Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to endSame or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attachedThe embodiment of figure description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " oneIt is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the inventionDiction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or additionOther one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim memberPart is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also beIntermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or wirelessly coupling.It is used herein to arrangeDiction "and/or" includes one or more associated wholes for listing item or any cell and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology artLanguage and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should alsoUnderstand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior artThe consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as hereTo explain.
Those skilled in the art of the present technique be appreciated that " terminal " used herein above, " terminal device ", " intelligent terminal "," mobile phone terminal " had both included the equipment of wireless signal receiver, only had setting for the wireless signal receiver of non-emissive abilityIt is standby, and the equipment including receiving and emitting hardware, have the reception that two-way communication on bidirectional communication link, can be executed andEmit the equipment of hardware.This equipment may include: honeycomb or other communication equipments, with single line display or multi-lineDisplay or honeycomb or other communication equipments without multi-line display;PCS(Personal CommunicationsService, PCS Personal Communications System), it can be with combine voice, data processing, fax and/or communication ability;PDA(Personal Digital Assistant, personal digital assistant), may include radio frequency receiver, pager, internet/Intranet access, web browser, notepad, calendar and/or GPS (Global Positioning System, global locationSystem) receiver;Conventional laptop and/or palmtop computer or other equipment have and/or including radio frequency receiverConventional laptop and/or palmtop computer or other equipment.Various " terminals " used herein above can be it is portable, can transportIt is defeated, be mounted in the vehicles (aviation, sea-freight and/or land), or be suitable for and/or be configured in local runtime, and/Or with distribution form, operate in any other position operation in the earth and/or space.Various " terminals " used herein above may be used alsoTo be communication terminal, access terminals, music/video playback terminal, such as it can be PDA, MID (Mobile InternetDevice, mobile internet device) and/or mobile phone with music/video playing function, be also possible to smart television,The equipment such as set-top box, intelligent video camera head, intelligent remote controller, intelligent socket.
Those skilled in the art of the present technique are appreciated that remote network devices used herein above comprising but be not limited to countThe cloud that calculation machine, network host, single network server, multiple network server collection or multiple servers are constituted.Here, Yun YoujiIt is constituted in a large number of computers or network servers of cloud computing (Cloud Computing), wherein cloud computing is distributed computingOne kind, a super virtual computer consisting of a loosely coupled set of computers.In the embodiment of the present invention, distal endIt can be realized and be communicated by any communication mode between the network equipment, terminal device and WNS server, including but not limited to, is based onThe mobile communication of 3GPP, LTE, WIMAX, based on TCP/IP, the computer network communication of udp protocol and based on bluetooth, infraredThe low coverage wireless transmission method of transmission standard.
The present invention is the series of network access technology solution proposed for the development in response to Internet of Things, applied fieldScape is more suitable for the local area network realized with WiFi technology, but theoretically should be with operating system without being necessarily associated with.Based on this, originallyInvention not only provides target network on the one hand for the mobile intelligent terminal of the similar mobile phone of central control action etc and connectsEnter guidance method and corresponding device, providing automation to access the target network for other smart machines, intelligent terminal connectsThe guide entered, moreover, on the other hand, or independently of its except the intelligent terminal for playing central control actionHis smart machine, intelligent terminal provide target network cut-in method, so that the intelligent terminal is improved, to realize such intelligence eventuallyExempt from setting access target network in end.In view of this, the following description will be around the expansion description respectively of these aspects.Described connectsEnter guidance method and cut-in method, is substantially the different aspect for belonging to a system schema.Utilize the access guiding sideMethod is dished out the data of guide formula, and the cut-in method can be then utilized, real on the basis of using the guide formula dataExisting network insertion.
It is necessary to first carry out following guiding explanation to application scenarios of the invention and its principle.
The present invention wants improved mobile phone terminal, will implement target network access guidance method provided by the invention, accordingly, the present invention wants improved intelligent terminal, will implement target network cut-in method provided by the invention.Mobile phone terminal and intelligenceTerminal, which cooperates, completes the operating process that intelligent terminal accesses the target network, and the target network is that mobile phone terminal is currentThe network of access, intelligent terminal access configuration information required for the target network, are provided by mobile phone terminal.
But for cost or succinct consideration, intelligent terminal is usually the relatively simple equipment of function or even certain feelingsHuman-computer interaction interface cannot be provided under condition, in this case, cannot allow such as mobile phone user setting WiFi network SSID andTherefore the information such as password in technical principle, need to transmit these configuration informations from mobile phone terminal to intelligent terminal, so as to intelligent endTarget network is accessed after end configuration itself.
The mobile phone terminal configuration information described to intelligent terminal transmission, typically can as the present invention will disclosed in implementationDescribed in example, at least implemented using two ways, first way is the point-to-point direct-connected skill based on WiFi Direct standard implementationIntelligent terminal is placed in the service node mode (ap mode) by the standard criterion by art, waits mobile phone terminal with work station (STA)Its backward transmission of mode entry intelligent terminal configuration information, until intelligent terminal obtains the configuration information, and it willThe workstation mode for itself switching back to the standard configures itself and accesses target network, thus completes from confidenceBreath is transferred to the overall process of access.This process is all based on the network for working in data link layer that 802.11 agreements are standardizedFrame realizes transmission;The second way is described will to match confidence based on acoustic signals carrier transmission technique provided by the inventionBreath is integrated in an audio file with music information, plays the audio file, generates acoustic signals, is received simultaneously by intelligent terminalAfter parsing, configures itself and complete the access of target network.No matter which kind of mode is taken, if the configuration information is without addingIt is close, it is just easy to be intercepted and captured and cracked by Malware in transmission process, is all exposed to hacker so as to cause entire target network.Therefore, between intelligent terminal and mobile phone terminal provided by the invention, the characteristics of sufficiently excavating and utilize asymmetric encryption techniques,Both guarantee the communication security of mobile phone terminal and intelligent terminal, and it is expected the more unexpected technical effects of harvest.
Asymmetric encryption techniques, also known as public key cryptography refer to (being disclosed close by corresponding a pair of of unique keysKey and private cipher key) composition encryption method, public-key cryptography is public key, and private cipher key is private key, between public key and private keyIt is associated with by algorithm uniqueness, realizes association mathematically, the ciphertext via private key encryption can be decrypted using public key, otherwiseSo.Currently known rivest, shamir, adelman is more, such as RSA, ElGamal, knapsack algorithm, Rabin, Diffie-Hellman(D-H) public key encryption algorithm in Key Exchange Protocol, (ECC, elliptic curve add Elliptic Curve CryptographyClose algorithm) etc..Those skilled in the art should be enough to understand the flexible fortune of this widely applied technology and its various algorithmsWith.Public key encryption solves the publication and problem of management of key, is the core of current commercial code.In public encryption system,It does not disclose in plain text, discloses ciphertext.
Based on asymmetric encryption techniques, when intelligent terminal of the invention dispatches from the factory, it is written on its chip and is added by asymmetricThe private key that secret skill art generates, also, simultaneously, in a manner of being appended hereto hardware, or in a manner of Web Publishing etc., the open and privateThe associated public key of key.Theoretically, an intelligent terminal holds a pair of of private key and public key, not only may insure using the public keySecure communication is realized with intelligent terminal, and can be used for examining the legitimate origin or channel of intelligent terminal.In view of workOn it is practical and convenient, the public key of intelligent terminal is printed on the packing box of intelligent terminal or a visualization table of its shellIt is characterized up in region, and with the format of two dimensional code, in this way, mobile phone terminal of the invention utilizes a two-dimensional code scanning mouldBlock is scanned the two dimensional code of the public key for characterizing intelligent terminal, can obtain the public key.Mobile phone terminal utilizes the public keyEncryption configuration information forms ciphertext and is transferred to intelligent terminal, and intelligent terminal has private key by oneself with it and decrypts the ciphertext received, thenConfiguration information therein is extracted, whole process is safe and reliable.
In the scene of some variations, by the service node mode for the intelligent terminal realized based on WiFi Direct technologyUnder log-on message and the public key expressed in the two dimensional code together, mobile phone terminal scans the two dimensional code, obtains publicWhile key, corresponding log-on message can be also obtained.After configuring itself using the log-on message, that is, it can access intelligence eventuallyEnd, to establish point-to-point direct-connected carry out data transmission.It therefore in this case, can be by mobile phone after one key scanning of userTerminal and intelligent terminal silence cooperate, and realize the intelligent terminal access target network.
In certain scenes, if intelligent terminal is a camera, user wishes that subsequent mobile phone terminal can receive intelligent terminalThe video data of offer, and it is desirable that carry out safer encryption to this video data, can be by mobile phone terminal using non-Symmetric cryptosystem generates a pair of new key, and mobile phone terminal retains own private key, its public key is transferred to intelligent terminal, intelligenceIts data to be transmitted can be transferred to mobile phone terminal using the public key encryption by terminal, and mobile phone terminal has private key solution by oneself with itClose acquisition video data gives that expression display can be perceived.Certainly, this Technology application can increase the operation load of mobile phone terminal, butIt is effective.Although asymmetric techniques safety with higher, intelligent terminal once factory, private key withPublic key has been fixed, immutable, and once for a long time, be still cracked possibility, therefore, in the field that high security requires, is passed throughThe new key that mobile phone terminal generates ensures the secure communication between mobile phone terminal and intelligent terminal, has positive effect.
It will be detailed below several skills of the invention proposed to realize above-mentioned scene with above-mentioned principleThe specific embodiment of art scheme.
It should be noted that a kind of target network provided by the invention accesses guidance method, be as active initiator, orWhat person was described as the visual angle of central controlling party, which can be embodied as by computer program by programming and existedSimilar mobile phone terminal, tablet computer or have in intelligentized control equipment is run, for example, run Android, IOS,The mobile phone of Windows Phone system or the APP (application program) that guidance method realization is utilized with installation in tablet computer, byThe application program executes the guidance method.
Referring to Fig. 1, this method is specifically wrapped in an exemplary embodiments of target network access guidance method of the inventionInclude following steps:
Step S11, two-dimensional code scanning user interface is called to obtain the public key of intelligent terminal.
As in the preceding description in relation to scene, intelligent terminal provides corresponding in such a way that two dimensional code carries out VisualizationPublic key, mobile phone terminal activate two-dimensional code scanning functional module, wait user's by the user interface of its two-dimensional code scanning of callingScan operation.After two dimensional code of the mobile phone terminal to nearly intelligent terminal is expressed region by user, the public key of intelligent terminal can be obtained.
If it is made itself to be under service node (AP) mode by intelligent terminal based on what WiFi Direct technology was realizedService set (SSID), the password even log-on messages such as cipher mode and the public key characterize together in its two dimensionAt code, this step can naturally also obtain the log-on message while obtaining the public key, in later use.
Step S12, ciphertext is formed using the configuration information of public key encryption access current goal network.
It is well known that not only having WiFi mould group, display, control chip on mobile phone, also there is microphone, loudspeakerEqual components, these components can be implemented to call by the APP installed on mobile phone terminal, correspondingly, guidance method of the inventionExecuting subject is the mobile phone for being loaded with the APP specially realized.
Due to the main object of the present invention be in order to handle network access technique, the target network being currently accessed, justRefer to network representated by WiFi AP that mobile phone is just accessing at present, and the configuration information, it is also to access the target networkRequired login authentication information.According to the agreement of WiFi agreement, those skilled in the art be could be aware that, these information generally includeThe service set (SSID) and login password of WiFi wireless routing (representing target network), also need in some cases includeThe cipher mode of login password, and login password can also be needed not be provided for open network.Although there are versions for WiFi agreement moreFor the fact, but these be related to realize access network and indispensability configuration information can by those skilled in the art according to agreement textPart is corresponding to be determined, therefore, is repeated here to its details and its change programme.
When mobile phone terminal itself accesses target network, by the Beacon frame of scanning WiFi AP, or pass through transmissionProbe Request frame provides modes such as the response frame Probe Response that obtains WiFi AP, or with user in APPInterface on active setting match, to determine a service set, i.e. SSID determines that one to be accessed with thisWiFi AP network is also that a target network to be accessed has been determined.Then, mobile phone terminal will usually be obtained to user withThe corresponding login password of the SSID (except open network), corresponding cipher mode such as WPA, WPA2, WEP and its detailsDeng, can both have been selected by user and also by mobile phone terminal by its WiFi mode realize automatic identification.After obtaining these basic informations,By a series of conventional association (Association) operation, mobile phone terminal can be accessed to the target network, as a result, handConfiguration information needed for machine terminal also just obtains access target network.These configuration informations were both potentially stored in the machine,It can be only stored in running memory, depending on default option of the user when network insertion option is arranged.In general, can lead toThe configuration file about network insertion of lookup the machine is crossed to recognize its archive to the configuration information of network.It is real in certain applicationsIn example, also can provide a series of interfaces obtain user to service set scan select and its corresponding password, fromAnd determine corresponding configuration information.
