provides a program product.
  • the program product When the program product is run on a device, the device is caused to execute the above-mentioned related steps to implement the network configuration method in the above-mentioned embodiment.
  • an embodiment of the present application also provides a device, which may specifically be a chip, component or module, and the device may include a connected processor and memory; wherein the memory is used to store execution instructions, and when the device is running, the processor may execute the execution instructions stored in the memory so that the chip executes the network configuration method in the above-mentioned method embodiments.
  • the device, readable storage medium, program product or chip provided in this embodiment are all used to execute the corresponding method provided above, therefore, the beneficial effects that can be achieved can refer to the beneficial effects in the corresponding method provided above, and will not be repeated here.
  • the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein can be implemented with electronic hardware, or a combination of software and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the technical solution. Professional and technical personnel can use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of this application.
  • the disclosed systems, devices and methods can be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the units is only a logical function division. There may be other division methods in actual implementation, such as multiple units or components can be combined or integrated into another system, or some features can be ignored or not executed.
  • Another point is that the mutual coupling or direct coupling or communication connection shown or discussed can be through some interfaces, indirect coupling or communication connection of devices or units, which can be electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place or distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a readable storage medium.
  • the technical solution of the present application, or the part that contributes to the prior art, or the part of the technical solution can be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for enabling A device (which may be a personal handheld device, a server, or a network device, etc.) executes all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium includes: a USB flash drive, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk or an optical disk, and other media that can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供了一种配置网络方法和设备,该方法可以包括:第二设备向第一设备发送第二设备的第一MAC地址和第一指示信息;第一设备根据该第一指示信息开启SSID为第一MAC地址的无线接入点;第三设备向第一设备发送请求接入SSID为第一MAC地址的无线接入点的第一连接请求消息,第一连接请求消息中包括第一MAC地址;第三设备接入该SSID为第一MAC地址的无线接入点,与第一设备建立网络连接。该技术方案可以使得设备能够自动进行配置网络,建立网络连接,避免用户手动输入配置网络参数,提升了全屋智能的智能化程度和配置网络效率。

Description

配置网络方法和设备 技术领域
本申请实施例涉及电子技术领域,并且更具体地,涉及一种配置网络方法和设备。
背景技术
当前,用户拥有越来越多的智能家居设备,为打造全屋智能提供了便利。在全屋智能的场景下,一些设备既能够支持电力线通信(power line communication,PLC),也可以支持无线通信。当此类设备第一次接入无线网络时,需要用户参与进行手动配置网络。
