Movatterモバイル変換


[0]ホーム

URL:


CN112291787A - Network connection method, device and system - Google Patents

Network connection method, device and system
Download PDF

Info

Publication number
CN112291787A
CN112291787ACN201910673686.3ACN201910673686ACN112291787ACN 112291787 ACN112291787 ACN 112291787ACN 201910673686 ACN201910673686 ACN 201910673686ACN 112291787 ACN112291787 ACN 112291787A
Authority
CN
China
Prior art keywords
hotspot
equipment
target
mobile terminal
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910673686.3A
Other languages
Chinese (zh)
Other versions
CN112291787B (en
Inventor
葛迪锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Ezviz Network Co Ltd
Original Assignee
Hangzhou Ezviz Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Ezviz Network Co LtdfiledCriticalHangzhou Ezviz Network Co Ltd
Priority to CN201910673686.3ApriorityCriticalpatent/CN112291787B/en
Publication of CN112291787ApublicationCriticalpatent/CN112291787A/en
Application grantedgrantedCritical
Publication of CN112291787BpublicationCriticalpatent/CN112291787B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The application provides a network connection method, a device and a system, wherein when the method is applied to a mobile terminal, the method comprises the following steps: starting a hotspot, wherein the identification of the hotspot is related to the equipment information of the target equipment to be accessed to the hotspot; when a request for accessing the hotspot sent by the target equipment is received, allowing the target equipment to access the hotspot; and when the terminal and the target equipment are detected to be in the same local area network, sending a Wi-Fi configuration instruction to the target equipment, so that the target equipment is switched from an access hotspot to access Wi-Fi according to the Wi-Fi configuration instruction. The method and the device can realize the configuration of Wi-Fi information for the equipment with the network disconnection through the hotspot signal, the distribution process does not need to contact with target equipment, the remote operation can be realized, the operation method is simple, and the distribution success rate and the safety are high.

