Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
A wireless network configuration method, apparatus, and system according to embodiments of the present invention are described below with reference to the accompanying drawings.
Fig. 1 is a flowchart illustrating a wireless network configuration method according to an embodiment of the present invention. The method provided by the embodiment can be executed by a target device, wherein the target device is an intelligent device including but not limited to an intelligent refrigerator, an intelligent air conditioner and the like. As shown in fig. 1, the wireless network configuration method includes the steps of:
s11, searching for and acquiring first configuration information of the first wireless network.
The first wireless network is a wireless network where a control center is located, and the control center can be an application program and is arranged on a mobile terminal of a user. It should be understood that the wireless network in which the control center is located is actually the wireless network to which the mobile terminal in which the control center is installed is accessed. The first configuration information at least comprises an SSID and a password required for accessing the first wireless network.
Because the coverage of the router is limited and the wall-through capability of the wireless signal is poor, in order to ensure that all the intelligent devices in a family can be accessed to a stable wireless network, a user usually installs a plurality of routers in the same family. For example, a router a is installed in a bedroom, a router B is installed in a study room, a router C is installed in a living room, and all intelligent devices in the home can access the wireless network through the router a, the router B or the router C.
It can be understood that, when the router accesses the wireless network, if the wireless password and/or SSID of the router is modified, the network of the smart device accessed through the router will be interrupted, that is, the smart device is in a network disconnection state.
In this embodiment, if the password and/or SSID of the router to which the intelligent device accesses is modified, the network connection of the intelligent device is interrupted, and at this time, the intelligent device enters a search configuration hotspot mode to search for and acquire the first configuration information of the first wireless network.
For example, suppose that a bedroom, a study room and a living room are respectively provided with a router, which are respectively marked as a router a, a router B and a router C, wherein all the intelligent devices in the bedroom are all accessed to a wireless network through the router a, all the intelligent devices in the study room are all accessed to the wireless network through the router B, the mobile terminal where the control center is located is accessed to the wireless network through the router C, and the wireless network is the first wireless network. If the user modifies the SSID and/or password of the router A and/or B, the intelligent device in the bedroom and/or the study will enter the disconnected state. Under the condition, the intelligent device in the disconnected state enters a hotspot searching and configuring mode to search and acquire first configuration information of the first wireless network sent by the mobile terminal, that is, the mobile terminal sends out an SSID and a password required by accessing the first wireless network in the form of hotspot signals for the intelligent device to acquire.
And S12, accessing the first wireless network according to the first configuration information.
In this embodiment, after the intelligent device in the disconnected state acquires the first configuration information of the first wireless network, the intelligent device may analyze the first configuration information to acquire an SSID and a password required for accessing the first wireless network, and then access the first wireless network according to the SSID and the password.
And S13, receiving second configuration information of the second wireless network sent by the control center from the first wireless network.
The second configuration information at least includes an SSID and a password required for accessing the second wireless network, and is used for configuring the second wireless network for the target device, so that the configured target device accesses the second wireless network. It should be understood that the target device refers to the smart device in the disconnected state.
In this embodiment, after the user modifies the SSID and/or password of the router in the home, the control center may be opened first, and the SSID and/or password modified by the relevant router is stored in the control center in a manual input manner so that the control center sends the SSID and/or password to the target device, and then the control center sends the second configuration information of the second wireless network through the first wireless network. After the target device successfully accesses the first wireless network, the second configuration information sent by the control center can be received from the first wireless network.
And S14, accessing the second wireless network through the second configuration information.
In this embodiment, after receiving the second configuration information of the second wireless network sent by the control center, the target device may analyze the second configuration information to obtain an SSID and a password for accessing the second wireless network, and access the second wireless network according to the obtained SSID and the obtained password.
In the wireless network configuration method of this embodiment, the first wireless network is accessed according to the first configuration information by acquiring the first configuration information of the first wireless network, the second configuration information of the second wireless network sent by the control center is received from the first wireless network, and the second wireless network is accessed through the second configuration information. Therefore, the automatic network distribution of the intelligent equipment can be realized, the user operation is simplified, and the user experience is improved.
Fig. 2 is a flowchart illustrating a wireless network configuration method according to another embodiment of the present invention.
As shown in fig. 2, the wireless network configuration method may include the steps of:
s21, searching for and acquiring first configuration information of the first wireless network.