发明内容
本申请实施例提供一种配置网络方法和设备,该技术方案可以使得设备能够自动进行配置网络,建立网络连接,避免用户手动输入配置网络参数,提升了全屋智能的智能化程度和配置网络效率。
第一方面,提供了一种配置网络方法,所述方法应用于第一设备,所述方法包括:所述第一设备接收第二设备发送的所述第二设备的第一MAC地址和第一指示信息;所述第一设备根据所述第一指示信息开启服务集标识SSID为所述第一MAC地址的无线接入点;所述第一设备接收第三设备发送的请求接入所述无线接入点的第一连接请求消息,所述第一连接请求消息包括所述第一MAC地址;所述第一设备允许所述第三设备接入所述无线接入点,与所述第三设备建立网络连接。
示例性地,第一MAC地址还可以替换为其他可以用于标识第二设备的信息。
本申请实施例中,第一设备可以接收第二设备发送的第二设备的第一MAC地址和第一指示信息,并根据该第一指示信息开启SSID为第一MAC地址的无线接入点;第一设备接收第三设备发送的请求接入该无线接入点的第一连接请求消息,并允许该第三设备接入该无线接入点。该技术方案可以使得第三设备在进行配置网络时,可以根据获取到的第二设备的第一MAC地址自动接入无线接入点,与第一设备建立网络连接,无需用户手动输入配置网络参数,提升了全屋智能的智能化程度和配置网络效率。
结合第一方面,在第一方面的一种实现方式中,所述方法还包括:所述第一设备接收所述第二设备发送的所述第三设备的第二MAC地址和第二指示信息;所述第一设备允许所述第三设备接入所述无线接入点,包括:所述第一设备根据所述第二指示信息允许所述第二MAC地址对应的第三设备接入所述无线接入点。
本申请实施例中,第一设备还可以接收第二设备发送的第三设备的第二MAC地址和第二指示信息,并根据该第二指示信息确定该第三设备可接入无线接入点。该技术方案可以使得第一设备确定哪些设备是允许接入该无线接入点的,从而可以提升安全性。
另一些示例中,第一设备还可以根据该第二指示信息存储该第二MAC地址,并标记该第二MAC地址对应的设备可接入该无线接入点。
在另一些实施例中,第一设备还可以允许所有请求接入该SSID为第一MAC地址的无线接入点的设备接入该无线接入点,而无需根据第二指示信息确定设备可接入该无线接入点。
结合第一方面,在第一方面的一种实现方式中,所述第一连接请求消息中还包括所述第二MAC地址,所述第一设备根据所述第二指示信息允许所述第二MAC地址对应的第三设备接入所述无线接入点,包括:所述第一设备根据所述第二指示信息将所述第二MAC地址加入所述无线接入点的白名单中;所述第一设备在根据所述白名单校验所述第二MAC地址通过后,允许所述第三设备接入所述无线接入点。
另一些示例中,第一设备还可以根据该第二指示信息存储该第二MAC地址,并标记该第二MAC地址对应的设备可接入该无线接入点。
本申请实施例中,第一连接请求消息中可以包括第三设备的第二MAC地址,第一设备可以根据第二指示信息将第二MAC地址加入无线接入点的白名单中,从而有利于第一设备根据白名单校验该第二MAC地址,当确定该第二MAC地址处于白名单中时,可以允许该第三设备接入该无线接入点。该技术方案有利于提升设备配置网络的安全性。
结合第一方面,在第一方面的一种实现方式中,所述第一设备接收第二设备发送的第二设备的第一MAC地址和第一指示信息,包括:所述第一设备接收所述第二设备发送的第一MAC地址、第二MAC地址和第一指示信息,所述第一指示信息还用于指示所述第一设备允许所述第二MAC地址对应的第三设备接入所述无线接入点。
该技术方案有利于第一设备确定哪些设备可接入该无线接入点。
结合第一方面,在第一方面的一种实现方式中,所述无线接入点为未设置接入密码的无线接入点。
应理解,该无线接入点也可以设置密码,例如将密码同样设置为第一MAC地址,那么第一连接请求消息中还可以包括该密码为第一MAC地址的信息。从而有利于第三设备便捷接入该无线接入点。
结合第一方面,在第一方面的一种实现方式中,所述无线接入点为隐藏的无线接入点。
该技术方案中,该无线接入点为隐藏的无线接入点,从而可以使得其他设备无法通过正常的扫描获取到无线接入点的名称,以进一步提升设备配置网络的安全性。
结合第一方面,在第一方面的一种实现方式中,所述第一设备与所述第二设备有线连接,所述第二设备与所述第三设备有线连接。
示例性地,该第一设备与第二设备可以是通过网线连接,该第二设备与第二设备可以是通过电力线连接。
第二方面,提供了一种配置网络方法,所述方法应用于第二设备,所述方法包括:所述第二设备确定所述第二设备的第一媒体存取控制MAC地址和第一指示信息,所述第一指示信息用于指示第一设备开启服务集标识SSID为所述第一MAC地址的无线接入点;所述第二设备向所述第一设备发送所述第一MAC地址和所述第一指示信息。
本申请实施例中,第二设备可以确定自身的第一MAC地址和第一指示信息,并向第一设备发送该第一MAC地址和第一指示信息。该技术方案有利于第一设备根据该第一指示信息开启SSID为第一MAC地址的无线接入点,使得其他设备可以执行相应的配置网络流程。
结合第二方面,在第二方面的一种实现方式中,所述方法还包括:所述第二设备获取所述第三设备的第二MAC地址;所述第二设备向所述第一设备发送所述第二MAC地址和第二指示信息,所述第二指示信息用于指示所述第一设备允许所述第二MAC地址对应的第三设备接入所述无线接入点。
本申请实施例中,第二设备还可以获取第三设备的第二MAC地址,并向第一设备发送第二MAC地址和第二指示信息,以使得第一设备根据该第二指示信息确定该第二MAC地址对应的第三设备为可接入该无线接入点的设备。该技术方案有利于第一设备确定哪些设备可接入该无线接入点。
结合第二方面,在第二方面的一种实现方式中,在所述第二设备向第一设备发送所述第一MAC地址和所述第一指示信息之前,所述方法还包括:所述第二设备获取所述第三设备的第二MAC地址;所述第二设备向第一设备发送所述第一MAC地址和所述第一指示信息的同时或之后,还包括:所述第二设备向所述第一设备发送所述第二MAC地址,所述第一指示信息还用于指示所述第一设备允许所述第二MAC地址对应的第三设备接入所述无线接入点。
本申请实施例中,在第二设备向第一设备发送第一MAC地址和第一指示信息之前,该第二设备还可以获取第三设备的第二MAC地址,并向第一设备发送所述第二MAC地址,该第一指示信息还可以指示第一设备确定第二MAC地址对应的第三设备可接入无线接入点。该技术方案有利于第一设备确定哪些设备可接入该无线接入点。
结合第二方面,在第二方面的一种实现方式中,所述无线接入点为隐藏的无线接入点。
结合第二方面,在第二方面的一种实现方式中,所述无线接入点为未设置密码的无线接入点。
结合第二方面,在第二方面的一种实现方式中,所述第一设备与所述第二设备有线连接,所述第二设备与所述第三设备有线连接。
第三方面,提供了一种配置网络方法,所述方法应用于第三设备,所述方法包括:所述第三设备获取第二设备的第一媒体存取控制MAC地址;所述第三设备向第一设备发送第一连接请求消息,所述第一连接请求消息用于请求接入服务集标识SSID为第一MAC地址的无线接入点,所述第一连接请求消息包括所述第三设备的第二MAC地址;所述第三设备接入所述无线接入点,与所述第一设备建立网络连接。