Description

Network connection method, device and system
Technical Field
The present application relates to the field of wireless networking technologies, and in particular, to a network connection method, apparatus, and system.
Background
Along with the progress of science and technology, intelligent household equipment is more and more popularized. The establishment of the smart home network is an important step of using smart home devices, and currently, many smart home devices are generally networked by accessing a Wireless-Fidelity (WiFi) router. However, if the WiFi name or password of the router changes, the device that originally accesses the router disconnects the network.
In the wireless device offline scene, the related art provides the following methods for reconfiguring WiFi:
(1) and triggering the wireless equipment to enter a distribution network state by a physical key method. However, this method relies on the need for the device to have physical keys that are accessible to the user, some overhead devices are not easily accessible, and some devices eliminate the physical keys during product design for cost reasons.
(2) The equipment is triggered to enter a distribution network state by a method of identifying specific sound waves. The method has higher requirements on the hardware design of the audio acquisition module of the equipment, and the success rate can be reduced in a noisy environment.
(3) The device is triggered to enter the distribution network state by a method of identifying a specific image (such as a two-dimensional code). The method needs equipment with a camera, and needs images to keep a fixed distance to align with the camera, so that the operation of a user is troublesome, and the distance is generally only about 20CM, which cannot meet the requirement of remotely resetting WiFi.
(4) The device is triggered to enter the distribution network state by continuous power failure for multiple times (such as plugging and unplugging a power supply). However, the operating distance of the method depends on the length of the power line, and the operation is universal, so that certain safety risks exist.
Disclosure of Invention
In view of the above, the present application provides a network connection method, device and system.
Specifically, the method is realized through the following technical scheme:
in a first aspect, an embodiment of the present application provides a network connection method, where the method is applied in a mobile terminal, and the method includes:
starting a hotspot, wherein the identification of the hotspot is related to the equipment information of the target equipment to be accessed to the hotspot;
when a request for accessing the hotspot sent by the target equipment is received, allowing the target equipment to access the hotspot;
and when the terminal and the target equipment are detected to be in the same local area network, sending a Wi-Fi configuration instruction to the target equipment, so that the target equipment is switched from an access hotspot to access Wi-Fi according to the Wi-Fi configuration instruction.
Optionally, after the sending the Wi-Fi configuration instruction to the target device, the method further includes:
and when receiving a configuration response returned by the target equipment, closing the hotspot.
Optionally, after the turning off the hotspot, the method further includes:
accessing the Wi-Fi, inquiring the online state of the current local area network of the target device, and determining that the Wi-Fi configuration of the target device is successful when the online state indicates that the target device is online.
Optionally, before the sending the Wi-Fi configuration instruction to the target device, the method further includes:
sending an authentication request to the target device;
receiving an authentication response returned by the target equipment;
and when the authentication response is an authentication success response, sending a Wi-Fi configuration instruction to the target equipment.
Optionally, the device information includes a device unique identifier;
prior to the opening of the hotspot, the method further comprises:
inquiring an encryption key corresponding to the current moment from a preset key list;
and encrypting the unique equipment identifier by adopting the encryption key to obtain the identifier of the hotspot.
In a second aspect, an embodiment of the present application provides a network connection method, where the method is applied to a target device to be accessed to a network, and the method includes:
scanning a hot spot with a character string generated according to the unique equipment identifier of the equipment as a hot spot identifier, and accessing the hot spot;
and receiving a Wi-Fi configuration instruction sent by the mobile terminal providing the hotspot, and switching from accessing the hotspot to accessing Wi-Fi according to the Wi-Fi configuration instruction.
Optionally, the character string is generated according to the device unique identifier of the device in the following manner:
inquiring an encryption key corresponding to the current moment from a preset key list;
and encrypting the unique equipment identifier by adopting the encryption key to obtain the character string.
Optionally, before the switching from the access hotspot to the access Wi-Fi according to the Wi-Fi configuration instruction, the method further includes:
and after the Wi-Fi configuration instruction is received, sending a configuration response to the mobile terminal to inform the mobile terminal of closing the hotspot.
Optionally, after the accessing the hotspot, the method further includes:
and returning a hotspot access response when receiving the first search packet broadcasted by the mobile terminal.
Optionally, after returning the hotspot access response, the method further includes:
receiving an authentication request sent by the mobile terminal, wherein the authentication request comprises login information;
and authenticating the login information and returning an authentication response, wherein the authentication response comprises an authentication success response or an authentication failure response.
Optionally, after the accessing Wi-Fi, the method further comprises:
and returning a Wi-Fi access response when receiving a second search packet broadcasted by the mobile terminal.
In a third aspect, an embodiment of the present application provides a network connection system, where the network connection system includes a mobile terminal and a target device to be accessed to a network;
the mobile terminal is used for:
starting a hotspot, wherein the identification of the hotspot is related to the equipment information of the target equipment to be accessed to the hotspot;
when a request for accessing the hotspot sent by the target equipment is received, allowing the target equipment to access the hotspot;