Once obtaining the configuration information, it can be encrypted using well known asymmetric encryption techniques, be encryptedContent afterwards forms ciphertext, which needs to decrypt using the own private key of intelligent terminal, correctly to obtain whereinConfiguration information.
If, can be by mobile phone end as previously described for the communication security reinforced between subsequent mobile phone terminal and intelligent terminalEnd generates a pair of of new key using asymmetric encryption techniques, and mobile phone terminal stores its own key, and its public key is appended hereto instituteThe configuration information stated encrypts form ciphertext together, awaiting transmission.
Step S13, pass through ciphertext described in radio signal propagation.
The ciphertext constitutes a kind of guide formula data, is propagated by wireless signal, receives this ciphertextIntelligent terminal can realize logic, the information for being included using the ciphertext, to realize access target network according to intrinsic programThe purpose of network.
The circulation way of ciphertext, the realization dependent on the communication link between mobile phone terminal and intelligent terminal.Before such asThe scene and its flexible situation of change, it will be understood that, can be at least using two kinds of thinkings of WiFi standard and acoustic signals as axisDevelop out following several implementations:
It is described close to transmit that one, the public key for obtaining intelligent terminal simultaneously and log-on message silence establish communication linkText.
The case where log-on message of itself is published on its two dimensional code suitable for intelligent terminal, the present invention are calling two dimensional codeWhen scanning user interface is scanned two dimensional code, i.e., the public key of intelligent terminal is obtained simultaneously and is logged in needed for intelligent terminalLog-on message.Mobile phone terminal disconnects the connection with target network, after configuring itself using the log-on message, that is, can access positive placeIntelligent terminal under service node mode, to establish point-to-point communication link.Then, can 802.11 agreements numberAccording to the format of the data frame of the link layer ciphertext described to intelligent terminal transmission.Intelligent terminal receive corresponding wireless signal itAfterwards, utilization is decrypted to it.After waiting intelligent terminal completion configuration information reception, voluntarily it is switched to workstation mode and attempts accessWhen target network, the communication link of mobile phone terminal and intelligent terminal is disconnected, and just can be self-healing mobile phone terminal and target networkConnection.The realization of this process does not depart from a kind of convenience fortune of the technical foundation such as WiFi Direct or AD-Hoc actuallyWith, a key operation may be implemented, those skilled in the art should know.
Secondly, according to predetermined protocol scanning discovery and establish with the communication link of intelligent terminal to transmit ciphertext.
By the point-to-point communication technology of WiFi Direct or Ad-Hoc etc, according to the protocol rule of default, by holdingHand and connective methods are built between the mobile phone terminal for being loaded with APP of the present invention and one or more external smart machineVertical communication link, or only detect the ciphertext hiding in (such as Probe Request) in one or more detection, withThe form of WiFi signal radiates in space and realizes broadcast.Refering to aforementioned, in some typical examples, it is based on WiFi Direct skillArt, intelligent terminal default are in AP operating mode, and waiting mobile phone terminal is shaken hands and is associated with STA mode, connect to realizeEnter, the ciphertext that mobile phone terminal can be described to intelligent terminal transmission by data frame in the case where access.But if intelligenceThere is improved rendezvous protocol rule between terminal and mobile phone terminal, then only need a side to load on ciphertext one or moreIn a detection frame or in other management frames or control frame, another party also can get ciphertext (such case that these frames are includedUnder, the connection status that can really transmit data frame is not implemented in mobile phone terminal and intelligent terminal).Intelligent terminal is either with evenThe mode of state is connect, or after receiving configuration information in a manner of notconnect state, then switch back into STA mode, described in accessTarget network.
It can be seen that can use a variety of based on the existing various technological visions of WiFi and its neighboring technology specificationImproved means realize the foundation of the communication link between mobile phone terminal and intelligent terminal, and the ciphertext is passed throughIncluding control frame, management frame, data frame it is various using 802.11 agreements as standard network frame formed wireless signal intoRow transmission.
Thirdly, non-under the WiFi connection status, the ciphertext that utilizes acoustic signals broadcast described.
The present invention can get rid of the peripheries such as WiFi Direct and Ad-Hoc technical standard, by making the ciphertextAt the acoustic signals to spatial, to realize the effect to the intelligent terminal transmission configuration information.In order to realize thisEffect discloses the generating process of acoustic signals in detail below:
Firstly, will include the ciphertext of the configuration information (when necessary including that mobile phone is separately generated with asymmetric techniquesPublic key) with preset music score of Chinese operas information synthesize audio file.
It is described close comprising configuration information in the present embodiment different from the technology carried out data transmission using WiFi signalText is to realize that the wireless transmission of data is carried out into acoustic signals by carrier wave, belongs to data to be transmitted.Due to mobile phoneIt is provided with loudspeaker assembly and its coding, decoding chip etc. in terminal, therefore, passes through the function of those existing components of calling mobile phoneEnergy interface, can be realized communication function.In order to which this wireless transmission method is better achieved, need to do data to be transmitted as followsThe processing of process.It is related to the specific steps of the process incorporated by reference to Fig. 2, and refering to following:
Step S131, a preset frequency configuration file is called, the ciphertext is transformed into the frequency configuration fileBecome audio-frequency information on listed corresponding frequency of sound wave, by this coded audio information to the more of such as Dolby Digital etcIn one or more sound channels of sound channel system.The audio-frequency information just establishes digitized association with corresponding sound channel as a result,.It needsIt should be noted that the frequency configuration file is the carrier for being stored multiple frequency point datas, certainly, if Frequency point compared withTo be simple, also frequency point may not necessarily be stored in the form of a file.
As a more specific embodiment for realizing above-mentioned cataloged procedure, array is generated with the ciphertext, it willData head data are added in ciphertext array.The check code and error correcting code of calculated version number and ciphertext length, version number are digital, closeLiterary length, the check code of version number and ciphertext length and error correcting code form edition data, and edition data is added to ciphertext arrayIn.Then, ciphertext to be transmitted is subjected to segment processing, the identical multistage subdata of formation length, and is the life of every cross-talk dataAt error-detecging code and error correcting code, every cross-talk data, the error-detecging code of every cross-talk data and error correcting code are formed into segment data, by segmentsAccording to being added in ciphertext array.Cross processing is carried out to multiple segment datas.Come in fact specifically, being referred to following stepsIt is existing:
Step A, reading frequency configuration file.
Step B, addition represent 16 binary digits of data head to array.
Step C, calculated version number (16 system) and data length (16 system) error-detecging code and error correcting code.
Version number and data length and its error correcting code are added to array by step D.
Character string (8 system) to be sent by sound wave is segmented by step E.
Step F judges whether to final stage, if it is, entering step D, adds the error detection of final stage dataCode;If it is not, then entering step F, error-detecging code and error correcting code are all added to every one piece of data.
Every one piece of data and its error-detecging code and error correcting code are added in array by step G.
Step H, polishing array is vacant, by 0 polishing of remaining digit.This array is 2 dimension groups.A number can be usedGroup also can be used different arrays and place version number and data length and its error correcting code, every one piece of data etc..
Data in array are done interleaving processing by step I.
Data head is generated single-frequency acoustic signals by step J.
Version number and data length and its error correcting code are generated three frequency acoustic signals by step K.
Data after interleaving and its error-detecging code and error correcting code are generated eight frequency acoustic signals by step L.
Step M does gain compensation to acoustic signals.
Step N adds time window, generally smoothing windows to the acoustic signals of each syllable.
Several variants are disclosed further for those skilled in the art below in conjunction with each detailed step of above-mentioned cataloged procedureMember's reference:
In one embodiment, version number is 16 system number D0, transmission data length is 2 16 system numbers D1, D2;VersionNumber and transmission data length check code be D3.If D1 is not equal to 0, D3=(D1*D2+D0) %16 not equal to 0 and D2;Otherwise, D3=(D1+D2+D0) %16.
RS is carried out to the numeric string of the check code composition of version number, transmission data length, version number and transmission data lengthEncoding operation generates the RS code including error correcting code.
For example, build version number and data length error-detecging code: in array, data [0] is 16 system version numbers, data[1], data [2] is 16 binary data length, and data [3] is error-detecging code.If data [1]!=0&&data [2]!=0, thenData [3]=(data [1] * data [2]+data [0]) %16;Otherwise data [3]=(data [1]+data [2]+data[0]) %16.
In one embodiment, each number in every cross-talk data multiplied by preset weighting coefficient and is summed, is then removedWith 8 generate quotient with remainder, then by quotient with remainder sum divided by 8 modulus, generate the error-detecging code of every cross-talk data;To every cross-talk numberCarry out RS encoding operation according to the numeric string of the error-detecging code composition of, every cross-talk data, generate include error correcting code RS code.
Cross processing is carried out to multiple segment datas are as follows: obtain multiple segment datas from transmission array of data;It will be eachSegment data is filled into matrix by row, and extracts multi-group data by Leie time from this matrix, forms change data.It will conversionData replacement segment data is added in transmission array of data.
In one embodiment, segment data error detection code generation method are as follows: first multiplied by weighting coefficient and ask every segment dataWith, then will with divided by 8 generate quotient with remainder, then by quotient with remainder sum divided by 8 modulus.Final data error-detecging code generation sideMethod are as follows: all data are added, then will with divided by 8 modulus.The error correction code generation method of each segment data are as follows: inner-instituteSieve door code.The method of interleaving are as follows: data are first filled into matrix by row, are then extracted by column.
The data transmission method based on multifrequency sound wave in above-described embodiment, disperses continuous mistake by the way of interleaving,Error correction anti-interference ability is improved, and generates the RS code for having error correcting code, using two kinds of error detection modes and two kinds of error correcting system mixingIt uses, can be improved error correction anti-interference ability.
In one embodiment, single-frequency data head signal generates, according to 16 binary data head data in data head frequency meterThe middle method chosen data and generate simple signal are as follows: default single-frequency frequency meter selects in single-frequency frequency meter according to data head dataAccess is according to generation simple signal: simple signal are as follows:
sin(2.0*M_PI*twofTable[0][num1]*i*T);
TwofTable is single-frequency frequency meter, and as 2 dimension groups, num1 is data head data, for example, working as data head dataWhen num1=3, the data of the position of twofTable [0] [3], as required frequency are searched.T is the period, M_PI π, 0=<I < NFRAME, NFRAME are frame length, are the length of the audio frame in audio-frequency information.TwofTable is single-frequency frequency meter, frequencyIt is staggered with multifrequency frequency meter, num1 is data head data.
In one embodiment, three frequency frequency meters are set, 3 frequency signals are generated to edition data.By the version number of 16 systems3 are divided into multiple groups of data for one group accordingly, select corresponding frequency synthesis 3 to believe frequently in three frequency frequency meters according to sequencingNumber.
3 frequency signals are respectively as follows:
0.3*sin(2.0*M_PI*threefTable[0][num1]*i*T)、
0.3*sin(2.0*M_PI*threefTable[1][num2]*i*T)、
0.4*sin(2.0*M_PI*threefTable[2][num3]*i*T));
ThreefTable is three frequency frequency meters, and num1, num2, num3 is 3 numbers in the group data sent the same timeAccording to T is the period, and M_PI π, 0=< i < NFRAME, NFRAME are frame length, is the length of the audio frame in audio-frequency information.
In one embodiment, three frequency version numbers and data length signal are generated are as follows: 16 system version numbers and data lengthWith 3 for one group, the 3 frequency signal of frequency synthesis on corresponding position is selected in corresponding frequency meter according to sequencing
(0.3*sin(2.0*M_PI*threefTable[0][num1]*i*T)+
0.3*sin(2.0*M_PI*threefTable[1][num2]*i*T)+
0.4*sin(2.0*M_PI*threefTable[2][num3]*i*T));
Wherein threefTable is 3 frequency frequency meters, and num1, num2, num3 is 3 signals sent the same time.
Expand signal peak on year-on-year basis to signal to 1, improves and play gain.