And S22, accessing the first wireless network according to the first configuration information.
It should be noted that, in the description of the steps S21-S22 of the present invention, reference may be made to the above description of the steps S11-S12, and the implementation principle is similar, and therefore, the description is omitted here.
And S23, sending the identity information to the control center so that the control center can authenticate the identity information.
Optionally, as a possible implementation manner, the identity information of the smart device in the home and a Media Access Control (MAC) address of the corresponding router may be stored in the cloud in advance, and the Control center may obtain the identity information and the MAC address of the smart device from the cloud for verifying the identity information of the target device and sending the matched configuration information to the target device. The identity information of the smart device may be, but is not limited to, a unique identifier, an SSID.
In this embodiment, after the target device accesses the first wireless network, the target device may send its own identity information, such as a unique identification code, to the control center, so that the control center authenticates the identity information of the target device.
As a possible implementation manner, the control center may obtain the identity information and the MAC addresses of all the intelligent devices from the cloud, compare the received identity information of the target device with the obtained identity information, indicate that the identity information of the target device passes authentication if the identity information consistent with the received identity information of the target device exists in the obtained identity information, and send second configuration information matched with the MAC address corresponding to the identity information to the target device.
As another possible implementation manner, when the identity information is the unique identification code, the control center may upload the received identity information of the target device to the cloud, and if it is prompted that the unique identification code exists in the cloud, it is indicated that the identity information of the target device passes the authentication, the control center further queries the MAC address corresponding to the identity information stored in the cloud, and sends the second configuration information matched with the MAC address to the target device.
And S24, receiving second configuration information of the second wireless network sent by the control center from the first wireless network.
And S25, accessing the second wireless network through the second configuration information.
It should be noted that, in the description of the steps S24-S25 of the present invention, reference may be made to the above description of the steps S13-S14, and the implementation principle is similar, and therefore, the description is omitted here.
And S26, receiving the MAC of the router corresponding to the target device, which is acquired by the control center from the cloud.
In this embodiment, after the identity information of the target device is authenticated, the control center may obtain the MAC address of the router corresponding to the target device from the cloud, and send the obtained MAC address of the router to the target device. And the target equipment receives the MAC address sent by the control center.
And S27, obtaining the MAC of the router corresponding to the second wireless network.
It can be understood that, after the connectable device such as a smart phone, a notebook computer, etc. is accessed to the wired/wireless network, the MAC address of the accessed router can be displayed on a specific interface, such as a network configuration information display interface, so that, in this embodiment, after the target device is accessed to the second wireless network through the received second configuration information, the MAC address of the router corresponding to the second wireless network can be acquired.
S28, it is determined whether the received MAC of the router matches the MAC of the router corresponding to the second wireless network.
In this embodiment, after the target device receives the MAC address of the router sent by the control center and acquires the MAC address of the router corresponding to the accessed second wireless network, the target device may match the received MAC address of the router with the MAC address of the router corresponding to the accessed second wireless network, and determine whether the two addresses are consistent. If the received MAC address of the router is determined to be consistent with the MAC address of the router corresponding to the accessed second wireless network, step S29 is executed; if the two are not consistent, step S210 is executed.
And S29, maintaining the connection with the second wireless network.
In this embodiment, if the result of matching the received MAC address of the router with the MAC address of the router corresponding to the second wireless network is that the two are consistent, the target device maintains the connection with the second wireless network, and stores the SSID and the password information, and simultaneously, synchronously stores the SSID of the second wireless network and the MAC address of the router in the cloud.
And S210, disconnecting the connection with the second wireless network.
In this embodiment, if the result of matching the received MAC address of the router with the MAC address of the router corresponding to the second wireless network is that the two are inconsistent, the target device disconnects the current connection with the second wireless network.
In the wireless network configuration method of this embodiment, by acquiring the first configuration information of the first wireless network, accessing a first wireless network according to the first configuration information, sending identity information to a control center, and receiving second configuration information of a second wireless network sent by the control center from the first wireless network after the identity information is authenticated by the control center, accessing a second wireless network through second configuration information, receiving the MAC address of the router corresponding to the target device, which is acquired by the control center from the cloud, acquiring the MAC address of the router corresponding to the second wireless network, and when the received MAC address of the router is consistent with the MAC address of the router corresponding to the second wireless network, the connection with the second wireless network is kept, and when the MAC address of the router is inconsistent with the MAC address of the router corresponding to the second wireless network, the connection with the second wireless network is disconnected, so that the automatic distribution of the intelligent equipment can be realized, and the accuracy of the automatic distribution of the network is improved.