when detecting that the terminal and the target equipment are in the same local area network, sending a Wi-Fi configuration instruction to the target equipment;
the target device is to:
scanning a hot spot with a character string generated according to the unique equipment identifier of the equipment as a hot spot identifier, and accessing the hot spot;
and receiving a Wi-Fi configuration instruction sent by the mobile terminal providing the hotspot, and switching from accessing the hotspot to accessing Wi-Fi according to the Wi-Fi configuration instruction.
The embodiment of the application has the following beneficial effects:
in this embodiment, after a hotspot is started by using a hotspot identifier related to device information of a target device, if a request sent by the target device to access the current hotspot is received, the target device is allowed to access the current hotspot, and when it is detected that the terminal and the target device are in the same local area network, a Wi-Fi configuration instruction is sent to the target device, so that the target device is switched from the access hotspot to access Wi-Fi according to the Wi-Fi configuration instruction, thereby implementing the configuration of Wi-Fi information for a device disconnected from the network by using a hotspot signal, and the distribution network process does not need to contact the target device, which can be operated remotely, and has a simple operation method, a distribution network success rate and high security.
In addition, since the embodiment does not need to contact the device when the network is distributed for the target device, it can be considered that the physical key of the target device is removed, and the cost of the target device is further reduced.
Drawings
FIG. 1 is a flow chart illustrating steps of an embodiment of a network connection method according to an exemplary embodiment of the present application;
fig. 2 is a schematic diagram illustrating interaction between a mobile terminal and a target device in a network connection according to an exemplary embodiment of the present application;
FIG. 3 is a flow chart illustrating steps of another embodiment of a method for network connectivity according to an exemplary embodiment of the present application;
FIG. 4 is a hardware block diagram of the device in which the apparatus of the present application is located;
FIG. 5 is a block diagram illustrating an exemplary embodiment of a network connection device according to the present application;
FIG. 6 is a block diagram illustrating another embodiment of a network connection device according to an exemplary embodiment of the present application;
fig. 7 is a block diagram illustrating an exemplary embodiment of a network connection system according to the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
Referring to fig. 1, a flowchart illustrating steps of an embodiment of a network connection method according to an exemplary embodiment of the present application is shown, where the embodiment may be applied to a mobile terminal such as a mobile phone, and specifically may include the following steps:
step 101, a hotspot is opened, and the identification of the hotspot is related to the device information of the target device to be accessed to the hotspot.
As an example, the target device may be a wireless networking-enabled device, for example, may include but is not limited to a webcam IPC, a smart light bulb, a smart air conditioner, a smart socket, a smart speaker, and so on.
As one example, the device information may include a device unique identification (such as a device serial number), a device authentication code, login information, and the like.
In one embodiment, the device information may be information externally input to the mobile terminal. For example, a control program (APP shown in fig. 2) for controlling the wireless devices may be installed in the mobile terminal, and after the user logs in the control program, device information of one or more devices may be input in the control program to add the one or more wireless devices. After a device is added to the control program, the control program may obtain device information for the device. The manner of adding the device may refer to the manner in the related art, which is not limited in this embodiment.
In a possible application scenario, the target device to be connected to the hotspot may be a device that is disconnected after being connected to the network. When the mobile terminal detects that the device is disconnected (for example, the device can be determined to be disconnected if the heartbeat packet is not replied by a certain device within a preset time period by means of sending the heartbeat packet by the control program and the device added to the control program), a prompt that the device is disconnected can be sent to the user, and the user is asked whether to perform device distribution network operation. When it is detected that the user needs to perform the device distribution network, the disconnected device can be used as a target device, and device information of the target device is obtained.
In other application scenarios, the target device to be accessed to the hotspot may also be a new device that is not added to the control program, and at this time, a specified page may be displayed in the control program, and the user is prompted to fill in device information in the specified page, and to receive device information input by the user in the specified page. When the method is implemented, a user can input equipment information in modes of scanning the two-dimensional code, manually inputting and the like.
In a possible implementation manner of this embodiment, before starting the hot spot, the following steps may be further included:
inquiring an encryption key corresponding to the current moment from a preset key list; and encrypting the unique equipment identifier by adopting the encryption key to obtain the identifier of the hotspot.
In this embodiment, after the device information of the target device is determined, a preset encryption key and an encryption algorithm may be used to encrypt the device unique identifier in the device information, and a character string with a specified length obtained through encryption is used as an identifier SSID of the hotspot.
In one example, the encryption key may be a dynamic key, for example, a developer may divide the time of day into a plurality of time periods, and generate a key list by pre-assigning an encryption key to each time period. When the encryption key needs to be obtained, the time period to which the time belongs can be determined according to the real-time, and then the key corresponding to the time period is obtained as the encryption key needed to be used for encryption. In other examples, the dynamic key may also be a real-time, which is not limited in this embodiment.