In one embodiment, matrix frequency table is preset, obtains change data from transmission array of data, change data isOctal data.It is one group with 8 octal numbers and change data is divided into multiple transmission numeric strings sent in the same time, rootCorresponding 8 frequency signal of frequency synthesis is selected in default matrix frequency table according to the sequencing for sending digital in numeric string.ConversionThe 8 frequency signals that each octal number of data generates are as follows:
Sig [i] +=sigcoeff [k] * sin (2.0*M_PI*fTable [k] [num [k]] * i*T);
Wherein, fTable is matrix frequency table, and num [k] is k-th of the octal number sent the same time in numeric stringAccording to sigcoeff [k] is to the weighting coefficient for representing the signal of k-th of octal data in transmission numeric string, and T is period, M_PI is π, and 0=< i < NFRAME, NFRAME are frame length, is the length of the audio frame in audio-frequency information.
In one embodiment, change data can be octal system, hexadecimal etc., raw below by taking octal system as an exampleAt eight frequency data-signals.8 binary datas, for one group, select corresponding position in corresponding frequency meter according to sequencing with 8On 8 frequency signal of frequency synthesis:
Sig [i] +=sigcoeff [k] * sin (2.0*M_PI*fTable [k] [num [k]] * i*T);
FTable be 8 frequency frequency meters, num [k], for the same time send 8 data, sigcoeff be weighting coefficient withReduce the influence of high frequency attenuation.
Signal peak is expanded to 1 to 8 frequency signals on year-on-year basis, improves and plays gain.
The frequency of 8 frequency frequency meter fTable generates formula are as follows:
FTable [i] [j]=basefreq+ (i*FREQ_PER_GROUP+j) * (freqgap);0=< i
<FREQ_GROUP_NUM;0=< j < FREQ_PER_GROUP.
This formula is used to generate the frequency meter fTable for representing data, and FREQ_GROUP_NUM is group of frequencies number, FREQ_PER_GROUP is every group of frequency number for including, and basefreq is fundamental frequency, and freqgap is frequency interval.
For example, one piece of data to be sent is the matrix frequency table that 76543210, fTable is a 8*8,7 are located at firstFrequency fTable [0] [7] (note: subscript is since 0) and coefficient on the 8th position of a set of frequencies are then chosen in positionsigcoeff[0]。
6 are located at the second position, then choose the frequency fTable [1] [6] and coefficient on the 7th position of second group of frequencysigcoeff[1]。
5 are located at the third place, then choose frequency fTable [2] [5] and coefficient on the 6th position of third group frequencysigcoeff[1]。
The rest may be inferred, generates corresponding signal respectively and is added again, i.e.,
sigcoeff[0]*sin(2.0*M_PI*fTable[0][7]*i*T)+
sigcoeff[1]*sin(2.0*M_PI*fTable[1][6]*i*T)+
sigcoeff[2]*sin(2.0*M_PI*fTable[2][5]*i*T)+
sigcoeff[3]*sin(2.0*M_PI*fTable[3][4]*i*T)+
sigcoeff[4]*sin(2.0*M_PI*fTable[4][3]*i*T)+
sigcoeff[5]*sin(2.0*M_PI*fTable[5][2]*i*T)+
sigcoeff[6]*sin(2.0*M_PI*fTable[6][1]*i*T)+
sigcoeff[7]*sin(2.0*M_PI*fTable[7][0]*i*T)。
0=< i < NFRAME, NFRAME are frame length, this signal just contains 76543210 this 8 in same amount of timeData information.The bandwidth of 8 groups of frequencies in fTable does not overlap.
As it can be seen that through the above steps, the conventional coding means that can flexibly use in conjunction with those skilled in the art are same, justThe coding to the configuration information can be achieved, " modulation " arrives some specific frequency of sound wave in the form of digitized by configuration informationOn, it is configured to the audio-frequency information for broadcasting, is associated in specific one or multiple sound channels.
Step S132, preset music score of Chinese operas file is read, is based on the music score of Chinese operas file generated music information, and by the musicInformation coding is not filled by one or more sound channels of audio-frequency information into multichannel.
Similarly by taking Dolby Digital multi-channel system as an example, if the coded audio information into L channel,The music information can be encoded in right channel.It is well known that since Dolby Digital ambiophonic system is by 5Full frequency-domain sound channel and 1 subwoofer sound channel composition, also referred to as 5.1 sound channels, 5 sound channels be respectively it is left front, right before, it is preceding in set, it is leftIt surrounds and right surrounds, music signal and audio-frequency information can actually be filled into respectively to one or more sound of this 5 sound channelsIn road, a sound channel is respectively accounted for each other without limiting to.
Specifically, realizing that the process of coding is referred to following specific steps and realizes using music score of Chinese operas file:
Step a, circulation read music score of Chinese operas file.
Step b obtains the number for representing numbered musical notation.
Step c obtains the symbol for representing tone.
Step d obtains the symbol for representing beat.
Step e calculates the duration of each sound.
Step f, gives out music signal.
Step g, is filled into right channel.
The music score of Chinese operas file follows certain agreement or rule and realizes, can be realized using currently known music score of Chinese operas fileForm can also use some existing melodies, can both be provided by system default, can also be supplied to user and carry out customized setIts source or music score of Chinese operas coding are set, as long as method of the invention is corresponded to parsing according to the agreement or rule.Such as:
In one embodiment, music score of Chinese operas file can represent the letter of " tremble, thunder, miaow, send out, search, drawing, is uncommon " using number 1-7Spectrum, symbol+,-,=etc. respectively represent in high C tune C and reconcile the tones such as low C tune, symbol!,@, #, $, %, * respectively represent entirelyBat, 1/2 bat, 1/4 bat, 1/8 bat, 1/16 bat, 3/2 bat and 2 bats.
Per minute 60 are defined to clap, i.e., one to clap be 1 second, the frequency of high C tune be 1047,1175,1319,1397,1568,1760,1976};The frequency of middle C tune is { 523,587,659,698,784,880,988 };The frequency of low C tune be 262,294,330,349,392,440,494};Unit is Hz.
3 are one group in music score of Chinese operas file, represent a sound, such as 6=!Indicate " drawing " sound for the low C tune clapped entirely, i.e. frequencyFor 440Hz, the time is 1 second, and the signal calculation formula of this sound is 0.8*sin (2.0*M_PI*f*j*T) * w [j];0=< j <Wherein f selects 440Hz, ptichTime to select 1 second to pitchTime, and w [j] is window function.Every 3 are recycled as one group of readingMusic score of Chinese operas file generates corresponding syllable and is combined into music.
As can be seen that using above-mentioned process, corresponding music information can be generated using music score of Chinese operas file, those music letterBreath is encoded into one or more sound channels different from the audio-frequency information position of multi-channel system, establishes sound channelBeing associated between music information.
Step S133, the coded data comprising the audio-frequency information and the sound channel of music information is converted into specific formatAudio file.
After the coding of the coding and music information that complete above-mentioned audio-frequency information, corresponding coded number is just formdAccording on this basis, the coding of each sound channel being independently converted into the monophone of specific format with well known modeAudio file or the multitrack audio file for being integrally converted into specific format are completed audio-frequency information and music informationThe operation of Composite tone file.As for the format of audio file, more flexibly, such as audio file formats known in wav, mp3 etc.It can realize this conversion, by related crossover tool without enumerating.
This audio file realized, substantially by the close of the configuration information comprising access target networkText is loaded into music information in a manner of digitized, therefore, by playing these audio files, can be carried out by sound waveData broadcasting.
Then, after generating the audio file, that is, corresponding playout software is called to play the audio file, to form sound waveSignal is propagated in free space, to broadcast the ciphertext comprising configuration information.
The mobile terminal of mobile phone etc, generally be configured with corresponding audio playing software, due to audio file be according toWhat specific format was converted, it can normally be identified by audio playing software, therefore, by calling audio playing software,Play the audio file.As previously mentioned, audio file can be the audio-frequency information comprising configuration information and the soundTwo files that happy information is separately encoded, can also be integrated into same file, regardless of its way of realization, can lead to hereIt crosses music player software to carry out while playing, the music information described in broadcasting while playing audio-frequency information, from there through raisingThe music that sound device plays back weakens the broadcast effect of the audio-frequency information.Data are formed by playing audio-frequency informationMusic is played while sound wave, is allowed the sound of broadcasting not seem dull, is improved the audio experience for playing sound, played data sound waveWhile play music, song, the sound such as voice, improve the rhythmical image and timing for playing sound, improve and play listening for soundFeel impression, and influence is transmitted without on data.Audience is capable of the music of hearing devices sending, also just can clearly know to lead toLetter process realizes better man-machine interaction experience.
It is in order to which data sound wave caused by audio-frequency information is hidden in institute it should be pointed out that carrying out multichannel broadcastingWithin the scope of the playing duration for stating music caused by music score of Chinese operas file, musical sound is enabled to weaken data sound wave, as long as abiding bySuch substantially rule is kept, just need not emphasize the tight consistent of the broadcasting initial time of each sound channel.Also, in general, each soundThe broadcasting initial time in road, theoretically also uses restraint in coding stage, and therefore, those skilled in the art protect the present inventionThe understanding of shield range should not be bound to this one can flexible technical characteristic.
By playing the audio file, data broadcasting effect is realized, so that the configuration information comprising target networkCiphertext in the form of the appreciable acoustic signals of human ear (20Hz~20KHz) to airborne spread, in general interior space modelIt in enclosing, can be received by corresponding radio equipment, to realize that data are transmitted.In the acoustic signals formed according to this formIn, since the ciphertext comprising configuration information is converted according to specific frequency point, just described to be formed by ciphertextTransmission data are loaded into music sound wave signal in a manner of carrier wave, by related communication processing means, can be extracted whereinCiphertext be used.
The process of data is received the decode and extracted about to by playing the audio file, will be sent out at subsequentIt is further disclosed in bright target network cut-in method.
As can be seen that the embodiment of the disclosure above, it is sufficient to mobile phone terminal be made reliably to contain target network to spatialThe ciphertext of the configuration information of network, as long as various wireless signals enumerated above can be received and parsed to it, and solutionClose ciphertext therein finally obtains configuration information, theoretically, i.e., the target network described using configuration information access.
In addition, the general improvement project as above-described embodiment, describes please continue to refer to embodiment below, with deeperEnter to understand the present invention.
Referring to Fig. 3, in another embodiment of target network of the present invention access guidance method, it is further provided after followingContinuous step:
Step S14, the result information fed back based on the configuration information for being originated from the intelligent terminal is obtained.
The mobile phone terminal of Central Control Function is played, is suitable for that can to know whether intelligent terminal can be successfully accessed in time describedNetwork, and can know this message, then need with necessary identification.Therefore, mobile phone terminal, which will acquire, is originated from intelligence eventuallyThe result information at end, and subsequent processing is made based on this result information.
Intelligent terminal of the invention obtain include configuration information the wireless signal of ciphertext after, it will be parsed and will be utilizedOwn private key decrypts it, final to obtain the configuration information.In turn, intelligent terminal utilizes the configuration information, obtains relatedThe information such as service set, the password even cipher mode of target network, configure itself, the program of starting access target network,Attempt to establish with target network and be associated with (Association), until establishing connection.Finally, based on this connection attempt as a result,Whether successful result information is for example with several UDP message packet broadcasts (since udp protocol is opposite by characterization connection for intelligent terminalIt is unstable, therefore be suitable for once sending multiple data packets), it is sent to mobile phone terminal, in the form of ACK control frame for another example to completeInteractive process.It should be noted that the data that intelligent terminal of the invention issues it will encrypt.Therefore, alwaysMobile phone terminal in waiting state either by network frame, or passes through the forms such as UDP message packet or even sound carrierAfter obtaining the response from intelligent terminal, all it is regarded as result information and is subject to subsequent processing.
Result information described in step 15, the public key decryptions using the intelligent terminal.
After no matter mobile phone terminal obtains the result information from intelligent terminal in what manner, the intelligent terminal is just utilizedPublic key trial this result information is decrypted.The success or failure of decryption will affect mobile phone terminal to the legal next of intelligent terminalThe judgement in source.It similarly, can also be to being considered as intelligent end if intelligent terminal fails to receive the result information from intelligent terminal alwaysEnd fails to decrypt the information with the public key encryption, to make certain judgement.It should be noted that result letter designated hereinBreath, unrelated with the content that it is characterized, which has accessed target network either characterizing intelligent terminal, can also be with tableSign intelligent terminal, which fails, accesses target network.Mobile phone terminal only focuses on here using asymmetric techniques and realizes productIdentification.
If step 16 determines --- it fails to decrypt to fail in the result information or scheduled duration and obtainWhen taking the result information, warning information is generated.