The foregoing embodiment is a description of the wireless network configuration method according to the embodiment of the present invention from the target device side, and in order to more clearly illustrate the wireless network configuration process, the embodiment of the present invention provides another wireless network configuration method, which may be executed by a control center, where the control center may be an application program disposed on a mobile terminal of a user. Fig. 3 is a flowchart illustrating a wireless network configuration method according to another embodiment of the present invention.
As shown in fig. 3, the wireless network configuration method may include the steps of:
s31, the first configuration information of the first wireless network is broadcast.
The first wireless network is a wireless network where the control center is located, and the first configuration information at least comprises an SSID and a password which are required for accessing the first wireless network.
After the user modifies the SSID and/or password of the router in the home, the control center can be opened first, the SSID and/or password modified by the relevant router is stored in the control center in a manual input mode, and the hotspot mode of the control center is started. The control center which opens the hotspot mode sends the first configuration information of the first wireless network in a broadcasting mode, namely, the control center sends out information such as SSID (service set identifier) and password of the accessed first wireless network in a broadcasting mode so as to enable the target equipment to access the first wireless network.
S32, receiving an access request carrying first configuration information and requesting to access a first wireless network sent by a target device.
In this embodiment, after receiving first configuration information broadcast by a control center, a target device sends an access request to the control center for requesting access to a first wireless network, and the control center determines whether to authorize the target device to access the first wireless network, where the access request carries the first configuration information. After receiving an access request which is sent by a target device and carries first configuration information and used for requesting to access a first wireless network, a control center matches an SSID and a password in the first configuration information carried in the access request with an SSID and a password which are configured by the control center when the control center accesses the first wireless network, and authorizes the target device to access the first wireless network when the SSID and the password are consistent.
And S33, sending second configuration information of the corresponding second wireless network to the target device through the first wireless network, so that the target device accesses the second wireless network according to the second configuration information.
The second configuration information at least comprises an SSID and a password required for accessing the second wireless network.
In this embodiment, the control center sends the second configuration information of the second wireless network corresponding to the target device through the first wireless network, and the target device successfully accessing the first wireless network can receive the second configuration information, and can access the second wireless network by further analyzing the received second configuration information to obtain an SSID and a password for accessing the second wireless network.
In the wireless network configuration method of this embodiment, first configuration information of a first wireless network is sent by broadcasting, an access request which is sent by a target device and carries the first configuration information and is used for requesting to access the first wireless network is received, and second configuration information of a corresponding second wireless network is sent to the target device so that the target device accesses the second wireless network according to the second configuration information. Therefore, the automatic network distribution of the intelligent equipment can be realized, the user operation is simplified, and the user experience is improved.
In order to ensure that the target device accesses the correct wireless network, the control center may verify the identity information of the target device to ensure that the target device and the control center belong to the same family, and thus, as shown in fig. 4, the wireless network configuration method may include the following steps:
s41, the first configuration information of the first wireless network is broadcast.
S42, receiving an access request carrying first configuration information and requesting to access a first wireless network sent by a target device.
It should be noted that, in the description of the steps S41-S42 of the present invention, reference may be made to the above description of the steps S31-S32, and the implementation principle is similar, and therefore, the description is omitted here.
And S43, acquiring the identity information of all the devices belonging to the same family as the control center and the MAC of the router corresponding to each device from the cloud.
In order to facilitate the unified management of the intelligent devices in the family, a user can register in the cloud in advance, and can manually input the identity information of each intelligent device in the family, the SSID of the accessed wireless network, the MAC address of the router corresponding to the accessed wireless network and other information after the registration is successful. The control center can obtain, from the cloud, identity information of all devices belonging to the same family and a MAC address of a router corresponding to each device, where the identity information may be, but is not limited to, a unique identification code. For example, a device list may be generated, in which the unique identification code, SSID, and MAC address of the corresponding router of the target device are stored, and accordingly, the target devices belonging to the device list are all the same family.
And S44, acquiring the identity information of the target device.