The pre-negotiated encryption algorithm may be a hash algorithm pre-configured by a developer. After the key and the encryption algorithm are determined, the unique identifier of the device can be encrypted by adopting the key and the encryption algorithm to obtain a character string with a specified length as a hot spot identifier.
Aiming at the hot spot identification, the unique equipment identification of the plaintext is converted into the ciphertext through the Hash algorithm, and meanwhile, the dynamic password is introduced, so that the difficulty of guessing the SSID by the rainbow table can be increased, the SSID is prevented from being reused, and the equipment networking safety is improved.
It should be noted that the network on which the opened hotspot depends may be a mobile network of the mobile terminal, and may also be a network used after the mobile terminal accesses the router, which is not limited in this embodiment.
Step 102, when receiving a request for accessing the hotspot sent by the target device, allowing the target device to access the hotspot.
For the target device, for example, in fig. 2, when the target device (such as the DEV shown in fig. 2) needs to access the network, the device unique identifier of the target device (such as the DEV) may also be encrypted by using a dynamic key and an encryption algorithm according to the method instep 102, so as to obtain a character string identical to the character string obtained instep 102.
After the target device obtains the character string, the target device can start a thread to periodically scan surrounding hotspots so as to judge whether the SSID same as the character string exists or not, and if so, the target device sends a request for accessing the hotspot. And when the mobile terminal receives a request for accessing the hot spot, which is sent by the target equipment, allowing the target equipment to access the opened hot spot.
Step 103, when detecting that the terminal and the target device are in the same local area network, sending a Wi-Fi configuration instruction to the target device, so that the target device switches from an access hotspot to access Wi-Fi according to the Wi-Fi configuration instruction.
For example, as shown in fig. 2, after the hotspot is opened, the control program periodically broadcasts a first search packet in the local area network corresponding to the SSID to search for the target device, and if a response message returned by the target device is received, it may be determined that the target device is detected to access the current hotspot, that is, it is determined that the terminal and the target device are in the same local area network.
After the target device accesses the hotspot, the mobile terminal and the target device can interact through a preset private protocol to increase the security of the interactive information.
When it is determined that the terminal and the target device are in the same local area network, in a possible implementation manner of this embodiment, this embodiment may further include the following steps:
sending an authentication request to the target device; receiving an authentication response returned by the target equipment; and when the authentication response is an authentication success response, sending a Wi-Fi configuration instruction to the target equipment.
As an example, the authentication request may include login information of the target device, and the authentication request requests the target device to authenticate the login information.
Specifically, the device information of the target device may include login information of the target device, for example, the login information may include a login account and a login password. Wherein the target device first needs to be logged in before use.
When it is determined that the target device joins the opened hotspot, the control program may send an authentication request including login information of the target device to the target device through a pre-agreed private protocol, so that the target device authenticates the login information. After authenticating the login information, the target device returns an authentication response to the control program, where the authentication response may include an authentication success response and an authentication failure response. After receiving the authentication response, the control program can send a Wi-Fi configuration instruction to the target device through a private protocol to configure the routing information of the target device if analyzing the authentication response as an authentication success response. If the authentication response is analyzed to be the authentication failure response, the control program does not configure the routing information of the target device.
Illustratively, the Wi-Fi configuration instructions can include the SSID name and password of Wi-Fi provided by the router.
In this embodiment, before sending the Wi-Fi configuration instruction to the target device, security authentication of login information is performed first, so that the security of the distribution network can be improved.
In a possible implementation manner of this embodiment, after sending the Wi-Fi configuration instruction to the target device, this embodiment may further include the following steps:
and when receiving a configuration response returned by the target equipment, closing the hotspot.
For example, as shown in fig. 2, after the control program sends a Wi-Fi configuration instruction (i.e., configure new Wi-Fi information in fig. 2) to the target device, when the target device receives the Wi-Fi configuration instruction, a configuration response (i.e., configure successful response in fig. 2) may be returned to the control program. When the control program receives the configuration response, it may be determined that the target device has received the Wi-Fi configuration instruction, and the control program may close the opened hotspot.
For the target device, as shown in fig. 2, after receiving the Wi-Fi configuration instruction, the access node may switch to access to the Wi-Fi according to the Wi-Fi configuration instruction.
In a possible implementation manner of this embodiment, after the hot spot is turned off, this embodiment may further include the following steps:
accessing the Wi-Fi, inquiring the online state of the current local area network of the target device, and determining that the Wi-Fi configuration of the target device is successful when the online state indicates that the target device is online.
In an embodiment, if the mobile terminal adopts a mobile network to open the hotspot, after the hotspot is closed, the mobile terminal may access the current Wi-Fi according to the obtained SSID name and password provided by the router.
In another embodiment, if the mobile terminal has already accessed Wi-Fi initially, the hotspot may be opened based on the Wi-Fi, and when the hotspot is closed, the mobile terminal is still in the current Wi-Fi.