本申请实施例中,第三设备可以获取第二设备的第一MAC地址,并向第一设备发送请求接入SSID为第一MAC地址的无线接入点,并接入该无线接入点与第一设备建立网络连接。该技术方案可以使得第三设备在进行配置网络时,只需获取到第二设备的第一MAC地址,即可自动接入该无线接入点,与第一 设备建立网络连接,避免用户手动输入配置网络参数,提升了配置网络效率。
结合第三方面,在第三方面的一种实现方式中,所述无线接入点为隐藏的无线接入点。
结合第三方面,在第三方面的一种实现方式中,所述无线接入点为未设置密码的无线接入点。
第四方面,提供了一种设备,包括用于实现如第一方面至第三方面及其任一种可能的实现方式中所述的配置网络方法中的模块。
第五方面,提供了一种第一设备,包括:一个或多个处理器;一个或多个存储器;该一个或多个存储器存储有一个或多个程序,该一个或多个程序包括指令,当该指令被一个或多个处理器执行时,使得如第一方面及其任一种可能的实现方式中所述的配置网络方法被执行。
第六方面,提供了一种第二设备,包括:一个或多个处理器;一个或多个存储器;该一个或多个存储器存储有一个或多个程序,该一个或多个程序包括指令,当该指令被一个或多个处理器执行时,使得如第二方面及其任一种可能的实现方式中所述的配置网络方法被执行。
第七方面,提供了一种第三设备,包括:一个或多个处理器;一个或多个存储器;该一个或多个存储器存储有一个或多个程序,该一个或多个程序包括指令,当该指令被一个或多个处理器执行时,使得如第三方面及其任一种可能的实现方式中所述的配置网络方法被执行。
第八方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口用于接收信号,并将所述信号传输至所述处理器,所述处理器处理所述信号,使得如第一方面及其任一种可能的实现方式中所述的配置网络方法被执行。
第九方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口用于接收信号,并将所述信号传输至所述处理器,所述处理器处理所述信号,使得如第二方面及其任一种可能的实现方式中所述的配置网络方法被执行。
第十方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口用于接收信号,并将所述信号传输至所述处理器,所述处理器处理所述信号,使得如第三方面及其任一种可能的实现方式中所述的配置网络方法被执行。
第十一方面,提供了一种可读存储介质,所述可读存储介质中存储有指令,当所述指令在第一设备上运行时,使得如第一方面及其任一种可能的实现方式中所述的配置网络方法被执行。
第十二方面,提供了一种可读存储介质,所述可读存储介质中存储有指令,当所述指令在第二设备上运行时,使得如第二方面及其任一种可能的实现方式中所述的配置网络方法被执行。
第十三方面,提供了一种计算机可读存储介质,所述可读存储介质中存储有指令,当所述指令在第三设备上运行时,使得如第三方面及其任一种可能的实现方式中所述的配置网络方法被执行。
第十四方面,提供了一种程序产品,所述程序产品包括程序代码,当所述程序代码在第一设备上运行时,使得如第一方面及其任一种可能的实现方式中所述的配置网络方法被执行。
第十五方面,提供了一种程序产品,所述程序产品包括程序代码,当所述程序代码在第二设备上运行时,使得如第二方面及其任一种可能的实现方式中所述的配置网络方法被执行。
第十六方面,提供了一种程序产品,所述程序产品包括程序代码,当所述程序代码在第三设备上运行时,使得如第三方面及其任一种可能的实现方式中所述的配置网络方法被执行。
附图说明
图1是本申请实施例提供的设备的结构示意图。
图2是本申请实施例提供的设备的软件结构框图。
图3是本申请实施例提供的一种系统框架的示意图。
图4是本申请实施例提供的一种配置网络方法的示意性交互图。
图5是本申请实施例提供的另一种配置网络方法的示意性交互图。
图6是本申请实施例提供的一种配置网络方法的示意性交互图。
图7是本申请实施例提供的一种设备的示意性框图。
具体实施方式
下面将结合附图,对本申请实施例中的技术方案进行描述。
本申请实施例中的配置网络方法可以应用于设备、控制设备、网络设备等。
本申请实施例中的设备可以是智慧家庭(smart home)中的无线设备或有线设备、运输安全(transportation safety)中的无线设备或有线设备、智慧城市(smart city)中的无线设备或有线设备、智能电网(smart grid)中的无线设备或有线设备等,本申请实施例对此并不限定。例如,该设备可以是支持有线通信协议和无线通信协议的智能家居设备,如全屋智能面板、控制面板等。
本申请实施例中的控制设备可以是智能主机等。
本申请实施例中的网络设备可以是用于与控制设备通信的设备,该网络设备可以为路由器、网关、交换机、中继站、接入点、车载设备、5G网络以及未来通信网络中的网络设备等,本申请实施例并不限定。
图1是一种设备的结构示意图。例如,该设备可以是路由器。如图1所示,该设备100可以包括处理器110、存储器120、无线通信电路130、天线132、网络端口140。
本申请实施例示意的结构并不构成对设备100的具体限定。在本申请另一些实施例中,设备100可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。
存储器120可以用于存储指令和数据。处理器110可以调用存储器120存储的指令或数据。网络端口140可以包括有线网络接口,该有线网络接口可被配置为通过宽带等有线网络相接至因特网的网络,并可为多个终端提供对因特网的访问。网络端口140也可以包括移动通信模块,移动通信模块可配置为通过无线通信技术连接到核心网络。无线通信电路130可以被配置为经由例如Wi-Fi网络等无线局域网标准进行通信。无线通信电路130可以是集成至少一个通信处理模块的一个或多个器件。无线通信电路130可以经由天线132接收电磁波,将电磁波信号调频以及滤波处理,将处理后的信号发送到处理器110无线通信模块还可以从处理器110接收待发送的信号,对其进行调频,放大,经天线132转为电磁波辐射出去。
图2是一种设备的软件结构示意图。在一些实施例中,可以根据相应的功能将设备100的软件结构分为业务面、控制面和转发面。
其中,转发面(也称数据面)是决定对流入接口的数据报文进行何种处理。如根据报文中的目的互联网协议(internet protocol address,IP)地址及其他属性参数,根据路由表选择适当的路由路径进行转发。
业务面可以负责用户业务数据(如虚拟局域网、虚拟专用网络,以及像动态主机配置协议、域名系统、网络控制报文协议等业务数据)的计算和处理,主要是由路由器处理器完成。
控制面可以用来实现网络拓扑结构的互联,主要是由各种路由协议控制哪条路由将进入对应的协议路由表中。如在路由可达性、路由属性或者所应用的路由发生改变时及时做出相应的路由调整。
在另一些示例中,该业务面的功能也可以由控制面进行实现,本申请实施例不予限定。这种情况下,该设备100的软件结构包括可以控制面和转发面。
在介绍本申请实施例的技术方案之前,首先简单介绍一下本申请可能会涉及的一些专业术语。