In order to authenticate the identity information of the target device, in this embodiment, the control center needs to acquire the identity information sent by the target device.
The target device may send one or more of its unique identifier, an SSID of an accessed wireless network, and a MAC address of a corresponding router as the identity information to the control center.
It should be noted that, in this embodiment, the execution sequence of step S43 and step S44 is not sequential, and both steps may be executed simultaneously or sequentially, and the present invention is explained by only executing step S44 after step S43, but not limited to this.
And S45, judging whether the target equipment and the control center are in the same family or not according to the identity information of the target equipment.
In this embodiment, after the control center acquires the identity information of the target device, the acquired identity information may be compared with the identity information and/or SSID of all devices belonging to the same family as the control center and/or MAC addresses of routers, which are acquired from the cloud, to determine whether the target device and the control center are in the same family.
As a possible implementation manner, assuming that the identity information of all devices belonging to the same family as the control center stored in the cloud is the unique identifier of the device, when the target device sends the unique identifier as the identity information to the control center, the control center compares the unique identifier of the target device with the unique identifiers of all devices of the same family acquired from the cloud, and if the unique identifier is consistent with the unique identifier of the target device, it indicates that the target device and the control center are the same family, further executing step S46; otherwise, step S41 is executed.
As another possible implementation manner, when the target device uses the SSID of the accessed wireless network and/or the MAC address of the corresponding router as the identity information, the control center compares the obtained SSID and/or MAC address of the target device with the SSIDs and/or MAC addresses of all devices of the same family obtained from the cloud, and if the SSID and/or MAC address is consistent with the received SSID and/or MAC address of the target device, it indicates that the target device and the control center are in the same family, further performing step S46; otherwise, step S41 is executed.
S46, determining that the target device changes from the networking state to the disconnected state.
In this embodiment, after determining that the target device belongs to the same home as the control center, the control center may further determine whether the target device is changed from the networking state to the disconnection state.
Optionally, since the target device is currently accessed to the first wireless network, and the first wireless network is a wireless network where the control center is located, after the control center determines that the target device and the target device belong to the same home, the control center may compare the SSID of the target device and/or the MAC address of the corresponding router stored in the cloud with the SSID of the first wireless network and/or the MAC address of the corresponding router accessed by the control center, and if the SSID of the target device and/or the MAC address of the corresponding router are not consistent, it indicates that the wireless network previously accessed by the target device is interrupted, that is, the control center may determine that the target device is changed from the networking state to the offline state.
And S47, sending second configuration information of the corresponding second wireless network to the target device through the first wireless network, so that the target device accesses the second wireless network according to the second configuration information.
The second configuration information at least comprises an SSID and a password required for accessing the second wireless network.
In this embodiment, after determining that the target device is in the same home as the target device and determining that the target device is in the disconnected state from the networking state, the control center may send, to the target device, second configuration information of a second wireless network corresponding to the target device through the first wireless network, so that the target device accesses the second wireless network according to the second configuration information after receiving the second configuration information.
Optionally, in a possible implementation manner of the embodiment of the present invention, the control center may further send the MAC address of the router corresponding to the target device, which is obtained from the cloud, to the target device, so that the target device determines whether the MAC address of the router corresponding to the second wireless network, which is currently accessed to, is consistent with the MAC address of the router corresponding to the target device, which is stored in the cloud, and keeps the connection with the second wireless network when the MAC address of the router corresponding to the target device is consistent with the MAC address of the router corresponding to the target device, and disconnects the connection with the second wireless network when the MAC address of the router corresponding to the target device is inconsistent with the MAC address of the router corresponding to ensure that the target.
The wireless network configuration method of this embodiment sends first configuration information of a first wireless network by broadcasting, receives an access request carrying the first configuration information and requesting to access the first wireless network sent by a target device, acquires identity information of all devices belonging to the same family as a control center and an MAC address of a router corresponding to each device from a cloud, acquires identity information of the target device, determines whether the target device and the control center are in the same family according to the identity information of the target device, and further sends second configuration information of a corresponding second wireless network to the target device through the first wireless network when the target device and the control center are in the same family and the target device is determined to be in a disconnected network state from a networking state, so that the target device accesses the second wireless network according to the second configuration information, and can implement automatic network distribution of the smart device, the accuracy of the automatic distribution network is improved.