After the mobile terminal accesses Wi-Fi, the mobile terminal can broadcast a second search packet in the current local area network at regular time through a preset private protocol so as to scan all access devices in the local area network at present and receive responses returned by all the devices, and if the devices returning the responses comprise the target device, the target device can be judged to be in an online state, namely the Wi-Fi configuration of the target device is successful.
In order to enable those skilled in the art to better understand the present embodiment, the following takes the target device as a camera as an example, and the present embodiment is exemplarily described by taking an example:
for example, the camera is arranged at a high position and is wirelessly connected with the router at home. When a new router is changed in a home, the Wi-Fi name and the password are changed, and the wireless connection of the camera cannot be achieved, the following processes can be executed:
1. the camera generates a character string from the equipment serial number of the camera through a negotiated algorithm and a negotiated dynamic key, periodically scans surrounding hot spots, and searches for the hot spot taking the character string as an SSID.
2. When a user finds that the camera is not connected with the internet, a designated control program APP of the mobile phone is started, the camera is selected to carry out network distribution, in the process of network distribution, the APP firstly obtains an equipment serial number of the camera, the same character string is generated according to the equipment serial number and the same algorithm as the camera, and then the mobile phone hot spot is started by taking the character string as the SSID.
3. When the camera finds the hot spot, the connection is automatically carried out.
4. The mobile phone searches the camera in the local area network periodically at the moment, and after finding the camera, the mobile phone communicates with the camera in the local area network and sends the Wi-Fi name and the password of the new router to the camera through a private protocol.
5. After the two routers are communicated, the Wi-Fi of the new router is connected, the mobile phone periodically searches whether the camera is in the same local area network or not in a period of time, and if the camera is searched, the camera is judged to be configured on the Wi-Fi of the new router, and the camera can surf the internet normally.
In this embodiment, after a hotspot is started by using a hotspot identifier related to device information of a target device, if a request sent by the target device to access the current hotspot is received, the target device is allowed to access the current hotspot, and when it is detected that the terminal and the target device are in the same local area network, a Wi-Fi configuration instruction is sent to the target device, so that the target device is switched from the access hotspot to access Wi-Fi according to the Wi-Fi configuration instruction, thereby implementing the configuration of Wi-Fi information for a device disconnected from the network by using a hotspot signal, and the distribution network process does not need to contact the target device, which can be operated remotely, and has a simple operation method, a distribution network success rate and high security.
Referring to fig. 3, a flowchart illustrating steps of another embodiment of a network connection method according to an exemplary embodiment of the present application is shown, where the present embodiment may be applied to a target device to be connected to a network, and the target device may include, for example and without limitation, a webcam IPC, a smart bulb, a smart air conditioner, a smart socket, a smart speaker, and other smart devices.
The method specifically comprises the following steps:
step 301, scanning a hot spot with a character string generated according to the device unique identifier of the device as a hot spot identifier, and accessing the hot spot.
Illustratively, the device unique identifier may be a device serial number.
In a possible implementation manner of this embodiment, the following manner may be adopted to generate a character string according to the device unique identifier of the present device:
inquiring an encryption key corresponding to the current moment from a preset key list; and encrypting the unique equipment identifier by adopting the encryption key to obtain the character string.
The manner of generating the character string in this step may refer to the description of generating the identification of the hot spot in the embodiment of fig. 1. It should be noted that the key list in the present device needs to be the same as the key list of the mobile terminal, and the time of the present device needs to be synchronized with the mobile terminal to ensure that the present device is consistent with the encryption algorithm and encryption key employed in the mobile terminal.
After the target device obtains the character string, the target device can start a thread to periodically scan surrounding hotspots to judge whether the SSID same as the character string exists or not, if so, the target device can send a request for accessing the hotspot to the mobile terminal, and when a response that the mobile terminal allows the device to access the hotspot is received, the SSID is automatically accessed.
In a possible implementation manner of this embodiment, after accessing the hotspot, this embodiment may further include the following steps:
and returning a hotspot access response when the first search packet broadcasted by the mobile terminal is detected.
After the mobile terminal opens the hot spot, the mobile terminal broadcasts a first search packet in a corresponding local area network at regular time to search the equipment added to the hot spot.
In a possible implementation manner of this embodiment, after returning a hotspot access response, this embodiment further includes the following steps:
receiving an authentication request sent by the mobile terminal, wherein the authentication request comprises login information; and authenticating the login information and returning an authentication response, wherein the authentication response comprises an authentication success response or an authentication failure response.
In order to ensure the safety of the equipment, the mobile terminal can send login information to the equipment for login authentication before the equipment is distributed with a network. And when the equipment authenticates the login information without error, returning an authentication success response, and otherwise, returning an authentication failure response.
Step 302, receiving a Wi-Fi configuration instruction sent by the mobile terminal providing the hotspot, and switching from accessing the hotspot to accessing Wi-Fi according to the Wi-Fi configuration instruction.