电力线通信:是指利用电力线传输数据和媒体信号的一种通信方式。
媒体存取控制(media access control,MAC)地址:是一个用来确认设备位置的位址,也称物理地址、硬件地址。
无线接入点(access point,AP):无线AP是设备接入有线网络的接入点,主要用于宽带家庭、大楼内部以及园区内部,可以覆盖几十米至上百米。
当前,用户拥有越来越多的智能家居设备,为打造全屋智能提供了便利。在全屋智能的场景下,一些设备既能够支持PLC通信,也可以支持无线通信。当此类设备第一次接入无线网络时,需要用户参与进行手动输入网络参数,以配置网络。
有鉴于此,本申请实施例提供了一种配置网络方法和设备,该技术方案可以使得设备能够自动进行配置网络,避免用户手动参与,提升了全屋智能的智能化程度。
图3是本申请实施例提供的一种系统框架的示意图。
如图3所示,该框架可以包括支持有线通信协议和无线通信协议的第三设备410、第二设备420和第一设备430。其中,第三设备410与第二设备420之间以有线方式进行连接,例如,可以是以电力线进行连接。第二设备420与第一设备430之间以有线方式进行连接,例如,可以是以网线进行连接。第三设备410与第一设备430之间以无线方式进行连接。
其中,该第一设备430相当于前文中的网络设备。例如,该第一设备可以是无线路由器、智能网关 等。
该第二设备420相当于前文中的控制设备。例如,该第二设备可以是智能主机。
该第三设备410相当于前文中的设备。例如,该第三设备可以是全屋智能面板、控制面板等。
示例性地,本申请实施例以该第三设备410是控制面板,该第二设备420是智能主机,该第一设备430是无线路由器为例进行说明,但这不应对本申请实施例造成任何限定。
本申请实施例对于该第三设备410的数量不予限定。
下文将结合图4至图6介绍在该系统框架下,本申请实施例中的技术方案。
图4是本申请实施例提供的一种配置网络方法的示意性交互图。如图4所示,该方法500可以包括步骤510至步骤580。
510,第二设备向第一设备发送第二设备的第一地址和第一指示信息。相应的,第一设备接收该第一地址和第一指示信息。
示例性地,该第一地址可以是第二设备的MAC地址。该第一指示信息可以用于指示第一设备开启无线接入点。或者,该第一指示信息可以用于指示该第一地址为第二设备的MAC地址,例如该第一指示信息为用于指示该第一地址为第二设备的MAC地址的标识。
在另一些示例中,该第一指示信息可以用于指示该第二设备为中央协调节点(central coordinator,cco)。
在另一个示例中,该第一地址也可以用标识信息替代,还可以是其他用于标识第二设备的信息。
520,第一设备根据第一指示信息开启无线接入点,该无线接入点的服务集标识(service set identifier,SSID)设置为第一地址。
该步骤520中,第一设备可以根据接收到的第一指示信息开启一个无线接入点,该无线接入点的SSID设置为第二设备的第一地址。这种情况下,该无线接入点的名称为第一地址。
应理解,该无线接入点为开放的无线接入点,第一设备不对该无线接入点设置接入密码。
在一些示例中,该无线接入点可以是隐藏的无线接入点。这种情况下,其他设备无法通过扫描获取到该无线接入点,只有获取到该SSID的设备才可能接入,从而可以避免其他设备接入该无线接入点,有利于提升安全性。
在一些示例中,可以对该无线接入点设置白名单校验,允许白名单中的设备接入该无线接入点,以保证安全性。
应理解,在第二设备在第一次通过网线连接第一设备时,第二设备可以执行该步骤510,第一设备可以执行该步骤520。此时,第一设备的无线接入点一直保持开启,当后续有设备需要接入该第一设备的无线接入点时,可以随时接入该无线接入点。
530,第三设备获取第二设备的第一地址,第二设备获取第三设备的第二地址。
例如,该第二地址为第三设备的MAC地址。该第二地址还可以是其他用于标识第三设备的信息,本申请实施例不予限定。
示例性地,该步骤530中,当第三设备通过电力线与第二设备连接后,第三设备可以通过该电力线获取第二设备的第一地址,第二设备可以通过该电力线获取第三设备的第二地址。例如,第三设备通过该电力线向第二设备发送第二地址,第二设备通过该电力线向第三设备发送第一地址。
540,第二设备向第一设备发送第二地址和第二指示信息。相应的,第一设备接收该第二地址和第二指示信息。
示例性地,该第二指示信息可以是用于指示第一设备将该第二地址加入白名单中。或者,该第二指示信息可以是用于指示该第二地址为第三设备的MAC地址,例如该第二指示信息为用于指示该第二地址为第三设备的MAC地址的标识。
550,第一设备根据第二指示信息将第二地址加入白名单中。
例如,第一设备将该第二地址加入白名单中。
应理解,此时,白名单中包括第二地址,则第一设备可以允许该第二地址对应的第三设备接入该无线接入点。
在另一些示例中,第一设备还可以根据该第二指示信息存储该第二地址,并标识该第二地址为允许接入该无线接入点的地址。
560,第三设备向第一设备发送请求接入SSID为第一地址的无线接入点的第一连接请求消息,第一 连接请求消息包括第一地址和第二地址。相应的,第一设备接收该第一连接请求消息。
应理解,该步骤560中,由于第三设备已经获取了第二设备的第一地址,因此,第三设备可以向第一设备发送请求接入以该第一地址作为SSID的无线接入点的第一连接请求消息,该第一连接请求消息中可以包括第一地址和第二地址。该第一连接请求消息中包括第二地址可以有利于第一设备对第三设备的合法性进行校验。
570,第一设备根据第二地址和白名单确定第三设备可接入无线接入点。
应理解,第一设备接收到第一连接请求消息后,可以根据第一连接请求消息中的第二地址和白名单进行比较。当确定该第二地址处于白名单中时,可以确定该第二地址对应的第三设备可以接入该无线接入点。在另一些示例中,当确定该第二地址不处于白名单中,第一设备可以确定该第二地址对应的第三设备不可接入该无线接入点。
580,第三设备接入无线接入点,与第一设备建立网络连接。
该步骤580中,第三设备接入无线接入点,与第一设备建立网络连接,完成配置网络流程。在一些示例中,该步骤580可以是步骤570的一部分,本申请实施例不予限定。
应理解,本申请实施例对于该步骤510至步骤580的具体执行顺序不予限定。在一些示例中,该步骤510至步骤580的部分步骤也可以不执行,或者由其他步骤进行替代等等。
在本申请的一个实施例中,第二设备在与第一设备建立有线连接时,第二设备可以向第一设备发送自身的MAC地址和第一指示信息,第一设备可以根据该第一指示信息开启SSID为第二设备的MAC地址的无线接入点;第三设备与第二设备通过电力线连接时,可以互相获取到对方的MAC地址,之后,第二设备向第一设备发送第三设备的MAC地址和第二指示信息;第一设备可以根据第二指示信息将第三设备的MAC地址加入到白名单中;此时,第三设备可以向第一设备发送请求接入以该第二设备的MAC地址作为SSID的无线接入点的连接请求消息;在第一设备校验通过后,第三设备可以自动接入该无线网络,与第一设备建立网络设备。该技术方案中,在对第三设备进行配置网络时,第三设备可以自动进行配置网络,无需用户手动输入无线参数。此外,由于无需使用电力线传输加密的无线参数,因此,可以进一步提升配置网络速度。