As previously mentioned, the public key for the intelligent terminal that mobile phone terminal obtains, should be theoretically the private key phase with intelligent terminalMatch, otherwise, may infer that intelligent terminal is fake products, or although can not conclude that intelligent terminal is fake products, untilThe public key being provided by it less has been tampered with.No matter which kind of situation, all have reason to mention the legitimate origin of the product or its channelQuery out.Specifically, mobile phone terminal fails when decrypting the result information, it was demonstrated that the private key of intelligent terminal is provided with itPublic key be not same to mathematically associated password pair;Mobile phone terminal fails when obtaining the result information, also poleIt is possible that because intelligent terminal cannot be decrypted correctly mobile phone terminal and no result information is caused to ring using the data of the public key encryptionIt answers, therefore also turns out that the private key of intelligent terminal with its public key provided is not same to mathematically associated password pair.This feelingsUnder condition, mobile phone terminal can be by user interface display alarm message, or by loudspeaker sonorous alarm etc., generates alarm letterBreath.Further, if equipped with the technology alerted when cannot decrypt the ciphertext from mobile phone terminal when it in intelligent terminalMeans, then user can more clearly determine whether that this identity is tested with the respective warning information of intelligent terminal by mobile phone terminalCard process receives the influence of signal of communication stability, to be conducive to exclude necessary interference, Accurate Diagnosis leads to intelligent terminalThe problem of target network can not be accessed.
As it can be seen that the embodiment of above-mentioned extension, further the advantages of performance asymmetric encryption techniques, determines intelligence eventually for userThe legal identity at end and for user check connectivity problem provide convenient and fast technical foundation.
It should be pointed out that in some scenes above-mentioned, it is indicated that in some cases, mobile phone terminal is transmitted to intelligent terminalWhen configuration information, the public key for the password centering that it is voluntarily generated also is transmitted to intelligent terminal, is safer for the ease of ensuringData laser propagation effect.In these scenes, mobile phone terminal can be connect it for computational efficiency and communication security consideration is improvedThe data from the intelligent terminal received, only when can be with the private key successful decryption for the password centering that mobile phone terminal voluntarily generatesWhen, the progress of these data just can be perceived into expression processing, express that it with audio, video, picture and text, the sound and other effects, beUser is perceived.
It can be seen that target network of the invention accesses guidance method, realizes safer reliably propagate and access meshThe method for marking the configuration information of network, can more effectively guide external smart terminal and more safely access in target network.
In intelligent terminal side, due to needing the foundation between the mobile phone terminal for sending the ciphertext comprising configuration information correspondingProperty, therefore, it is possible to be realized by target network cut-in method of the invention.
Referring to Fig. 4, target network cut-in method of the invention includes the following steps:
Step S21, external wireless signals are read to be parsed, obtains wherein entrained ciphertext.
In the access guidance method that aforementioned related mobile phone terminal is realized, give a variety of for propagating the nothing of the ciphertextLine signal form, preferred two kinds of wireless signals, one is the work realized based on WiFi technology data link layer networkFrame, another kind is can acoustic signals characterized by auditory frequency range by human ear.And in former wireless signal, then it can be flexible(such as management frame, data frame) is propagated on ground with different types of network frame, depends on those skilled in the art how clever completelyR. concomitans WiFi Direct standard and Ad-Hoc standard living.And latter wireless signal, then it needs with corresponding decoding techniqueTo obtain the ciphertext that acoustic signals are included.Anyway, data are obtained from wireless signal, are that number is loaded in wireless signalAccording to inverse process, the embodiment stated before this invention provides full and accurately to be realized and loads data into skill in wireless signalOn the basis of art scheme, it will be appreciated by those skilled in the art that even if the description subsequently with respect to each embodiment can not be detailed, it can alsoVoluntarily the loading technique according to aforementioned announcement knows subsequent corresponding scheme, that is, using mobile phone terminal realization come certaintyThe realization of ground acquisition intelligent terminal.It is provided nevertheless, those skilled in the art still can refer to several times for several different situationsRelated acquisition ciphertext explanation it is of the invention to understand:
One is directed to the case where transmitting ciphertext based on 802.11 agreements (WiFi technology):
No matter which kind of mode intelligent terminal is accessed using in the aforementioned guidance method implemented in relation to mobile phone terminal, works as the twoWhen based on establishing point-to-point direct-connected relationship, data frame transfer data can be passed through;Even if the two fails to establish point-to-point direct-connected passSystem can also realize that data are transmitted, therefore, whether based on WiFi Direct by the frame format of control frame, management frame etcTechnology is still based on Ad-Hoc technology, in spite of point-to-point notional direct-connected relationship is established, can pass through various formsWith 802.11 protocol formats expression work the network frame of data link layer come realize mobile phone terminal to intelligent terminal transmitIt carries and contains the purpose of the ciphertext of target network configuration information.Correspondingly, intelligent terminal can be according to WiFiThe technical specifications such as Direct, Ad-Hoc, to its received wireless signal carry out the parsing of correspondence, therefrom obtain described closeText.Obviously, it to be farthest compatible with prior art standard, and realizes in an optimal manner, as an exemplary embodiments,Intelligent terminal is suitable for being switched to itself, or default is in service node (AP) mode of WiFi Direct standard,The ciphertext sent is corresponded to according to respective protocol with the mobile phone terminal outside receiving.Configuration in intelligent terminal later use ciphertextInformation configuration from behind, then by the workstation mode for itself switching back into WiFi Direct standard so as to complete access meshMark the movement of network.
Secondly, for based on acoustic signals transmission ciphertext the case where:
As previously mentioned, mobile phone terminal is by digitized processing, the ciphertext for containing configuration information is special with one or moreThe form for determining the carrier wave of frequency point is loaded into formation audio file in melody and plays out, and when its broadcasting, that is, is formed and contains carrier waveThe wireless acoustic signals of signal, the ciphertext are to load on the load of at least one specific frequency point of airborne acoustic signalsIn wave.Therefore, the premise for obtaining the ciphertext in acoustic signals is parsed to acoustic signals, and number is converted analog signals intoChange data to be handled.
In view of the correspondence of intelligent terminal and mobile phone terminal, corresponding microphone circuit should be arranged to receive in intelligent terminalVia the acoustic signals of spatial.Nature should have accordingly it is also to be understood that in hardware realization to the received sound of instituteWave signal carries out the respective chip that based on simulation or based on number mode is decoded.Theoretically, audio is receivedFor circuit, can not understand whether be music and multichannel, therefore, it is necessary to carry out technical identification.Carry out technology identificationMode is varied, and the following two ways that provides is for those skilled in the art's reference:
First way is the mode based on analog filtering processing:
Intelligent terminal passes through the acoustic signals that its radio reception circuit obtains, and source is varied, only above-mentioned by the present inventionThe acoustic signals from mobile phone terminal for being loaded with ciphertext, which are only, really needs processed object.And the sound propagated in the skyWave signal carries out in an analog manner, therefore, can be according to shown in fig. 5 as under type extraction contains configuration informationCiphertext:
Step a, according to given frequency, acoustic signals are filtered, obtain corresponding carrier signal.
The received acoustic signals of institute include multiple carrier waves, the carrier wave therein contained where the ciphertext of configuration information, rootEither one or more according to aforementioned, therefore, intelligent terminal (can correspond to aforementioned guiding according to scheduled frequencyFrequency listed by the frequency configuration file of method) acoustic signals are filtered, corresponding carrier signal is obtained, the carrier signalIt just include the relevant content of the ciphertext.
Step b, digitized sampling is carried out to the carrier signal, obtains corresponding digitalized data.
Because the acoustic signals are substantially analog signals, it is necessarily required in radio reception circuit to filteredCarrier signal carries out analog-to-digital conversion, to obtain the data comprising ciphertext of number.
Step c, the digitalized data is decoded, obtains the configuration information comprising access target networkCiphertext.
Decoding designated herein, because it is only necessary to the digitalized datas to filtered carrier signal to be decoded, becauseThis will become more simple, and those skilled in the art provide according to cataloged procedure above-mentioned in conjunction with latter technique identification methodReference, can realize and decode according to its inverse process, the final ciphertext for containing configuration information accordingly that obtains is for rear continued accessEnter target network.
The second way is the processing mode of pure digi-tal.
Since digit chip is widely used in most intelligent terminals, in this case, radio reception circuit has received from the airAfter the carrier signal, then advanced row digital-to-analogue conversion carries out subsequent processing to the data after conversion.Corresponding processing sideFormula has correspondence with cataloged procedure above-mentioned certainly, following to disclose corresponding step for those skilled in the art referring to understanding:
Following detailed step is taken in order to realize the purpose firstly the need of synchronous alignment decoding data head:
Step A1 saves continuous 3 frame audio.Data head is two 16 system numbers.
Step A2 calculates the frequency that intermediate frame includes.
Step A3 calculates the corresponding number of frequency.
Step A4 judges whether number is data head, if it is, entering step 405.
3 frame audio molecule frames are calculated the corresponding number of each subframe by step A5.
Step A6, if the corresponding number of at least continuous 4 subframes is equal to data head.
Step A7, decoding data head.
Step A8, copy remaining data are used for decoding data head, and remaining data have synchronized alignment.
In one embodiment, the audio frame for obtaining load change data detects each audio using goertzel algorithmMultiple frequencies that frame includes, and save loudness of a sound energy corresponding with multiple frequencies;It can be obtained using Goertzel rudimentary algorithmFrequency real and imaginary parts identical with conventional discrete Fou-rier transformation (DFT) or FFT.According to loudness of a sound energy from high to low suitableSequence calculates the data that each frequency includes in multiple frequencies and carries out RS decoding, and is converted back according to interleaving rule when encodingOriginal sequence;When judging that error-detecging code is correct, then it is judged as transmission data.
Secondly, needing decoded version number and data length.Specifically include following sub-step:
Step B1 obtains the audio frame for being loaded with version number and data length.
Step B2 detects the frequency that every frame includes using goertzel algorithm.
Step B3 calculates the corresponding data of each frequency.
Step B4 carries out rs decoding when data are 6 full.The algorithm that data number and the RS coding that this step obtains useCorrelation, such as RS (7,3) etc..
Step B5, error-detecging code create-rule when according to coding calculate error-detecging code.
Step B6, B7 judges whether version number matches and whether the error-detecging code received is correct, if it is, intoStep B8: data length successfully decoded starts decoding data.
Finally, decoding includes the data of ciphertext.It sees below:
Step C1 obtains the audio frame of transmission data.
Step C2 detects the frequency that every frame most probable includes using goertzel algorithm, while saving next may includeFrequency, and save the ratio of corresponding energy.
Step C3 calculates the data that most probable includes and the data that next may include according to frequency.
Step C4, interleaving rule when according to coding transform the data into back correct sequence.
Step C5, each section is all first done rs decoding with the data that most probable includes.
Step C6 judges whether every section of error-detecging code is correct, if yes then enter step C8, judges that last error-detecging code isIt is no correct.If it is not, then entering step C7, most probable on corresponding position is successively replaced according to the sequence of energy ratio from big to smallThe data for including are the data that next may include, and make RS decoding.
Step C9 successively judges whether every section of error-detecging code is correct after replacement, if yes then enter step C8, if otherwiseIt enters step C11: realigning and find data head.
By executing above-mentioned step, corresponding transmission data can be finally obtained, also can be obtained described containThe ciphertext of configuration information.
According to the above-mentioned announcement to two embodiments for obtaining the ciphertext comprising configuration information, could be aware that, intelligent terminalObtain that mobile phone sends contains the ciphertext of configuration information, therefore, can execute subsequent step.
The ciphertext is decrypted in the pre-stored private key of step 22, reading, obtains configuration information wherein included.
As previously mentioned, the password of intelligent terminal to be it is just generated when leaving the factory, in its production process, password centeringPrivate key be written into corresponding chip, therefore, intelligent terminal can read this pre-stored own private key, and useThe ciphertext obtained is decrypted in corresponding asymmetric encryption techniques algorithm, and decrypting resulting data is to be used to access meshMark the configuration information of network.It should be noted that between algorithm used in algorithm used in mobile phone terminal and intelligent terminalIt is inevitable consistent.Due to the data using private key decryption public key encryption, or otherwise utilize the data of public key decryptions private key encryptionTechnology is well known to those skilled in the art, therefore without repeating.
In variants of the invention, to determine improper communication convenient for user, when using the private key to the ciphertext progressAfter decryption failure, the components such as driving sound, light are issued the first warning information by intelligent terminal, and user thus can be true from intelligent terminalKnow that the held public key of mobile phone terminal is illegal.It on the other hand, can also be with this case where private key for attempting Brute Force intelligent terminalKind mode is identified.