It should be noted that, the foregoing explanation on the embodiment of the wireless network configuration method is applicable to the case where the router modified by the user is a router other than the router corresponding to the wireless network accessed by the control center, and all the intelligent devices do not access the wireless network that is the same as the control center, that is, the control center accesses the wireless network through a single router, and the router does not access other intelligent devices other than the control center.
For the situation that the router modified by the user is the router corresponding to the wireless network accessed by the control center, the user can manually perform network distribution on the control center, and then the automatic network distribution is realized through the wireless network configuration method described in the above embodiment.
For the situation that the intelligent equipment is accessed to the router which is the same as the control center and the user modifies the SSID and/or the password of the router accessed to the control center, the user can manually distribute the network to the control center, then the control center broadcasts and sends the hot spot signal, and the intelligent equipment accessed to the same router as the control center can access the wireless network of the corresponding router by searching and acquiring the hot spot signal. When the user also modifies the SSIDs and/or passwords of other routers, the automatic network distribution is further realized by the wireless network configuration method described in the above embodiment.
In order to implement the above embodiments, the present invention further provides a wireless network configuration apparatus.
Fig. 5 is a schematic structural diagram of a wireless network configuration apparatus according to an embodiment of the present invention, which is applied to a target device.
As shown in fig. 5, the wireless network configuration apparatus 50 includes: a search module 510, an access module 520, and a receive module 530. Wherein,
the searching module 510 is configured to search for and acquire first configuration information of a first wireless network.
The first wireless network is a wireless network where the control center is located.
The access module 520 is configured to access the first wireless network according to the first configuration information, and access the second wireless network according to the second configuration information.
A receiving module 530, configured to receive, from the first wireless network, second configuration information of the second wireless network sent by the control center.
The second configuration information is used for configuring the target device with a second wireless network, so that the configured target device is accessed to the second wireless network.
Optionally, in a possible implementation manner of the embodiment of the present invention, as shown in fig. 6, the wireless network configuration apparatus 50 may further include:
a sending module 540, configured to send the identity information to the control center before the receiving module 530 receives, from the first wireless network, the second configuration information of the second wireless network sent by the control center, so that the control center authenticates the identity information.
The control module 550 is configured to receive the MAC of the router, which is acquired from the cloud by the control center and corresponds to the target device, after the access module 520 accesses the second wireless network according to the second configuration information; acquiring the MAC of a router corresponding to a second wireless network; judging whether the received MAC of the router is consistent with the MAC of the router corresponding to the second wireless network; if the received MAC of the router is consistent with the MAC of the router corresponding to the second wireless network, the connection with the second wireless network is maintained; and if the received MAC of the router is inconsistent with the MAC of the router corresponding to the second wireless network, disconnecting the router from the second wireless network.
It should be noted that the foregoing explanation of the embodiment of the wireless network configuration method is also applicable to the wireless network configuration device of this embodiment, and the implementation principle is similar, and is not described herein again.
The wireless network configuration apparatus of this embodiment accesses the first wireless network according to the first configuration information by acquiring the first configuration information of the first wireless network, receives, from the first wireless network, second configuration information of the second wireless network sent by the control center, and accesses the second wireless network through the second configuration information. Therefore, the automatic network distribution of the intelligent equipment can be realized, the user operation is simplified, and the user experience is improved.
Fig. 7 is a schematic structural diagram of a wireless network configuration device according to another embodiment of the present invention, which is applied to a control center.
As shown in fig. 7, the wireless network configuration device 70 includes: a broadcasting module 710, a receiving module 720, and a transmitting module 730. Wherein,
the broadcasting module 710 is configured to broadcast and send first configuration information of a first wireless network.
The first wireless network is a wireless network where the control center is located.
A receiving module 720, configured to receive an access request carrying first configuration information and requesting to access a first wireless network, where the access request is sent by a target device.
The sending module 730 is configured to send, to the target device through the first wireless network, second configuration information of a corresponding second wireless network, so that the target device accesses the second wireless network according to the second configuration information.
Optionally, in a possible implementation manner of the embodiment of the present invention, as shown in fig. 8, the wireless network configuration apparatus 70 may further include:
an obtaining module 740, configured to obtain the identity information of the target device before the sending module 730 sends the second configuration information of the corresponding second wireless network to the target device, and obtain, from the cloud, the identity information of all devices belonging to the same family as the control center and the MAC of the router corresponding to each device.