应理解,该步骤540、550、570为可选步骤,在另一些实施例中,该步骤540、550、570也可以不执行。在这种情况下,第一设备可以根据第一指示信息开启SSID为第一地址的无线接入点,第三设备在获取第二设备的第一地址后,可以直接向第一设备发送请求接入SSID为第一地址的无线接入点的第一连接请求消息,并接入该无线接入点,与第一设备建立网络连接,无需第一设备进行校验。此时,第一设备可以允许所有请求接入该SSID为第一地址的无线接入点的设备接入该无线接入点,并与之建立网络连接。该技术方案中,第三设备的配置网络流程简单,且无需用户手动参与配置网络。
图5是本申请实施例提供的另一种配置网络方法的示意性交互图。如图5所示,该方法600可以包括步骤610至步骤670。
610,第三设备获取第二设备的第一地址,第二设备获取第三设备的第二地址。
示例性地,当第三设备通过电力线与第二设备建立连接后,第三设备可以通过电力线获取第二设备的第一地址,第二设备可以获取第三设备的第二地址。具体可以参见前文中步骤530的相关描述。
620,第二设备向第一设备发送第一地址、第二地址和第三指示信息。相应的,第一设备接收该第一地址、第二地址和第三指示信息。
应理解,该步骤620中,第二设备可以向第一设备同时发送该第一地址、第二地址和第三指示信息,也可以先后发送,本申请实施例不予限定。
在一个示例中,该第三指示信息可以用于指示该第一地址为第二设备的地址,该第二地址为第三设备的地址。或者,该第三指示信息可以用于指示第一设备开启无线接入点,无线接入点的服务集标识SSID设置为第一地址,并将第二地址加入无线接入点的白名单中。
630,第一设备根据第三指示信息开启无线接入点,无线接入点的SSID设置为第一地址,并将第二地址加入白名单。
示例性地,第一设备接收到该第一地址、第二地址和第三指示信息后,可以根据该第三指示信息开启一个SSID为第一地址的无线接入点,且该无线接入点具有白名单校验功能,处于白名单内的设备才可以接入该无线接入点,第一设备将第二地址加入白名单中,以保证安全性。
在一些示例中,该无线接入点可以是隐藏的无线接入点。这种情况下,其他设备无法通过扫描获取 到该无线接入点,只有获取到该SSID的设备才可能接入,从而可以避免其他设备接入该无线接入点,有利于提升安全性。
在另一些示例中,该无线接入点可以是未设置密码的隐藏的无线接入点。从而有利于第三设备便捷接入该无线接入点。
640,第三设备向第一设备发送请求接入SSID为第一地址的无线接入点的第二连接请求消息,第二连接请求消息包括第一地址和第二地址。相应的,第一设备接收到第二连接请求消息。
应理解,该步骤640中,由于第三设备已经获取了第二设备的第一地址,因此,第三设备可以向第一设备发送请求接入以该第一地址作为SSID的无线接入点的第二连接请求消息,该第二连接请求消息中可以包括第一地址和第二地址。该第二连接请求消息中包括第二地址可以有利于第一设备对第三设备的合法性进行校验。
650,第一设备根据第二地址和白名单确定第三设备可接入无线接入点。
应理解,第一设备接收到第二连接请求消息后,可以根据第二连接请求消息中的第二地址和白名单进行比较。当确定该第二地址处于白名单中时,可以确定该第二地址对应的第三设备可以接入该无线接入点。
660,第三设备接入无线接入点,与第一设备建立网络连接。
该步骤660中,第三设备接入无线接入点,与第一设备建立网络连接,完成配置网络流程。在一些示例中,该步骤660可以是步骤650的一部分,本申请实施例不予限定。
在本申请的一个实施例中,第三设备与第二设备通过电力线连接时,可以互相获取到对方的MAC地址,之后,第二设备向第一设备发送第三设备的MAC地址、第二设备的MAC地址和第三指示信息;第一设备可以根据该第三指示信息开启一个SSID为第二设备的MAC地址的无线接入点,并将第三设备的MAC地址加入无线接入点的白名单中;此时,第三设备可以向第一设备发送请求接入以该第二设备的MAC地址作为SSID的无线接入点的连接请求消息,在第一设备校验通过后,第三设备可以自动接入该无线网络,与第一设备建立网络连接。该技术方案中,在对设备进行配置网络时,第三设备可以自动进行配置网络,无需用户手动输入无线参数。此外,由于无需使用电力线传输加密的无线参数,因此,可以进一步提升配置网络速度。
在一些示例中,该方法600还可以包括步骤670。
670,第一设备关闭该SSID为第一地址的无线接入点。
该步骤670中,当第三设备与第二设备断开连接时,第二设备可以向第一设备发送关闭该SSID为第一地址的无线接入点的指示信息。第一设备可以根据该指示信息关闭SSID为第一地址的无线接入点。
基于本申请实施例,当有第三设备通过电力线接入第二设备时,可以触发上述方法600的执行过程,从而第一设备在需要时才开启SSID为第一地址的无线接入点,当第三设备与第二设备断开连接后,第一设备可以关闭该SSID为第一地址的无线接入点。该技术方案可以避免第一设备一直开启隐藏的无线接入点,从而可以降低第一设备的功耗。
在另一些实施例中,第三设备与第二设备通过电力线连接时,可以互相获取到对方的MAC地址。之后,第二设备可以向第一设备发送第一地址、第二地址和第三指示信息,第一设备根据第三指示信息可以开启SSID为第一地址的无线接入点;第三设备向第一设备发送请求接入SSID为第一地址的无线接入点的第一连接请求消息,并接入该无线接入点,无需第一设备进行校验。该技术方案中,第三设备的配置网络流程简单,且无需用户手动参与配置网络。
图6是本申请实施例提供的一种配置网络方法的示意性交互图。如图6所示,该方法700可以包括步骤710至步骤740。
710,第二设备向第一设备发送第二设备的第一MAC地址和第一指示信息。相应的,第一设备接收该第一MAC地址和第一指示信息。
示例性地,该第一指示信息可以用于指示第一设备开启一个SSID为第一MAC地址的无线接入点。
应理解,该第一指示信息可以第一设备和第二设备双方约定的信息。该第一指示信息可以是承载在报文的某个字段A中。例如,该字段A中可以携带信息“SET AP”,当第一设备接收到该报文后,可以获取到该字段A中的信息,并根据该字段A中的信息开启SSID为第一MAC地址的无线接入点。
该第一MAC地址还可以替换为其他可以用于标识第二设备的信息,或者,替换为双方约定的标识信息。
应理解,该第一MAC地址还可以替换为其他信息,如双方约定的指示信息,名称信息等。
720,第一设备根据该第一指示信息开启SSID为第一MAC地址的无线接入点。
该第一设备在接收到第一MAC地址和第一指示信息后,可以根据该第一指示信息开启一个无线接入点,并将该无线接入点的SSID设置为第一MAC地址。
该第一设备将无线接入点的SSID设置为第一MAC地址可以理解为第一设备将无线接入点的名称设置为第一MAC地址。
在一些示例中,该无线接入点为隐藏的无线接入点。这种情况下,其他设备在无法获取第一MAC地址的情况下,无法通过正常扫描获取到该无线接入点。
在另一些示例中,该无线接入点可以是未设置接入密码的无线接入点。