In another variants, it is unsuccessfully derived from data transmission quality bad the case where causing in order to exclude private key decryption, intelligenceTerminal will utilize one result information of its private key encryption, and by the result information with control frame or data frame even acoustic signals itThe form of class feeds back to mobile phone terminal and does corresponding identification, if mobile phone terminal can utilize the public key decryptions result information, two-phaseIn conjunction with that can know that communication quality is bad, if mobile phone terminal is also warned, in conjunction with warning for intelligent terminal, then mobile phone end can determineHeld public key and the held private key of intelligent terminal is held to mismatch.
Corresponding to the variants that mobile phone terminal is realized, when also accompanying includes voluntarily to be generated by mobile phone terminal in the ciphertextPublic key when, the present invention will also read the public key, after subsequent intelligent terminal access target network, will utilize the outside public key encryptionData are transferred to the mobile phone terminal as public key provider, and using the public key decryptions mobile phone terminal transmit come data.Due to the variable-key that mobile phone terminal voluntarily generates, it has been cured different from the key of intelligent terminal, so, utilize new public keyCommunicating with private key will become safer.
Step 23 configures itself using the configuration information and accesses the target network.
After intelligent terminal obtains the configuration information of decryption in the manner previously described, corresponding SSID, password can be obtained veryTo its cipher mode, then ensuring itself to be under workstation mode, accessed using the WiFi of these information configurations itselfSetting starts linker, final to establish the connection for arriving the target network.
In the case of certain, in order to realize more preferably human-computer interaction, refering to described previously, whether intelligent terminal can will succeedThe consequential signal of the access target network, with WiFi signal (network frames of 802.11 agreements), Bluetooth signal, acoustic signalsForms such as (similarly with guidance methods of the invention) are back to the source for sending configuration information.A more easy implementationIt is that the alarm signal of light and/or sound is carried out by the LED light or the Alarm Unit of buzzer etc that are mounted on this intelligent terminalConfirmation forms the second warning information.Wherein, this notice is realized by Alarm Unit, primarily to human perception is looked after,And by sending consequential signal, then the communication of intelligent terminal and mobile phone terminal can be achieved, understood and carried out such as by mobile phone terminalThe preceding utilization, without repeating.It still needs to emphasize, the delivering path of consequential signal is varied, but has succeeded for characterizationIt accesses for the consequential signal of target network, is suitable for broadcasting the data packets of several UDP formats to notify mobile phone terminal, so as to handMachine terminal handles subsequent matters as previously described accordingly.And after logging in target network failure with the configuration information, such asPreceding described, intelligent terminal can be used as consequential signal by 802.11 agreements in data link layer or the broadcast table in the form of acoustic signalsSign logs in the network frame of the target network failure.
It needs to be illustrated, the public key of the intelligent terminal when leaving the factory, can be attached directly to the shell of intelligent terminalOn one Visualization region of body defined, it is especially on the Visualization region with text or recognizable figureTwo dimensional code expresses the public key, subject to machine recognition.Currently, the packaging dispatched from the factory together with intelligent terminal can also be printed onOn box or gummed paper, carrier of the gummed paper as two dimensional code, also be may be affixed on the shell of intelligent terminal when necessary.
In addition, corresponding to a variants of aforementioned announcement, with quick response code form come when expressing public key, due to the number of two dimensional codeIt is larger according to amount of storage, therefore, log-on message when intelligent terminal being under the service node mode of WiFi Direct standard,It can also be contained in together in content expressed by the two dimensional code, so that mobile phone terminal need to only scan the two dimensional code, can obtain simultaneouslyThe public key and log-on message for obtaining intelligent terminal make mobile phone terminal be successfully accessed intelligent end with the log-on message configurating mobile terminalEnd.
It could be aware that intelligent terminal only needs by the target network cut-in method for being implemented in intelligent terminal disclosed aboveReception includes that a series of processing can be completed in the wireless signal for the ciphertext of configuration information for accessing target network, it is not necessary to artificialIntervene, moreover, the communication technology based on safety and extraneous progress data interchange, whole process are apparently more safe and simple, highEffect.
Further, modularized thoughts are based on, the present invention will provide corresponding device based on various methods above-mentioned.
Referring to Fig. 6, a kind of mobile phone terminal of the present invention, including scanning element 11, encryption unit 12 and propagationUnit 13 is illustrated with regard to the function that each unit is realized below.
The scanning element 11, for calling two-dimensional code scanning user interface to obtain the public key of intelligent terminal.
As in the preceding description in relation to scene, intelligent terminal provides corresponding in such a way that two dimensional code carries out VisualizationPublic key, mobile phone terminal activate two-dimensional code scanning functional module, wait user's by the user interface of its two-dimensional code scanning of callingScan operation.After two dimensional code of the mobile phone terminal to nearly intelligent terminal is expressed region by user, the public key of intelligent terminal can be obtained.
If it is made itself to be under service node (AP) mode by intelligent terminal based on what WiFi Direct technology was realizedService set (SSID), the password even log-on messages such as cipher mode and the public key be together according to well known twoDimension code coding rule is encoded in two dimensional code, which naturally also can obtain institute by corresponding decoding programThe log-on message is obtained while the public key stated, in later use.As known to those skilled in the art how by the public affairsKey and the log-on message are encoded to the technological means in two dimensional code under the premise of abiding by two dimensional code coding rule, for this reasonIt does not repeat.
The encryption unit 12, it is close to be formed for the configuration information using public key encryption access current goal networkText.
It is well known that not only having WiFi mould group, display, control chip on mobile phone, also there is microphone, loudspeakerEqual components, these components can be implemented to call by the APP installed on mobile phone terminal, thus, mobile phone terminal of the invention passes throughAn APP is loaded to realize its functional module.
Due to the main object of the present invention be in order to handle network access technique, the target network being currently accessed, justRefer to network representated by WiFi AP that mobile phone is just accessing at present, and the configuration information, it is also to access the target networkRequired login authentication information.According to the agreement of WiFi agreement, those skilled in the art be could be aware that, these information generally includeThe service set (SSID) and login password of WiFi wireless routing (representing target network), also need in some cases includeThe cipher mode of login password, and login password can also be needed not be provided for open network.Although there are versions for WiFi agreement moreFor the fact, but these be related to realize access network and indispensability configuration information can by those skilled in the art according to agreement textPart is corresponding to be determined, therefore, is repeated here to its details and its change programme.
When mobile phone terminal itself accesses target network, by the Beacon frame of scanning WiFi AP, or pass through transmissionProbe Request frame provides modes such as the response frame Probe Response that obtains WiFi AP, or with user in APPInterface on active setting match, to determine a service set, i.e. SSID determines that one to be accessed with thisWiFi AP network is also that a target network to be accessed has been determined.Then, mobile phone terminal will usually be obtained to user withThe corresponding login password of the SSID (except open network), corresponding cipher mode such as WPA, WPA2, WEP and its detailsDeng, can both have been selected by user and also by mobile phone terminal by its WiFi mode realize automatic identification.After obtaining these basic informations,By a series of conventional association (Association) operation, mobile phone terminal can be accessed to the target network, as a result, handConfiguration information needed for machine terminal also just obtains access target network.These configuration informations were both potentially stored in the machine,It can be only stored in running memory, depending on default option of the user when network insertion option is arranged.In general, can lead toThe configuration file about network insertion of lookup the machine is crossed to recognize its archive to the configuration information of network.It is real in certain applicationsIn example, also can provide a series of interfaces obtain user to service set scan select and its corresponding password, fromAnd determine corresponding configuration information.
Once obtaining the configuration information, encryption unit 12 can be carried out it using well known asymmetric encryption techniquesEncryption, encrypted content form ciphertext, which needs to decrypt using the own private key of intelligent terminal, so as to correctObtain configuration information therein.
If, can be by mobile phone end as previously described for the communication security reinforced between subsequent mobile phone terminal and intelligent terminalThe encryption unit 12 at end generates a pair of of new key using asymmetric encryption techniques, and mobile phone terminal stores its own key, and by itsPublic key, which is appended hereto the configuration information and encrypts together, forms ciphertext, awaiting transmission.
The propagation unit 13, for passing through ciphertext described in radio signal propagation.
The ciphertext constitutes a kind of guide formula data, is propagated by wireless signal, receives this ciphertextIntelligent terminal can realize logic, the information for being included using the ciphertext, to realize access target network according to intrinsic programThe purpose of network.
The circulation way of ciphertext, the realization dependent on the communication link between mobile phone terminal and intelligent terminal.Before such asThe scene and its flexible situation of change, it will be understood that, can be at least using two kinds of thinkings of WiFi standard and acoustic signals as axisDevelop out following several implementations:
It is described close to transmit that one, the public key for obtaining intelligent terminal simultaneously and log-on message silence establish communication linkText.
The case where log-on message of itself is published on its two dimensional code suitable for intelligent terminal, the present invention are single in the scanningWhen member 11 calls two-dimensional code scanning user interface to be scanned two dimensional code, i.e., public key and the login of intelligent terminal are obtained simultaneouslyLog-on message needed for intelligent terminal.Mobile phone terminal disconnects the connection with target network, what further calling mobile phone terminal was equipped withUnit is logged in, after which configures itself using the log-on message, accesses the intelligence being under service node modeTerminal, to establish point-to-point communication link.Then, propagation unit 13 can 802.11 agreements data link layer numberAccording to the format of the frame ciphertext described to intelligent terminal transmission.After intelligent terminal receives corresponding wireless signal, benefit is decrypted to itWith.After waiting intelligent terminal completion configuration information reception, when being voluntarily switched to workstation mode trial access target network, handThe communication link of machine terminal and intelligent terminal disconnects, and just can be self-healing the connection of mobile phone terminal and target network.This processRealization, do not depart from actually the technical foundation such as WiFi Direct or AD-Hoc a kind of convenience use, may be implemented oneKey operation, those skilled in the art should know.
Secondly, logged in by one unit according to predetermined protocol scanning discovery and establish with the communication link of intelligent terminal withTransmit ciphertext.
The login list provided by the point-to-point communication technology of WiFi Direct or Ad-Hoc etc, calling mobile phone terminalProtocol rule of the member according to default, by shaking hands and connective methods, in the mobile phone terminal for being loaded with APP of the present invention and outerCommunication link is established between one or more smart machine of portion, or only detects the ciphertext hiding in one or moreIt detects in (such as Probe Request), is radiated in the form of WiFi signal in space and realize broadcast.It is some typical refering to aforementionedIn example, be based on WiFi Direct technology, intelligent terminal default be in AP operating mode, wait mobile phone terminal with STA mode intoRow is shaken hands and is associated with, to realize access, mobile phone terminal can be transmitted by data frame to intelligent terminal in the case where accessThe ciphertext.But if having improved rendezvous protocol rule between intelligent terminal and mobile phone terminal, only need a sideCiphertext is loaded in one or more of detection frames or in other management frames or control frame, another party also can get this(in this case, the company that can really transmit data frame is not implemented in mobile phone terminal and intelligent terminal to the ciphertext that a little frames are includedConnect state).Intelligent terminal is either in a manner of connection status, or after receiving configuration information in a manner of notconnect state,Then STA mode is switched back into, the target network is accessed.
It can be seen that can use a variety of based on the existing various technological visions of WiFi and its neighboring technology specificationImproved means realize the foundation of the communication link between mobile phone terminal and intelligent terminal, and the ciphertext is passed throughIncluding control frame, management frame, data frame it is various using 802.11 agreements as standard network frame formed wireless signal intoRow transmission.
Thirdly, non-under the WiFi connection status, the ciphertext that utilizes acoustic signals broadcast described.
The present invention can get rid of the peripheries such as WiFi Direct and Ad-Hoc technical standard, by making the ciphertextAt the acoustic signals to spatial, to realize the effect to the intelligent terminal transmission configuration information.In order to realize thisEffect discloses the generating process of acoustic signals in detail below:
Firstly, propagation unit 13 call its be equipped with generation module, will include the ciphertext of the configuration information (when necessaryThe public key that separately generates of asymmetric techniques is used including mobile phone) audio file is synthesized with preset music score of Chinese operas information.