The judging module 750 is configured to judge whether the target device and the control center are in the same family according to the identity information of the target device; if the judgment result is yes, whether the target device is changed from the networking state to the disconnection state is further judged, and after the target device is determined to be changed from the networking state to the disconnection state, second configuration information of the second wireless network is inquired and obtained.
Further, in a possible implementation manner of the embodiment of the present invention, the sending module 730 is further configured to send the MAC of the router to the target device.
It should be noted that the foregoing explanation of the embodiment of the wireless network configuration method is also applicable to the wireless network configuration device of this embodiment, and the implementation principle is similar, and is not described herein again.
The wireless network configuration apparatus of this embodiment sends first configuration information of a first wireless network by broadcasting, receives an access request, which is sent by a target device and carries the first configuration information and is used for requesting to access the first wireless network, and sends second configuration information of a corresponding second wireless network to the target device so that the target device accesses the second wireless network according to the second configuration information. Therefore, the automatic network distribution of the intelligent equipment can be realized, the user operation is simplified, and the user experience is improved.
In order to implement the foregoing embodiments, the present invention further provides a target device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the computer program is executed by the processor, the wireless network configuration method described in the foregoing embodiments can be implemented.
In order to implement the foregoing embodiments, the present invention further provides a control center, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the control center is capable of implementing the wireless network configuration method described in the foregoing embodiments.
In order to implement the above embodiments, the present invention further provides a wireless network configuration system.
Fig. 9 is a schematic structural diagram of a wireless network configuration system according to an embodiment of the present invention.
As shown in fig. 9, the wireless network configuration system 90 includes a control center 910 and a target device 920.
In this embodiment, the control center 910 broadcasts and sends first configuration information of a first wireless network, where the first wireless network is a wireless network in which the control center is located. After searching for and acquiring the first configuration information of the first wireless network, the target device 920 sends an access request carrying the first configuration information and requesting to access the first wireless network to the control center 910. After receiving the access request sent by the target device 920, the control center 910 verifies the access request, and authorizes the target device 920 after the verification is passed, and the target device 920 may access the first wireless network according to the first configuration information. The control center 910 sends the second configuration information of the second wireless network to the target device 920 through the first wireless network, and the target device 920 accesses the second wireless network according to the second configuration information after receiving the second configuration information.
Optionally, in a possible implementation manner of the embodiment of the present invention, the target device 920 may further send identity information to the control center 910, so that the control center 910 authenticates the identity information of the target device 920. After the control center 910 authenticates the identity information of the target device 920, it may further determine whether the target device 920 changes from the networking state to the disconnection state, and after determining that the target device 920 changes from the networking state to the disconnection state, query and acquire second configuration information of the second wireless network, and send the second configuration information to the target device 920 through the first wireless network.
Optionally, in a possible implementation manner of the embodiment of the present invention, the control center 910 may further obtain, from the cloud, identity information of all devices belonging to the same family as the control center 910 and a MAC address of a router corresponding to each device, and send the MAC address of the router corresponding to the target device 920. The target device 920 acquires the MAC address of the router corresponding to the second wireless network, and determines whether the received MAC address of the router is consistent with the MAC address of the router corresponding to the second wireless network, and when the received MAC address of the router is consistent with the MAC address of the router corresponding to the second wireless network, the target device 920 maintains the connection with the second wireless network; when the two are not consistent, the target device 920 disconnects from the second wireless network, so as to ensure that the target device 920 accesses the wireless network through the same router.
It should be noted that the foregoing unlocking description of the embodiment of the wireless network configuration method is also applicable to the wireless network configuration system of the embodiment, and the implementation principle thereof is similar and will not be described herein again.
In the wireless network configuration system of this embodiment, a control center broadcasts and sends first configuration information of a first wireless network, receives an access request carrying the first configuration information and requesting to access the first wireless network, and sends corresponding second configuration information of a second wireless network to a target device; the target equipment acquires first configuration information of a first wireless network, accesses the first wireless network according to the first configuration information, receives second configuration information of a second wireless network sent by a control center from the first wireless network, and accesses the second wireless network through the second configuration information. Therefore, an automatic network distribution of the intelligent household product can be achieved, user operation is simplified, and user experience is improved.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. If implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc. Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.