在另一些示例中,该无线接入点也可以设置接入密码,例如,第一设备将该无线接入点的接入密码同样设置为第一MAC地址。这样,有利于第三设备便捷接入该无线接入点。
在另一些实施例中,第二设备可以向第一设备发送第一MAC地址,而不发送第一指示信息,第一设备可以根据该第一MAC地址开启SSID为第一MAC地址的无线接入点。
730,第三设备向第一设备发送请求接入SSID为第一MAC地址的无线接入点的第一连接请求消息,该第一连接请求消息中包括第一MAC地址。相应的,第一设备接收该第一连接请求消息。
应理解,该第三设备在进行配置网络时,可以向第一设备发送请求接入该SSID为第一MAC地址的无线接入点的请求消息。
740,第三设备接入该SSID为第一MAC地址的无线接入点,与第一设备建立网络连接。
该步骤740中,第三设备可以接入该无线接入点,与第一设备建立网络连接,完成配置网络。
在一些实施例中,该第一设备可以是前文中的网络设备,例如,可以是路由器、智能网关等。该第二设备可以是前文中的控制设备,例如,可以是智能主机。该第三设备可以是前文中的设备,例如,可以是全屋智能面板、控制面板等。
在本申请的一个实施例中,第一设备可以接收第二设备发送的第二设备的第一MAC地址和第一指示信息,并根据该第一指示信息开启SSID为第一MAC地址的无线接入点;第一设备接收第三设备发送的请求接入该无线接入点的第一连接请求消息,并允许该第三设备接入该无线接入点。该技术方案可以使得第三设备在进行配置网络时,可以根据该第一MAC地址自动接入无线接入点,与第一设备建立网络连接,无需用户手动输入配置网络参数,提升了全屋智能的智能化程度和配置网络效率。
在一些实施例中,该方法700还可以包括:
第一设备接收第二设备发送的第三设备的第二MAC地址和第二指示信息;
第一设备允许第三设备接入所述无线接入点,包括
第一设备根据第二指示信息允许第二MAC地址对应的第三设备接入无线接入点。
示例性地,该第二MAC地址还可以替换为其他可以标识第三设备的信息。
另一些示例中,第一设备还可以根据该第二指示信息存储该第二MAC地址,并标记该第二MAC地址对应的设备可接入该无线接入点。
应理解,该第二指示信息可以第一设备和第二设备双方约定的信息。该第二指示信息可以是承载在报文的某个字段B中。例如,该字段B中可以携带信息“ALLOWED”,当第一设备接收到该报文后,可以获取到该字段B中的信息,并根据该字段B中的信息允许第二MAC地址的对应的第三设备接入该无线接入点。
在本申请的一个实施例中,第一设备还可以接收第二设备发送的第三设备的第二MAC地址和第二指示信息,并根据该第二指示信息确定该第三设备可接入无线接入点。该技术方案可以使得第一设备确定哪些设备是允许接入该无线接入点的,从而可以提升安全性。
在另一些示例中,第一设备还可以允许所有请求接入该无线接入点的设备接入该无线接入点。本申请实施例不予限定。
在一些实施例中,第一连接请求消息中还包括第二MAC地址,第一设备根据第二指示信息允许第二MAC地址对应的第三设备接入无线接入点,包括:
第一设备根据第二指示信息将第二MAC地址加入无线接入点的白名单中;
第一设备在根据白名单校验第二MAC地址通过后,允许第三设备接入无线接入点。
示例性地,第一设备在开启无线接入点时,可以开启白名单校验功能,允许白名单中的设备接入该 无线接入点。当第一设备接收到第二MAC地址和第二指示信息后,可以将该第二MAC地址加入白名单中,以使得第二MAC地址对应的第三设备可以接入该无线接入点。
在本申请的一个实施例中,第一连接请求消息中还可以包括第三设备的第二MAC地址,第一设备可以根据第二指示信息将第二MAC地址加入无线接入点的白名单中,从而有利于第一设备根据白名单校验该第二MAC地址。当确定该第二MAC地址处于白名单中时,可以允许该第三设备接入该无线接入点。该技术方案有利于提升设备配置网络的安全性。
在一些实施例中,第一设备接收第二设备发送的第二设备的第一MAC地址和第一指示信息,包括:
第一设备接收第二设备发送的第一MAC地址、第二MAC地址和第一指示信息,第一指示信息还用于指示第一设备允许第二MAC地址对应的第三设备接入无线接入点。
示例性地,该第一指示信息可以是前文中步骤620中的第三指示信息。
该技术方案有利于第一设备确定哪些设备可接入该无线接入点。
在一些实施例中,该方法700还可以包括:
第二设备获取第三设备的第二MAC地址;
第二设备向第一设备发送第二MAC地址和第二指示信息,第二指示信息用于指示第一设备允许第二MAC地址对应的第三设备接入无线接入点。
示例性地,该第二设备可以在和第三设备通过电力线连接时,通过电力线获取第三设备的第二MAC地址。
在本申请的一个实施例中,第二设备还可以获取第三设备的第二MAC地址,并向第一设备发送第二MAC地址和第二指示信息,以使得第一设备根据该第二指示信息确定该第二MAC地址对应的第三设备为可接入该无线接入点的设备。该技术方案有利于第一设备确定哪些设备可接入该无线接入点。
在一些实施例中,在第二设备向第一设备发送第二设备的第一MAC地址和第一指示信息之前,该方法700还可以包括:
第二设备获取第三设备的第二MAC地址;
第二设备向第一设备发送第一MAC地址和第一指示信息的同时或之后,还可以包括:
第二设备向第一设备发送第二MAC地址,第一指示信息还用于指示第一设备允许第二MAC地址对应的第三设备接入无线接入点。
示例性地,第二设备可以通过电力线获取第三设备的第二MAC地址。
在本申请的一个实施例中,在第二设备向第一设备发送第一MAC地址和第一指示信息之前,该第二设备还可以获取第三设备的第二MAC地址,并向第一设备发送第二MAC地址,该第一指示信息还可以指示第一设备确定第二MAC地址对应的第三设备可接入无线接入点。该技术方案有利于第一设备确定哪些设备可接入该无线接入点。
本申请实施例中,第一设备在需要时才开启SSID为第一MAC地址的无线接入点,该技术方案可以避免第一设备一直开启隐藏的无线接入点,从而可以降低第一设备的功耗。
在一些实施例中,在步骤730之前,该方法700还可以包括:
第三设备获取第二设备的第一MAC地址。
示例性地,该第三设备可以通过电力线与第二设备建立连接时,通过该电力线获取第一MAC地址。
在本申请的一个实施例中,第三设备可以获取第二设备的第一MAC地址,并向第一设备发送请求接入SSID为第一MAC地址的无线接入点,并接入该无线接入点。该技术方案可以使得第三设备在进行配置网络时,只需获取到第二设备的第一MAC地址,即可自动接入该无线接入点,避免用户手动输入配置网络参数,提升了配置网络效率。
在一些实施例中,第一设备与第二设备有线连接,第二设备与第三设备有线连接。
示例性地,该第一设备与第二设备可以是通过网线连接,该第三设备与第二设备可以是通过电力线连接。
图7是本申请实施例提供的一种设备的示意性框图。如图7所示,该设备800可以包括可以包括一个或多个处理器810;一个或多个存储器820;该一个或多个存储器820存储有一个或多个程序,该一个或多个程序包括指令,当该指令被一个或多个处理器810执行时,使得如前文中任一种可能的实现方式中所述的配置网络方法被执行。