It is described close comprising configuration information in the present embodiment different from the technology carried out data transmission using WiFi signalText is to realize that the wireless transmission of data is carried out into acoustic signals by carrier wave, belongs to data to be transmitted.Due to mobile phoneIt is provided with loudspeaker assembly and its coding, decoding chip etc. in terminal, therefore, passes through the function of those existing components of calling mobile phoneEnergy interface, can be realized communication function.In order to which this wireless transmission method is better achieved, need to do data to be transmitted as followsThe processing of process.It is related to the specific steps of the process incorporated by reference to Fig. 2, and refering to following:
Step S131, a preset frequency configuration file is called, the ciphertext is transformed into the frequency configuration fileBecome audio-frequency information on listed corresponding frequency of sound wave, by this coded audio information to the more of such as Dolby Digital etcIn one or more sound channels of sound channel system.The audio-frequency information just establishes digitized association with corresponding sound channel as a result,.It needsIt should be noted that the frequency configuration file is the carrier for being stored multiple frequency point datas, certainly, if Frequency point compared withTo be simple, also frequency point may not necessarily be stored in the form of a file.
As a more specific embodiment for realizing above-mentioned cataloged procedure, array is generated with the ciphertext, it willData head data are added in ciphertext array.The check code and error correcting code of calculated version number and ciphertext length, version number are digital, closeLiterary length, the check code of version number and ciphertext length and error correcting code form edition data, and edition data is added to ciphertext arrayIn.Then, ciphertext to be transmitted is subjected to segment processing, the identical multistage subdata of formation length, and is the life of every cross-talk dataAt error-detecging code and error correcting code, every cross-talk data, the error-detecging code of every cross-talk data and error correcting code are formed into segment data, by segmentsAccording to being added in ciphertext array.Cross processing is carried out to multiple segment datas.Come in fact specifically, being referred to following stepsIt is existing:
Step A, reading frequency configuration file.
Step B, addition represent 16 binary digits of data head to array.
Step C, calculated version number (16 system) and data length (16 system) error-detecging code and error correcting code.
Version number and data length and its error correcting code are added to array by step D.
Character string (8 system) to be sent by sound wave is segmented by step E.
Step F judges whether to final stage, if it is, entering step D, adds the error detection of final stage dataCode;If it is not, then entering step F, error-detecging code and error correcting code are all added to every one piece of data.
Every one piece of data and its error-detecging code and error correcting code are added in array by step G.
Step H, polishing array is vacant, by 0 polishing of remaining digit.This array is 2 dimension groups.A number can be usedGroup also can be used different arrays and place version number and data length and its error correcting code, every one piece of data etc..
Data in array are done interleaving processing by step I.
Data head is generated single-frequency acoustic signals by step J.
Version number and data length and its error correcting code are generated three frequency acoustic signals by step K.
Data after interleaving and its error-detecging code and error correcting code are generated eight frequency acoustic signals by step L.
Step M does gain compensation to acoustic signals.
Step N adds time window, generally smoothing windows to the acoustic signals of each syllable.
Several variants are disclosed further for those skilled in the art below in conjunction with each detailed step of above-mentioned cataloged procedureMember's reference:
In one embodiment, version number is 16 system number D0, transmission data length is 2 16 system numbers D1, D2;VersionNumber and transmission data length check code be D3.If D1 is not equal to 0, D3=(D1*D2+D0) %16 not equal to 0 and D2;Otherwise, D3=(D1+D2+D0) %16.
RS is carried out to the numeric string of the check code composition of version number, transmission data length, version number and transmission data lengthEncoding operation generates the RS code including error correcting code.
For example, build version number and data length error-detecging code: in array, data [0] is 16 system version numbers, data[1], data [2] is 16 binary data length, and data [3] is error-detecging code.If data [1]!=0&&data [2]!=0, thenData [3]=(data [1] * data [2]+data [0]) %16;Otherwise data [3]=(data [1]+data [2]+data[0]) %16.
In one embodiment, each number in every cross-talk data multiplied by preset weighting coefficient and is summed, is then removedWith 8 generate quotient with remainder, then by quotient with remainder sum divided by 8 modulus, generate the error-detecging code of every cross-talk data;To every cross-talk numberCarry out RS encoding operation according to the numeric string of the error-detecging code composition of, every cross-talk data, generate include error correcting code RS code.
Cross processing is carried out to multiple segment datas are as follows: obtain multiple segment datas from transmission array of data;It will be eachSegment data is filled into matrix by row, and extracts multi-group data by Leie time from this matrix, forms change data.It will conversionData replacement segment data is added in transmission array of data.
In one embodiment, segment data error detection code generation method are as follows: first multiplied by weighting coefficient and ask every segment dataWith, then will with divided by 8 generate quotient with remainder, then by quotient with remainder sum divided by 8 modulus.Final data error-detecging code generation sideMethod are as follows: all data are added, then will with divided by 8 modulus.The error correction code generation method of each segment data are as follows: inner-instituteSieve door code.The method of interleaving are as follows: data are first filled into matrix by row, are then extracted by column.
The data transmission method based on multifrequency sound wave in above-described embodiment, disperses continuous mistake by the way of interleaving,Error correction anti-interference ability is improved, and generates the RS code for having error correcting code, using two kinds of error detection modes and two kinds of error correcting system mixingIt uses, can be improved error correction anti-interference ability.
In one embodiment, single-frequency data head signal generates, according to 16 binary data head data in data head frequency meterThe middle method chosen data and generate simple signal are as follows: default single-frequency frequency meter selects in single-frequency frequency meter according to data head dataAccess is according to generation simple signal: simple signal are as follows:
sin(2.0*M_PI*twofTable[0][num1]*i*T);
TwofTable is single-frequency frequency meter, and as 2 dimension groups, num1 is data head data, for example, working as data head dataWhen num1=3, the data of the position of twofTable [0] [3], as required frequency are searched.T is the period, M_PI π, 0=<I < NFRAME, NFRAME are frame length, are the length of the audio frame in audio-frequency information.TwofTable is single-frequency frequency meter, frequencyIt is staggered with multifrequency frequency meter, num1 is data head data.
In one embodiment, three frequency frequency meters are set, 3 frequency signals are generated to edition data.By the version number of 16 systems3 are divided into multiple groups of data for one group accordingly, select corresponding frequency synthesis 3 to believe frequently in three frequency frequency meters according to sequencingNumber.
3 frequency signals are respectively as follows:
0.3*sin(2.0*M_PI*threefTable[0][num1]*i*T)、
0.3*sin(2.0*M_PI*threefTable[1][num2]*i*T)、
0.4*sin(2.0*M_PI*threefTable[2][num3]*i*T));
ThreefTable is three frequency frequency meters, and num1, num2, num3 is 3 numbers in the group data sent the same timeAccording to T is the period, and M_PI π, 0=< i < NFRAME, NFRAME are frame length, is the length of the audio frame in audio-frequency information.
In one embodiment, three frequency version numbers and data length signal are generated are as follows: 16 system version numbers and data lengthWith 3 for one group, the 3 frequency signal of frequency synthesis on corresponding position is selected in corresponding frequency meter according to sequencing
(0.3*sin(2.0*M_PI*threefTable[0][num1]*i*T)+
0.3*sin(2.0*M_PI*threefTable[1][num2]*i*T)+
0.4*sin(2.0*M_PI*threefTable[2][num3]*i*T));
Wherein threefTable is 3 frequency frequency meters, and num1, num2, num3 is 3 signals sent the same time.
Expand signal peak on year-on-year basis to signal to 1, improves and play gain.
In one embodiment, matrix frequency table is preset, obtains change data from transmission array of data, change data isOctal data.It is one group with 8 octal numbers and change data is divided into multiple transmission numeric strings sent in the same time, rootCorresponding 8 frequency signal of frequency synthesis is selected in default matrix frequency table according to the sequencing for sending digital in numeric string.ConversionThe 8 frequency signals that each octal number of data generates are as follows:
Sig [i] +=sigcoeff [k] * sin (2.0*M_PI*fTable [k] [num [k]] * i*T);
Wherein, fTable is matrix frequency table, and num [k] is k-th of the octal number sent the same time in numeric stringAccording to sigcoeff [k] is to the weighting coefficient for representing the signal of k-th of octal data in transmission numeric string, and T is period, M_PI is π, and 0=< i < NFRAME, NFRAME are frame length, is the length of the audio frame in audio-frequency information.
In one embodiment, change data can be octal system, hexadecimal etc., raw below by taking octal system as an exampleAt eight frequency data-signals.8 binary datas, for one group, select corresponding position in corresponding frequency meter according to sequencing with 8On 8 frequency signal of frequency synthesis:
Sig [i] +=sigcoeff [k] * sin (2.0*M_PI*fTable [k] [num [k]] * i*T);
FTable be 8 frequency frequency meters, num [k], for the same time send 8 data, sigcoeff be weighting coefficient withReduce the influence of high frequency attenuation.
Signal peak is expanded to 1 to 8 frequency signals on year-on-year basis, improves and plays gain.
The frequency of 8 frequency frequency meter fTable generates formula are as follows:
FTable [i] [j]=basefreq+ (i*FREQ_PER_GROUP+j) * (freqgap);0=< i
<FREQ_GROUP_NUM;0=< j < FREQ_PER_GROUP.
This formula is used to generate the frequency meter fTable for representing data, and FREQ_GROUP_NUM is group of frequencies number, FREQ_PER_GROUP is every group of frequency number for including, and basefreq is fundamental frequency, and freqgap is frequency interval.
For example, one piece of data to be sent is the matrix frequency table that 76543210, fTable is a 8*8,7 are located at firstFrequency fTable [0] [7] (note: subscript is since 0) and coefficient on the 8th position of a set of frequencies are then chosen in positionsigcoeff[0]。
6 are located at the second position, then choose the frequency fTable [1] [6] and coefficient on the 7th position of second group of frequencysigcoeff[1]。
5 are located at the third place, then choose frequency fTable [2] [5] and coefficient on the 6th position of third group frequencysigcoeff[1]。
The rest may be inferred, generates corresponding signal respectively and is added again, i.e.,
sigcoeff[0]*sin(2.0*M_PI*fTable[0][7]*i*T)+
sigcoeff[1]*sin(2.0*M_PI*fTable[1][6]*i*T)+
sigcoeff[2]*sin(2.0*M_PI*fTable[2][5]*i*T)+
sigcoeff[3]*sin(2.0*M_PI*fTable[3][4]*i*T)+
sigcoeff[4]*sin(2.0*M_PI*fTable[4][3]*i*T)+
sigcoeff[5]*sin(2.0*M_PI*fTable[5][2]*i*T)+
sigcoeff[6]*sin(2.0*M_PI*fTable[6][1]*i*T)+
sigcoeff[7]*sin(2.0*M_PI*fTable[7][0]*i*T)。
0=< i < NFRAME, NFRAME are frame length, this signal just contains 76543210 this 8 in same amount of timeData information.The bandwidth of 8 groups of frequencies in fTable does not overlap.
As it can be seen that through the above steps, the conventional coding means that can flexibly use in conjunction with those skilled in the art are same, justThe coding to the configuration information can be achieved, " modulation " arrives some specific frequency of sound wave in the form of digitized by configuration informationOn, it is configured to the audio-frequency information for broadcasting, is associated in specific one or multiple sound channels.
Step S132, preset music score of Chinese operas file is read, is based on the music score of Chinese operas file generated music information, and by the musicInformation coding is not filled by one or more sound channels of audio-frequency information into multichannel.
Similarly by taking Dolby Digital multi-channel system as an example, if the coded audio information into L channel,The music information can be encoded in right channel.It is well known that since Dolby Digital ambiophonic system is by 5Full frequency-domain sound channel and 1 subwoofer sound channel composition, also referred to as 5.1 sound channels, 5 sound channels be respectively it is left front, right before, it is preceding in set, it is leftIt surrounds and right surrounds, music signal and audio-frequency information can actually be filled into respectively to one or more sound of this 5 sound channelsIn road, a sound channel is respectively accounted for each other without limiting to.
Specifically, realizing that the process of coding is referred to following specific steps and realizes using music score of Chinese operas file:
Step a, circulation read music score of Chinese operas file.
Step b obtains the number for representing numbered musical notation.
Step c obtains the symbol for representing tone.
Step d obtains the symbol for representing beat.
Step e calculates the duration of each sound.
Step f, gives out music signal.
Step g, is filled into right channel.
The music score of Chinese operas file follows certain agreement or rule and realizes, can be realized using currently known music score of Chinese operas fileForm can also use some existing melodies, can both be provided by system default, can also be supplied to user and carry out customized setIts source or music score of Chinese operas coding are set, as long as the present invention is corresponded to parsing according to the agreement or rule.Such as:
In one embodiment, music score of Chinese operas file can represent the letter of " tremble, thunder, miaow, send out, search, drawing, is uncommon " using number 1-7Spectrum, symbol+,-,=etc. respectively represent in high C tune C and reconcile the tones such as low C tune, symbol!,@, #, $, %, * respectively represent entirelyBat, 1/2 bat, 1/4 bat, 1/8 bat, 1/16 bat, 3/2 bat and 2 bats.