In this step, the target device may receive a Wi-Fi configuration instruction sent by the mobile terminal through a private protocol, and disconnect the connection with the hotspot and connect the corresponding Wi-Fi according to the Wi-Fi configuration instruction.
In a possible implementation manner of this embodiment, before switching from the access hotspot to access Wi-Fi according to the Wi-Fi configuration instruction, this embodiment further includes the following steps:
and after the Wi-Fi configuration instruction is received, sending a configuration response to the mobile terminal to inform the mobile terminal of closing the hotspot.
In a possible implementation manner of this embodiment, after switching from the access hotspot to access Wi-Fi according to the Wi-Fi configuration instruction, this embodiment may further include the following steps:
and returning a Wi-Fi access response when receiving a second search packet broadcasted by the mobile terminal.
In this step, after returning the Wi-Fi access response, the mobile terminal may search for the device in the local area network, so as to ensure that the network configuration of the device is successful.
In this embodiment, when the target device needs to access the network, the target device may first scan a hotspot identified by a character string generated according to the device unique identifier of the device, and access the hotspot, and then may receive a Wi-Fi configuration instruction sent by the mobile terminal providing the hotspot, and switch from accessing the hotspot to accessing the Wi-Fi according to the Wi-Fi configuration instruction. The whole process can be operated remotely, the operation method is simple, and the success rate and the safety of the distribution network are high.
In addition, since the embodiment does not need to contact the device when the network is distributed for the target device, it can be considered that the physical key of the target device is removed, and the cost of the target device is further reduced.
Corresponding to the embodiment of the method, the application also provides an embodiment of a network connection device.
The device embodiment of the application can be applied to electronic equipment. The device embodiments may be implemented by software, or by hardware, or by a combination of hardware and software. The software implementation is taken as an example, and is formed by reading corresponding computer program instructions in the nonvolatile memory into the memory for operation through the processor of the device where the software implementation is located as a logical means. From a hardware aspect, as shown in fig. 4, the hardware structure diagram of the device in the present application is a hardware structure diagram of an apparatus, except for the processor, the memory, the network interface, and the nonvolatile memory shown in fig. 4, the apparatus where the device is located in the embodiment may also include other hardware according to an actual function of the device, which is not described again.
Referring to fig. 5, a block diagram of a network connection device according to an embodiment of the present application is shown, where the network connection device may be applied to a mobile terminal, and specifically includes the following modules:
ahotspot opening module 501, configured to open a hotspot, where an identifier of the hotspot is related to device information of a target device to be accessed to the hotspot;
anaccess allowing module 502, configured to allow the target device to access the hotspot when receiving a request sent by the target device to access the hotspot;
aconfiguration module 503, configured to send a Wi-Fi configuration instruction to the target device when detecting that the terminal and the target device are in the same local area network, so that the target device switches from an access hotspot to access Wi-Fi according to the Wi-Fi configuration instruction.
In a possible implementation manner of this embodiment, the apparatus further includes:
and the hotspot closing module is used for closing the hotspot when receiving the configuration response returned by the target equipment.
In a possible implementation manner of this embodiment, the apparatus further includes:
the Wi-Fi access module is used for accessing the Wi-Fi;
and the configuration success determining module is used for inquiring the online state of the current local area network of the target equipment, and determining that the Wi-Fi configuration of the target equipment is successful when the online state indicates that the target equipment is online.
In a possible implementation manner of this embodiment, the apparatus further includes:
the authentication request sending module is used for sending an authentication request to the target equipment;
and the authentication response receiving module is used for receiving the authentication response returned by the target equipment and calling the configuration module when the authentication response is an authentication success response.
In a possible implementation manner of this embodiment, the device information includes a device unique identifier;
the device further comprises:
the hotspot identification determining module is used for inquiring an encryption key corresponding to the current moment from a preset key list; and encrypting the unique equipment identifier by adopting the encryption key to obtain the identifier of the hotspot.
Referring to fig. 6, a block diagram of another embodiment of a network connection device according to an exemplary embodiment of the present application is shown, where the device is applied to a target device to be accessed to a network, and specifically includes the following modules:
thehotspot access module 601 is configured to scan a hotspot with a hotspot identifier as a character string generated according to the device unique identifier of the device, and access the hotspot;
a Wi-Fi configurationinstruction receiving module 602, configured to receive a Wi-Fi configuration instruction sent by a mobile terminal providing the hotspot;
and the Wi-Fi access module 603 is configured to switch from an access hotspot to access Wi-Fi according to the Wi-Fi configuration instruction.
In a possible implementation manner of this embodiment, a character string is generated according to the device unique identifier of the present device in the following manner:
inquiring an encryption key corresponding to the current moment from a preset key list;
and encrypting the unique equipment identifier by adopting the encryption key to obtain the character string.
In a possible implementation manner of this embodiment, the apparatus further includes:
and the configuration response sending module is used for sending a configuration response to the mobile terminal after receiving the Wi-Fi configuration instruction so as to inform the mobile terminal of closing the hotspot.