在一些实施例中,该设备800可以是前文中的第三设备或设备(如全屋智能面板、控制面板),当 该指令被一个或多个处理器810执行时,设备800可以执行上文中第三设备或设备执行的步骤以实现相应的功能。
在一些实施例中,该设备800可以是前文中的第二设备或控制设备(如智能主机),当该指令被一个或多个处理器810执行时,设备800可以执行上文中第二设备或控制设备执行的步骤以实现相应的功能。
在一些实施例中,该设备800可以是前文中的第一设备或网络设备(如路由器、网关),当该指令被一个或多个处理器810执行时,设备800可以执行上文中第一设备或网络设备执行的步骤以实现相应的功能。
本申请实施例还提供一种芯片,所述芯片包括处理器和通信接口,所述通信接口用于接收信号,并将所述信号传输至所述处理器,所述处理器处理所述信号,使得如前文中任一种可能的实现方式中所述的配置网络方法被执行。
可以理解的是,设备为了实现上述功能,其包含了执行各个功能相应的硬件和/或软件模块。结合本文中所公开的实施例描述的各示例的算法步骤,本申请能够以硬件或硬件和软件的结合形式来实现。某个功能究竟以硬件还是软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。本领域技术人员可以结合实施例对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本实施例可以根据上述方法示例对设备进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块可以采用硬件的形式实现。需要说明的是,本实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
本实施例还提供一种可读存储介质,该计算机可读存储介质中存储有指令,当该指令在设备上运行时,使得设备执行上述相关方法步骤实现上述实施例中的配置网络方法。
本实施例还提供了一种程序产品,当该程序产品在设备上运行时,使得设备执行上述相关步骤,以实现上述实施例中的配置网络方法。
另外,本申请的实施例还提供一种装置,这个装置具体可以是芯片,组件或模块,该装置可包括相连的处理器和存储器;其中,存储器用于存储执行指令,当装置运行时,处理器可执行存储器存储的执行指令,以使芯片执行上述各方法实施例中的配置网络方法。
其中,本实施例提供的设备、可读存储介质、程序产品或芯片均用于执行上文所提供的对应的方法,因此,其所能达到的有益效果可参考上文所提供的对应的方法中的有益效果,此处不再赘述。本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该软件产品存储在一个存储介质中,包括若干指令用以使 得一台设备(可以是个人手持设备,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (16)

  1. 一种配置网络方法,其特征在于,所述方法包括:
    所述第一设备接收第二设备发送的所述第二设备的第一媒体存储控制MAC地址和第一指示信息;
    所述第一设备根据所述第一指示信息开启服务集标识SSID为所述第一MAC地址的无线接入点;
    所述第一设备接收第三设备发送的请求接入所述无线接入点的第一连接请求消息,所述第一连接请求消息中包括所述第一MAC地址;
    所述第一设备允许所述第三设备接入所述无线接入点,与所述第三设备建立网络连接。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    所述第一设备接收所述第二设备发送的所述第三设备的第二MAC地址和第二指示信息;
    所述第一设备允许所述第三设备接入所述无线接入点,包括:
    所述第一设备根据所述第二指示信息允许所述第二MAC地址对应的第三设备接入所述无线接入点。
  3. 根据权利要求2所述的方法,其特征在于,所述第一连接请求消息中还包括所述第二MAC地址,所述第一设备根据所述第二指示信息允许所述第二MAC地址对应的第三设备接入所述无线接入点,包括:
    所述第一设备根据所述第二指示信息将所述第二MAC地址加入所述无线接入点的白名单中;
    所述第一设备在根据所述白名单校验所述第二MAC地址通过后,允许所述第三设备接入所述无线接入点。
  4. 根据权利要求1所述的方法,其特征在于,所述第一设备接收第二设备发送的所述第二设备的第一MAC地址和第一指示信息,包括:
    所述第一设备接收所述第二设备发送的所述第一MAC地址、所述第二MAC地址和所述第一指示信息,所述第一指示信息还用于指示所述第一设备允许所述第二MAC地址对应的第三设备接入所述无线接入点。
  5. 一种配置网络方法,其特征在于,所述方法包括:
    所述第二设备确定所述第二设备的第一媒体存取控制MAC地址和第一指示信息,所述第一指示信息用于指示第一设备开启服务集标识SSID为所述第一MAC地址的无线接入点;
    所述第二设备向所述第一设备发送所述第一MAC地址和所述第一指示信息。
  6. 根据权利要求5所述的方法,其特征在于,所述方法还包括:
    所述第二设备获取所述第三设备的第二MAC地址;
    所述第二设备向所述第一设备发送所述第二MAC地址和第二指示信息,所述第二指示信息用于指示所述第一设备允许所述第二MAC地址对应的第三设备接入所述无线接入点。
  7. 根据权利要求5所述的方法,其特征在于,在所述第二设备向第一设备发送所述第一MAC地址和所述第一指示信息之前,所述方法还包括:
    所述第二设备获取所述第三设备的第二MAC地址;
    所述第二设备向第一设备发送所述第一MAC地址和所述第一指示信息的同时或之后,还包括:
    所述第二设备向所述第一设备发送所述第二MAC地址,所述第一指示信息还用于指示所述第一设备允许所述第二MAC地址对应的第三设备接入所述无线接入点。
  8. 根据权利要求1至7中任一项所述的方法,其特征在于,所述第一设备与所述第二设备有线连接,所述第二设备与所述第三设备有线连接。
  9. 一种配置网络方法,其特征在于,所述方法包括:
    所述第三设备获取第二设备的第一媒体存取控制MAC地址;
    所述第三设备向第一设备发送第一连接请求消息,所述第一连接请求消息用于请求接入服务集标识SSID为所述第一MAC地址的无线接入点,所述第一连接请求消息包括所述第一MAC地址和所述第三设备的第二MAC地址;
    所述第三设备接入所述无线接入点,与所述第一设备建立网络连接。
  10. 根据权利要求1至9任一项所述的方法,其特征在于,所述无线接入点为隐藏的无线接入点。
  11. 根据权利要求1至10任一项所述的方法,其特征在于,所述无线接入点为未设置密码的无线接入点。
  12. 一种第一设备,其特征在于,包括:一个或多个处理器;一个或多个存储器;该一个或多个存储器存储有一个或多个程序,该一个或多个程序包括指令,当该指令被一个或多个处理器执行时,使得如权利要求1至4和10至11中任一项所述的配置网络方法被执行。
  13. 一种第二设备,其特征在于,包括:一个或多个处理器;一个或多个存储器;该一个或多个存储器存储有一个或多个程序,该一个或多个程序包括指令,当该指令被一个或多个处理器执行时,使得如权利要求5至8和10至11中任一项所述的配置网络方法被执行。