Per minute 60 are defined to clap, i.e., one to clap be 1 second, the frequency of high C tune be 1047,1175,1319,1397,1568,1760,1976};The frequency of middle C tune is { 523,587,659,698,784,880,988 };The frequency of low C tune be 262,294,330,349,392,440,494};Unit is Hz.
3 are one group in music score of Chinese operas file, represent a sound, such as 6=!Indicate " drawing " sound for the low C tune clapped entirely, i.e. frequencyFor 440Hz, the time is 1 second, and the signal calculation formula of this sound is 0.8*sin (2.0*M_PI*f*j*T) * w [j];0=< j <Wherein f selects 440Hz, ptichTime to select 1 second to pitchTime, and w [j] is window function.Every 3 are recycled as one group of readingMusic score of Chinese operas file generates corresponding syllable and is combined into music.
As can be seen that using above-mentioned process, corresponding music information can be generated using music score of Chinese operas file, those music letterBreath is encoded into one or more sound channels different from the audio-frequency information position of multi-channel system, establishes sound channelBeing associated between music information.
Step S133, the coded data comprising the audio-frequency information and the sound channel of music information is converted into specific formatAudio file.
After the coding of the coding and music information that complete above-mentioned audio-frequency information, corresponding coded number is just formdAccording on this basis, the coding of each sound channel being independently converted into the monophone of specific format with well known modeAudio file or the multitrack audio file for being integrally converted into specific format are completed audio-frequency information and music informationThe operation of Composite tone file.As for the format of audio file, more flexibly, such as audio file formats known in wav, mp3 etc.It can realize this conversion, by related crossover tool without enumerating.
This audio file realized, substantially by the close of the configuration information comprising access target networkText is loaded into music information in a manner of digitized, therefore, by playing these audio files, can be carried out by sound waveData broadcasting.
Then, after generating the audio file, i.e., the playing module as provisioned in propagation unit 13 calls corresponding playSoftware plays the audio file, to form acoustic signals, is propagated in free space, described comprising with confidence to broadcastThe ciphertext of breath.
The mobile terminal of mobile phone etc, generally be configured with corresponding audio playing software, due to audio file be according toWhat specific format was converted, it can normally be identified by audio playing software, therefore, by calling audio playing software,Play the audio file.As previously mentioned, audio file can be the audio-frequency information comprising configuration information and the soundTwo files that happy information is separately encoded, can also be integrated into same file, regardless of its way of realization, can lead to hereIt crosses music player software to carry out while playing, the music information described in broadcasting while playing audio-frequency information, from there through raisingThe music that sound device plays back weakens the broadcast effect of the audio-frequency information.Data are formed by playing audio-frequency informationMusic is played while sound wave, is allowed the sound of broadcasting not seem dull, is improved the audio experience for playing sound, played data sound waveWhile play music, song, the sound such as voice, improve the rhythmical image and timing for playing sound, improve and play listening for soundFeel impression, and influence is transmitted without on data.Audience is capable of the music of hearing devices sending, also just can clearly know to lead toLetter process realizes better man-machine interaction experience.
It is in order to which data sound wave caused by audio-frequency information is hidden in institute it should be pointed out that carrying out multichannel broadcastingWithin the scope of the playing duration for stating music caused by music score of Chinese operas file, musical sound is enabled to weaken data sound wave, as long as abiding bySuch substantially rule is kept, just need not emphasize the tight consistent of the broadcasting initial time of each sound channel.Also, in general, each soundThe broadcasting initial time in road, theoretically also uses restraint in coding stage, and therefore, those skilled in the art protect the present inventionThe understanding of shield range should not be bound to this one can flexible technical characteristic.
By playing the audio file, data broadcasting effect is realized, so that the configuration information comprising target networkCiphertext in the form of the appreciable acoustic signals of human ear (20Hz~20KHz) to airborne spread, in general interior space modelIt in enclosing, can be received by corresponding radio equipment, to realize that data are transmitted.In the acoustic signals formed according to this formIn, since the ciphertext comprising configuration information is converted according to specific frequency point, just described to be formed by ciphertextTransmission data are loaded into music sound wave signal in a manner of carrier wave, by related communication processing means, can be extracted whereinCiphertext be used.
The process of data is received the decode and extracted about to by playing the audio file, will be sent out at subsequentIt is further disclosed in bright intelligent terminal.
As can be seen that the embodiment of the disclosure above, it is sufficient to mobile phone terminal be made reliably to contain target network to spatialThe ciphertext of the configuration information of network, as long as various wireless signals enumerated above can be received and parsed to it, and solutionClose ciphertext therein finally obtains configuration information, theoretically, i.e., the target network described using configuration information access.
In addition, the general improvement project as above-described embodiment, describes please continue to refer to embodiment below, with deeperEnter to understand the present invention.
Referring to Fig. 7, in another embodiment of mobile phone terminal of the present invention, it is further provided receiving unit 14, checklistMember 15 and decision unit 16, for providing more perfect function.
The receiving unit 14, for obtaining the knot fed back based on the configuration information for being originated from the intelligent terminalFruit information.
The mobile phone terminal of Central Control Function is played, is suitable for that can to know whether intelligent terminal can be successfully accessed in time describedNetwork, and can know this message, then need with necessary identification.Therefore, mobile phone terminal will be single using the receptionMember 14 obtains the result information for being originated from intelligent terminal, and makes subsequent processing based on this result information.
Intelligent terminal of the invention obtain include configuration information the wireless signal of ciphertext after, it will be parsed and will be utilizedOwn private key decrypts it, final to obtain the configuration information.In turn, intelligent terminal utilizes the configuration information, obtains relatedThe information such as service set, the password even cipher mode of target network, configure itself, the program of starting access target network,Attempt to establish with target network and be associated with (Association), until establishing connection.Finally, based on this connection attempt as a result,Whether successful result information is for example with several UDP message packet broadcasts (since udp protocol is opposite by characterization connection for intelligent terminalIt is unstable, therefore be suitable for once sending multiple data packets), it is sent to mobile phone terminal, in the form of ACK control frame for another example to completeInteractive process.It should be noted that the data that intelligent terminal of the invention issues it will encrypt.Therefore, alwaysMobile phone terminal in waiting state either by network frame, or passes through the forms such as UDP message packet or even sound carrierAfter obtaining the response from intelligent terminal, all it is regarded as result information and is subject to subsequent processing.
The verification unit 15, for result information described in the public key decryptions using the intelligent terminal.
After no matter mobile phone terminal obtains the result information from intelligent terminal in what manner, the intelligent terminal is just utilizedPublic key trial this result information is decrypted.The success or failure of decryption will affect mobile phone terminal to the legal next of intelligent terminalThe judgement in source.It similarly, can also be to being considered as intelligent end if intelligent terminal fails to receive the result information from intelligent terminal alwaysEnd fails to decrypt the information with the public key encryption, to make certain judgement.It should be noted that result letter designated hereinBreath, unrelated with the content that it is characterized, which has accessed target network either characterizing intelligent terminal, can also be with tableSign intelligent terminal, which fails, accesses target network.Mobile phone terminal only focuses on here using asymmetric techniques and realizes productIdentification.
The decision unit 16, if for determining --- it fails and decrypts the result information or pre- timingIt is failed when obtaining the result information in length, generates warning information.
As previously mentioned, the public key for the intelligent terminal that mobile phone terminal obtains, should be theoretically the private key phase with intelligent terminalMatch, otherwise, may infer that intelligent terminal is fake products, or although can not conclude that intelligent terminal is fake products, untilThe public key being provided by it less has been tampered with.No matter which kind of situation, all have reason to mention the legitimate origin of the product or its channelQuery out.Specifically, mobile phone terminal fails when decrypting the result information, it was demonstrated that the private key of intelligent terminal is provided with itPublic key be not same to mathematically associated password pair;Mobile phone terminal fails when obtaining the result information, also poleIt is possible that because intelligent terminal cannot be decrypted correctly mobile phone terminal and no result information is caused to ring using the data of the public key encryptionIt answers, therefore also turns out that the private key of intelligent terminal with its public key provided is not same to mathematically associated password pair.This feelingsUnder condition, mobile phone terminal can be by user interface display alarm message, or by loudspeaker sonorous alarm etc., generates alarm letterBreath.Further, if equipped with the technology alerted when cannot decrypt the ciphertext from mobile phone terminal when it in intelligent terminalMeans, then user can more clearly determine whether that this identity is tested with the respective warning information of intelligent terminal by mobile phone terminalCard process receives the influence of signal of communication stability, to be conducive to exclude necessary interference, Accurate Diagnosis leads to intelligent terminalThe problem of target network can not be accessed.
As it can be seen that the embodiment of above-mentioned extension, further the advantages of performance asymmetric encryption techniques, determines intelligence eventually for userThe legal identity at end and for user check connectivity problem provide convenient and fast technical foundation.
It should be pointed out that in some scenes above-mentioned, it is indicated that in some cases, mobile phone terminal is transmitted to intelligent terminalWhen configuration information, the public key for the password centering that it is voluntarily generated also is transmitted to intelligent terminal, is safer for the ease of ensuringData laser propagation effect.In these scenes, mobile phone terminal can be connect it for computational efficiency and communication security consideration is improvedThe data from the intelligent terminal received, only when can be with the private key successful decryption for the password centering that mobile phone terminal voluntarily generatesWhen, the progress of these data just can be perceived into expression processing, express that it with audio, video, picture and text, the sound and other effects, beUser is perceived.
It can be seen that mobile phone terminal of the invention, realizes the safer configuration for reliably propagating access target networkThe scheme of information can more effectively guide external smart terminal and more safely access in target network.
In intelligent terminal side, due to needing the foundation between the mobile phone terminal for sending the ciphertext comprising configuration information correspondingProperty, therefore, it is possible to carry out modular construction by target network cut-in method of the invention.
Referring to Fig. 8, intelligent terminal of the invention includes resolution unit 21, decryption unit 22 and access unit 23.WithThe lower function of disclosing each unit in detail and realized:
The resolution unit 21, is parsed for reading external wireless signals, obtains wherein entrained ciphertext.
In the access guidance scheme that aforementioned related mobile phone terminal is realized, give a variety of for propagating the nothing of the ciphertextLine signal form, preferred two kinds of wireless signals, one is the work realized based on WiFi technology data link layer networkFrame, another kind is can acoustic signals characterized by auditory frequency range by human ear.And in former wireless signal, then it can be flexible(such as management frame, data frame) is propagated on ground with different types of network frame, depends on those skilled in the art how clever completelyR. concomitans WiFi Direct standard and Ad-Hoc standard living.And latter wireless signal, then it needs with corresponding decoding techniqueTo obtain the ciphertext that acoustic signals are included.Anyway, data are obtained from wireless signal, are that number is loaded in wireless signalAccording to inverse process, the embodiment stated before this invention provides full and accurately to be realized and loads data into skill in wireless signalOn the basis of art scheme, it will be appreciated by those skilled in the art that even if the description subsequently with respect to each embodiment can not be detailed, it can alsoVoluntarily the loading technique according to aforementioned announcement knows subsequent corresponding scheme, that is, using mobile phone terminal realization come certaintyThe realization of ground acquisition intelligent terminal.It is provided nevertheless, those skilled in the art still can refer to several times for several different situationsRelated acquisition ciphertext explanation resolution unit 21 of the invention to understand:
One is directed to the case where transmitting ciphertext based on 802.11 agreements (WiFi technology):
No matter which kind of mode intelligent terminal is accessed using in the aforementioned guidance method implemented in relation to mobile phone terminal, works as the twoWhen based on establishing point-to-point direct-connected relationship, data frame transfer data can be passed through;Even if the two fails to establish point-to-point direct-connected passSystem can also realize that data are transmitted, therefore, whether based on WiFi Direct by the frame format of control frame, management frame etcTechnology is still based on Ad-Hoc technology, in spite of point-to-point notional direct-connected relationship is established, can pass through various formsWith 802.11 protocol formats expression work the network frame of data link layer come realize mobile phone terminal to intelligent terminal transmitIt carries and contains the purpose of the ciphertext of target network configuration information.Correspondingly, intelligent terminal can be according to WiFiThe technical specifications such as Direct, Ad-Hoc, to its received wireless signal carry out the parsing of correspondence, therefrom obtain described closeText.Obviously, it to be farthest compatible with prior art standard, and realizes in an optimal manner, as an exemplary embodiments,Intelligent terminal is suitable for being switched to itself, or default is in service node (AP) mode of WiFi Direct standard,The ciphertext sent is corresponded to according to respective protocol with the mobile phone terminal outside receiving.Configuration in intelligent terminal later use ciphertextInformation configuration from behind, then by the workstation mode for itself switching back into WiFi Direct standard so as to complete access meshMark the movement of network.