In a possible implementation manner of this embodiment, the apparatus further includes:
and the hotspot access response sending module is used for returning a hotspot access response when receiving the first search packet broadcast by the mobile terminal.
In a possible implementation manner of this embodiment, the apparatus further includes:
the authentication request receiving module is used for receiving an authentication request sent by the mobile terminal, wherein the authentication request comprises login information;
and the authentication response sending module is used for authenticating the login information and returning an authentication response, wherein the authentication response comprises an authentication success response or an authentication failure response.
In a possible implementation manner of this embodiment, the apparatus further includes:
and the Wi-Fi access response sending module is used for returning a Wi-Fi access response when receiving the second search packet broadcast by the mobile terminal.
Referring to fig. 7, a block diagram of an embodiment of a network connection system according to an exemplary embodiment of the present application is shown, where the network connection system may include a mobile terminal 10 and a target device 20 to be connected to a network;
the mobile terminal 10 is configured to:
starting a hotspot, wherein the identification of the hotspot is related to the equipment information of the target equipment to be accessed to the hotspot;
when a request for accessing the hotspot sent by the target equipment is received, allowing the target equipment to access the hotspot;
when detecting that the terminal and the target equipment are in the same local area network, sending a Wi-Fi configuration instruction to the target equipment;
the target device 20 is configured to:
scanning a hot spot with a character string generated according to the unique equipment identifier of the equipment as a hot spot identifier, and accessing the hot spot;
and receiving a Wi-Fi configuration instruction sent by the mobile terminal providing the hotspot, and switching from accessing the hotspot to accessing Wi-Fi according to the Wi-Fi configuration instruction.
For the device and system embodiments, since they correspond substantially to the method embodiments, reference may be made to the method embodiments for their part of the description.
The above-described embodiments of the apparatus and system are merely illustrative, and the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the application. One of ordinary skill in the art can understand and implement it without inventive effort.
Embodiments of the present application also provide a computer-readable storage medium, on which a computer program is stored, which when executed by a processor, implements the steps of the above-described method embodiments.
The embodiment of the present application further provides a mobile terminal, which includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, and the processor implements the steps of the above method embodiments when executing the program.
Embodiments of the subject matter and the functional operations described in this specification can be implemented in: digital electronic circuitry, tangibly embodied computer software or firmware, computer hardware including the structures disclosed in this specification and their structural equivalents, or a combination of one or more of them. Embodiments of the subject matter described in this specification can be implemented as one or more computer programs, i.e., one or more modules of computer program instructions, encoded on a tangible, non-transitory program carrier for execution by, or to control the operation of, data processing apparatus. Alternatively or additionally, the program instructions may be encoded on an artificially generated propagated signal, e.g., a machine-generated electrical, optical, or electromagnetic signal, that is generated to encode and transmit information to suitable receiver apparatus for execution by the data processing apparatus. The computer storage medium may be a machine-readable storage device, a machine-readable storage substrate, a random or serial access memory device, or a combination of one or more of them.
The processes and logic flows described in this specification can be performed by one or more programmable computers executing one or more computer programs to perform corresponding functions by operating on input data and generating output. The processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application-specific integrated circuit).
Computers suitable for executing computer programs include, for example, general and/or special purpose microprocessors, or any other type of central processing unit. Generally, a central processing unit will receive instructions and data from a read-only memory and/or a random access memory. The basic components of a computer include a central processing unit for implementing or executing instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks. However, a computer does not necessarily have such a device. Further, the computer may be embedded in another device, e.g., a vehicle-mounted terminal, a mobile telephone, a Personal Digital Assistant (PDA), a mobile audio or video player, a game console, a Global Positioning System (GPS) receiver, or a portable storage device such as a Universal Serial Bus (USB) flash drive, to name a few.
Computer-readable media suitable for storing computer program instructions and data include all forms of non-volatile memory, media and memory devices, including by way of example semiconductor memory devices (e.g., EPROM, EEPROM, and flash memory devices), magnetic disks (e.g., an internal hard disk or a removable disk), magneto-optical disks, and CD ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any invention or of what may be claimed, but rather as descriptions of features specific to particular embodiments of particular inventions. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. In other instances, features described in connection with one embodiment may be implemented as discrete components or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In some cases, multitasking and parallel processing may be advantageous. Moreover, the separation of various system modules and components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
Thus, particular embodiments of the subject matter have been described. Other embodiments are within the scope of the following claims. In some cases, the actions recited in the claims can be performed in a different order and still achieve desirable results. Further, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some implementations, multitasking and parallel processing may be advantageous.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (12)