  14. 一种第三设备,其特征在于,包括:一个或多个处理器;一个或多个存储器;该一个或多个存储器存储有一个或多个程序,该一个或多个程序包括指令,当该指令被一个或多个处理器执行时,使得如权利要求9至11中任一项所述的配置网络方法被执行。
  15. 一种芯片,其特征在于,所述芯片包括处理器和通信接口,所述通信接口用于接收信号,并将所述信号传输至所述处理器,所述处理器处理所述信号,使得如权利要求1至11中任一项所述的配置网络方法被执行。
  16. 一种可读存储介质,其特征在于,所述可读存储介质中存储有程序指令,当所述程序指令在设备上运行时,使得如权利要求1至11中任一项所述的配置网络方法被执行。
PCT/CN2023/124307 2022-10-31 2023-10-12 配置网络方法和设备 WO2024093640A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211345833.2 2022-10-31
CN202211345833.2A CN117955824A (zh) 2022-10-31 2022-10-31 配置网络方法和设备

Publications (1)

Publication Number Publication Date
WO2024093640A1 true WO2024093640A1 (zh) 2024-05-10

Family

ID=90798602

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/124307 WO2024093640A1 (zh) 2022-10-31 2023-10-12 配置网络方法和设备

Country Status (2)

Country Link
CN (1) CN117955824A (zh)
WO (1) WO2024093640A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107454655A (zh) * 2017-07-21 2017-12-08 上海斐讯数据通信技术有限公司 一种智能设备的连接方法和系统
US20200154340A1 (en) * 2017-05-02 2020-05-14 Qingdao Haier Air Conditioner General Corp., Ltd. Home Appliance Network Configuration Method, Home Appliance, and User Terminal
WO2022016674A1 (zh) * 2020-07-24 2022-01-27 深圳创维数字技术有限公司 智能设备配网方法、设备及存储介质
CN114697991A (zh) * 2020-12-31 2022-07-01 华为技术有限公司 Wi-Fi配置方法及电子设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200154340A1 (en) * 2017-05-02 2020-05-14 Qingdao Haier Air Conditioner General Corp., Ltd. Home Appliance Network Configuration Method, Home Appliance, and User Terminal
CN107454655A (zh) * 2017-07-21 2017-12-08 上海斐讯数据通信技术有限公司 一种智能设备的连接方法和系统
WO2022016674A1 (zh) * 2020-07-24 2022-01-27 深圳创维数字技术有限公司 智能设备配网方法、设备及存储介质
CN114697991A (zh) * 2020-12-31 2022-07-01 华为技术有限公司 Wi-Fi配置方法及电子设备

Also Published As

Publication number Publication date
CN117955824A (zh) 2024-04-30

Similar Documents

Publication Publication Date Title
CN102137395B (zh) 配置接入设备的方法、装置及系统
CN104243210B (zh) 远程访问路由器管理页面的方法和系统
US11201814B2 (en) Configuration of networks using switch device access of remote server
WO2020098253A1 (zh) 网络接入方法、装置、相关设备及存储介质
CN108881308B (zh) 一种用户终端及其认证方法、系统、介质
US9813291B2 (en) Shortest path bridging (SPB) configuration of networks using client device access of remote
US10142342B2 (en) Authentication of client devices in networks
US9369448B2 (en) Network security parameter generation and distribution
WO2021218578A1 (zh) 路由器组网方法、系统、子路由器和母路由器
CN106535187B (zh) 基于无线路由终端的智能家居设备接入方法及系统
CN104519546B (zh) 一种基于无线局域网的通信方法及系统
CN107820262B (zh) 参数配置方法、装置及系统
WO2016180020A1 (zh) 一种报文处理方法、设备和系统
US9118588B2 (en) Virtual console-port management
CN110417909B (zh) 无线网络远程登录方法和系统
CN103595712A (zh) 一种Web认证方法、装置及系统
TW201210251A (en) Plug-and-play wireless network extension station and method of automatic configuration thereof
CN113938525A (zh) 5g泛终端接入管理和资源调度平台服务器、系统及方法
WO2024093640A1 (zh) 配置网络方法和设备
WO2015058413A1 (zh) 一种数据配置方法及网络管理服务器
CN114884771B (zh) 基于零信任理念的身份化网络构建方法、装置和系统
TWI511496B (zh) 無線通訊系統與管理方法
KR101114921B1 (ko) 이동통신에서의 가상 사설망 서비스 제공 장치 및 방법
CN108307683A (zh) 通讯方法、微基站、微基站控制器、终端和系统
WO2023226956A1 (zh) 一种网络设备和通信系统