Secondly, for based on acoustic signals transmission ciphertext the case where:
As previously mentioned, mobile phone terminal is by digitized processing, the ciphertext for containing configuration information is special with one or moreThe form for determining the carrier wave of frequency point is loaded into formation audio file in melody and plays out, and when its broadcasting, that is, is formed and contains carrier waveThe wireless acoustic signals of signal, the ciphertext are to load on the load of at least one specific frequency point of airborne acoustic signalsIn wave.Therefore, the premise for obtaining the ciphertext in acoustic signals is parsed to acoustic signals, and number is converted analog signals intoChange data to be handled.
In view of the correspondence of intelligent terminal and mobile phone terminal, corresponding microphone circuit should be arranged to receive in intelligent terminalVia the acoustic signals of spatial.Nature should have accordingly it is also to be understood that in hardware realization to the received sound of instituteWave signal carries out the respective chip that based on simulation or based on number mode is decoded.Theoretically, audio is receivedFor circuit, can not understand whether be music and multichannel, therefore, it is necessary to carry out technical identification.Carry out technology identificationMode is varied, and the following two ways that provides is for those skilled in the art's reference:
First way is the mode based on analog filtering processing:
Intelligent terminal passes through the acoustic signals that its radio reception circuit obtains, and source is varied, only above-mentioned by the present inventionThe acoustic signals from mobile phone terminal for being loaded with ciphertext, which are only, really needs processed object.And the sound propagated in the skyWave signal carries out in an analog manner, therefore, can be according to shown in fig. 5 as under type extraction contains configuration informationCiphertext:
Step a, according to given frequency, acoustic signals are filtered, obtain corresponding carrier signal.
The received acoustic signals of institute include multiple carrier waves, the carrier wave therein contained where the ciphertext of configuration information, rootEither one or more according to aforementioned, therefore, intelligent terminal (can correspond to aforementioned guiding according to scheduled frequencyFrequency listed by the frequency configuration file of method) acoustic signals are filtered, corresponding carrier signal is obtained, the carrier signalIt just include the relevant content of the ciphertext.
Step b, digitized sampling is carried out to the carrier signal, obtains corresponding digitalized data.
Because the acoustic signals are substantially analog signals, it is necessarily required in radio reception circuit to filteredCarrier signal carries out analog-to-digital conversion, to obtain the data comprising ciphertext of number.
Step c, the digitalized data is decoded, obtains the configuration information comprising access target networkCiphertext.
Decoding designated herein, because it is only necessary to the digitalized datas to filtered carrier signal to be decoded, becauseThis will become more simple, and those skilled in the art provide according to cataloged procedure above-mentioned in conjunction with latter technique identification methodReference, can realize and decode according to its inverse process, the final ciphertext for containing configuration information accordingly that obtains is for rear continued accessEnter target network.
The second way is the processing mode of pure digi-tal.
Since digit chip is widely used in most intelligent terminals, in this case, radio reception circuit has received from the airAfter the carrier signal, then advanced row digital-to-analogue conversion carries out subsequent processing to the data after conversion.Corresponding processing sideFormula has correspondence with cataloged procedure above-mentioned certainly, following to disclose corresponding step for those skilled in the art referring to understanding:
Following detailed step is taken in order to realize the purpose firstly the need of synchronous alignment decoding data head:
Step A1 saves continuous 3 frame audio.Data head is two 16 system numbers.
Step A2 calculates the frequency that intermediate frame includes.
Step A3 calculates the corresponding number of frequency.
Step A4 judges whether number is data head, if it is, entering step 405.
3 frame audio molecule frames are calculated the corresponding number of each subframe by step A5.
Step A6, if the corresponding number of at least continuous 4 subframes is equal to data head.
Step A7, decoding data head.
Step A8, copy remaining data are used for decoding data head, and remaining data have synchronized alignment.
In one embodiment, the audio frame for obtaining load change data detects each audio using goertzel algorithmMultiple frequencies that frame includes, and save loudness of a sound energy corresponding with multiple frequencies;It can be obtained using Goertzel rudimentary algorithmFrequency real and imaginary parts identical with conventional discrete Fou-rier transformation (DFT) or FFT.According to loudness of a sound energy from high to low suitableSequence calculates the data that each frequency includes in multiple frequencies and carries out RS decoding, and is converted back according to interleaving rule when encodingOriginal sequence;When judging that error-detecging code is correct, then it is judged as transmission data.
Secondly, needing decoded version number and data length.Specifically include following sub-step:
Step B1 obtains the audio frame for being loaded with version number and data length.
Step B2 detects the frequency that every frame includes using goertzel algorithm.
Step B3 calculates the corresponding data of each frequency.
Step B4 carries out rs decoding when data are 6 full.The algorithm that data number and the RS coding that this step obtains useCorrelation, such as RS (7,3) etc..
Step B5, error-detecging code create-rule when according to coding calculate error-detecging code.
Step B6, B7 judges whether version number matches and whether the error-detecging code received is correct, if it is, intoStep B8: data length successfully decoded starts decoding data.
Finally, decoding includes the data of ciphertext.It sees below:
Step C1 obtains the audio frame of transmission data.
Step C2 detects the frequency that every frame most probable includes using goertzel algorithm, while saving next may includeFrequency, and save the ratio of corresponding energy.
Step C3 calculates the data that most probable includes and the data that next may include according to frequency.
Step C4, interleaving rule when according to coding transform the data into back correct sequence.
Step C5, each section is all first done rs decoding with the data that most probable includes.
Step C6 judges whether every section of error-detecging code is correct, if yes then enter step C8, judges that last error-detecging code isIt is no correct.If it is not, then entering step C7, most probable on corresponding position is successively replaced according to the sequence of energy ratio from big to smallThe data for including are the data that next may include, and make RS decoding.
Step C9 successively judges whether every section of error-detecging code is correct after replacement, if yes then enter step C8, if otherwiseIt enters step C11: realigning and find data head.
By executing above-mentioned step, corresponding transmission data can be finally obtained, also can be obtained described containThe ciphertext of configuration information.
According to the above-mentioned announcement to two embodiments for obtaining the ciphertext comprising configuration information, could be aware that, intelligent terminalObtain that mobile phone sends contains the ciphertext of configuration information, therefore, can use for other units.
The decryption unit 22 is decrypted the ciphertext for reading pre-stored private key, and acquisition wherein includesConfiguration information.
As previously mentioned, the password of intelligent terminal to be it is just generated when leaving the factory, in its production process, password centeringPrivate key be written into corresponding chip, therefore, intelligent terminal can read this pre-stored own private key, and useThe ciphertext obtained is decrypted in corresponding asymmetric encryption techniques algorithm, and decrypting resulting data is to be used to access meshMark the configuration information of network.It should be noted that between algorithm used in algorithm used in mobile phone terminal and intelligent terminalIt is inevitable consistent.Due to the data using private key decryption public key encryption, or otherwise utilize the data of public key decryptions private key encryptionTechnology is well known to those skilled in the art, therefore without repeating.
In variants of the invention, to determine improper communication convenient for user, when using the private key to the ciphertext progressAfter decryption failure, the components such as driving sound, light are issued the first warning information by intelligent terminal, and user thus can be true from intelligent terminalKnow that the held public key of mobile phone terminal is illegal.It on the other hand, can also be with this case where private key for attempting Brute Force intelligent terminalKind mode is identified.
In another variants, it is unsuccessfully derived from data transmission quality bad the case where causing in order to exclude private key decryption, intelligenceTerminal will utilize one result information of its private key encryption, and by the result information with control frame or data frame even acoustic signals itThe form of class feeds back to mobile phone terminal and does corresponding identification, if mobile phone terminal can utilize the public key decryptions result information, two-phaseIn conjunction with that can know that communication quality is bad, if mobile phone terminal is also warned, in conjunction with warning for intelligent terminal, then mobile phone end can determineHeld public key and the held private key of intelligent terminal is held to mismatch.
Corresponding to the variants that mobile phone terminal is realized, when also accompanying includes voluntarily to be generated by mobile phone terminal in the ciphertextPublic key when, the present invention will also read the public key, after subsequent intelligent terminal access target network, will pass through a transmission unit benefitThe outside public key encryption data are used to be transferred to the mobile phone terminal as public key provider, and whole using the public key decryptions mobile phoneThe data that end transmission comes.Due to the variable-key that mobile phone terminal voluntarily generates, it has been cured different from the key of intelligent terminal, instituteWith being communicated using new public key and private key will become safer.
The access unit 23, for configuring itself using the configuration information and accessing the target network.
After intelligent terminal obtains the configuration information of decryption in the manner previously described, corresponding SSID, password can be obtained veryTo its cipher mode, then ensuring itself to be under workstation mode, accessed using the WiFi of these information configurations itselfSetting starts linker, final to establish the connection for arriving the target network.
In conjunction with the situation of change of previously described embodiments, intelligent terminal should be equipped with a switch unit, outside receptionBefore wireless signal, the service node module itself being under WiFi Direct standard criterion is received external equipment by defaultItself is accessed to receive the ciphertext.And behind, then itself is switched in WiFi using configuration information configurationWorkstation mode under Direct standard criterion accesses the purpose of the target network so that the access unit 23 can be realized.
In the case of certain, in order to realize more preferably human-computer interaction, refering to described previously, whether intelligent terminal can will succeedThe consequential signal of the access target network, with WiFi signal (network frames of 802.11 agreements), Bluetooth signal, acoustic signalsForms such as (similarly with guidance methods of the invention) are back to the source for sending configuration information.A more easy implementationIt is that the alarm signal of light and/or sound is carried out by the LED light or the Alarm Unit of buzzer etc that are mounted on this intelligent terminalConfirmation forms the second warning information.Wherein, this notice is realized by Alarm Unit, primarily to human perception is looked after,And by sending consequential signal, then the communication of intelligent terminal and mobile phone terminal can be achieved, understood and carried out such as by mobile phone terminalThe preceding utilization, without repeating.It still needs to emphasize, the delivering path of consequential signal is varied, but has succeeded for characterizationIt accesses for the consequential signal of target network, is suitable for broadcasting the data packets of several UDP formats to notify mobile phone terminal, so as to handMachine terminal handles subsequent matters as previously described accordingly.And after logging in target network failure with the configuration information, such asPreceding described, intelligent terminal can be used as consequential signal by 802.11 agreements in data link layer or the broadcast table in the form of acoustic signalsSign logs in the network frame of the target network failure.
It needs to be illustrated, the public key of the intelligent terminal when leaving the factory, can be attached directly to the shell of intelligent terminalOn one Visualization region of body defined, it is especially on the Visualization region with text or recognizable figureTwo dimensional code expresses the public key, subject to machine recognition.Currently, the packaging dispatched from the factory together with intelligent terminal can also be printed onOn box or gummed paper, carrier of the gummed paper as two dimensional code, also be may be affixed on the shell of intelligent terminal when necessary.
In addition, corresponding to a variants of aforementioned announcement, with quick response code form come when expressing public key, due to the number of two dimensional codeIt is larger according to amount of storage, therefore, log-on message when intelligent terminal being under the service node mode of WiFi Direct standard,It can also be contained in together in content expressed by the two dimensional code, so that mobile phone terminal need to only scan the two dimensional code, can obtain simultaneouslyThe public key and log-on message for obtaining intelligent terminal make mobile phone terminal be successfully accessed intelligent end with the log-on message configurating mobile terminalEnd.
It could be aware that intelligent terminal of the present invention only needs by the various embodiments for being implemented in intelligent terminal disclosed aboveReception includes that a series of processing can be completed in the wireless signal for the ciphertext of configuration information for accessing target network, it is not necessary to artificialIntervene, moreover, the communication technology based on safety and extraneous progress data interchange, whole process are apparently more safe and simple, highEffect.
In conclusion present invention utilizes public key cryptographies to ensure that the intelligence guiding of mobile phone terminal and intelligent terminal connectsEnter the technology of target network, communication process is safer, and can play identify intelligent terminal whether the expectation through artificially distortingLess than technical effect.
The above is only some embodiments of the invention, it is noted that for the ordinary skill people of the artFor member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answeredIt is considered as protection scope of the present invention.