CN201910673686.3A2019-07-242019-07-24Network connection method, device and systemActiveCN112291787B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201910673686.3ACN112291787B (en)2019-07-242019-07-24Network connection method, device and system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201910673686.3ACN112291787B (en)2019-07-242019-07-24Network connection method, device and system

Publications (2)

Publication NumberPublication Date
CN112291787Atrue CN112291787A (en)2021-01-29
CN112291787B CN112291787B (en)2023-03-24

Family

ID=74419034

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201910673686.3AActiveCN112291787B (en)2019-07-242019-07-24Network connection method, device and system

Country Status (1)

CountryLink
CN (1)CN112291787B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN113453300A (en)*2021-06-282021-09-28青岛海尔科技有限公司Equipment hotspot processing method and device, storage medium and electronic device
CN114302399A (en)*2021-12-152022-04-08奇安信科技集团股份有限公司Control method and device for WIFI (Wireless Fidelity) sharing hotspot and storage medium
CN115119218A (en)*2021-03-172022-09-27海信集团控股股份有限公司 A distribution network control method, mobile terminal and medical equipment
WO2022237438A1 (en)*2021-05-122022-11-17深圳市道通科技股份有限公司Vehicle communication device, wifi connection method and vehicle diagnostic system
CN116321358A (en)*2022-12-082023-06-23珠海奔图电子有限公司 A network distribution method, device, equipment and medium
WO2023134387A1 (en)*2022-01-142023-07-20荣耀终端有限公司Communication method and apparatus
CN116684942A (en)*2022-09-092023-09-01荣耀终端有限公司 Method for accessing network, electronic device and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103533608A (en)*2013-09-302014-01-22深圳市同洲电子股份有限公司Wireless hotspot SSID (service set identifier) naming method and wireless hotspot identification method and equipment
CN104993981A (en)*2015-05-142015-10-21小米科技有限责任公司Method and apparatus for controlling access of device
CN105792208A (en)*2016-02-292016-07-20华为技术有限公司 A method for controlling device access, related equipment and system
US20160249286A1 (en)*2014-03-132016-08-25Huizhou Tcl Mobile Communication Co., LtdSmart home control method and system based on alljoyn technology
CN106454827A (en)*2016-09-302017-02-22上海斐讯数据通信技术有限公司Intelligent equipment networking method and intelligent equipment networking system
CN107241679A (en)*2016-03-292017-10-10阿里巴巴集团控股有限公司One kind connection method for building up, method for sending information, message method and device
CN107371163A (en)*2017-07-282017-11-21歌尔股份有限公司A kind of method and apparatus for controlling access wireless network
CN107466036A (en)*2017-08-082017-12-12歌尔科技有限公司The quick method, equipment and system for establishing Wi Fi connections

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103533608A (en)*2013-09-302014-01-22深圳市同洲电子股份有限公司Wireless hotspot SSID (service set identifier) naming method and wireless hotspot identification method and equipment
US20160249286A1 (en)*2014-03-132016-08-25Huizhou Tcl Mobile Communication Co., LtdSmart home control method and system based on alljoyn technology
CN104993981A (en)*2015-05-142015-10-21小米科技有限责任公司Method and apparatus for controlling access of device
CN105792208A (en)*2016-02-292016-07-20华为技术有限公司 A method for controlling device access, related equipment and system
CN107241679A (en)*2016-03-292017-10-10阿里巴巴集团控股有限公司One kind connection method for building up, method for sending information, message method and device
CN106454827A (en)*2016-09-302017-02-22上海斐讯数据通信技术有限公司Intelligent equipment networking method and intelligent equipment networking system
CN107371163A (en)*2017-07-282017-11-21歌尔股份有限公司A kind of method and apparatus for controlling access wireless network
CN107466036A (en)*2017-08-082017-12-12歌尔科技有限公司The quick method, equipment and system for establishing Wi Fi connections

Cited By (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN115119218A (en)*2021-03-172022-09-27海信集团控股股份有限公司 A distribution network control method, mobile terminal and medical equipment
WO2022237438A1 (en)*2021-05-122022-11-17深圳市道通科技股份有限公司Vehicle communication device, wifi connection method and vehicle diagnostic system
CN113453300A (en)*2021-06-282021-09-28青岛海尔科技有限公司Equipment hotspot processing method and device, storage medium and electronic device
CN114302399A (en)*2021-12-152022-04-08奇安信科技集团股份有限公司Control method and device for WIFI (Wireless Fidelity) sharing hotspot and storage medium
CN114302399B (en)*2021-12-152023-12-29奇安信科技集团股份有限公司Control method and device for WIFI sharing hot spot and storage medium
WO2023134387A1 (en)*2022-01-142023-07-20荣耀终端有限公司Communication method and apparatus
CN116684942A (en)*2022-09-092023-09-01荣耀终端有限公司 Method for accessing network, electronic device and storage medium
CN116684942B (en)*2022-09-092024-07-12荣耀终端有限公司Network access method, electronic equipment and storage medium
CN116321358A (en)*2022-12-082023-06-23珠海奔图电子有限公司 A network distribution method, device, equipment and medium

Also Published As

Publication numberPublication date
CN112291787B (en)2023-03-24

Similar Documents

PublicationPublication DateTitle
CN112291787B (en)Network connection method, device and system
CN113099443B (en)Equipment authentication method, device, equipment and system
CN109348458B (en)Network access configuration method and device, electronic equipment and network system
KR102118814B1 (en) Wireless network access method, device, and system
JP6072918B2 (en) Establishing a device-to-device communication session
CN112261708B (en)System and method for automatically configuring WiFi equipment in batches
US11233817B2 (en)Methods and apparatus for end device discovering another end device
KR102210897B1 (en)Security authentication method, configuration method and related device
CN105471974A (en)Intelligent equipment capable of realizing remote control, terminal equipment and method
RU2015153111A (en) COMMUNICATION CONTROL DEVICE, AUTHENTICATION DEVICE, CENTRAL CONTROL DEVICE AND COMMUNICATION SYSTEM
US9510130B2 (en)Provisioning of multiple wireless devices by an access point
WO2018090829A1 (en)Method and apparatus for allowing intelligent terminal device to access internet
CN104009925A (en)Method and device for establishing bridge connection with router and router
CN110741614B (en)Data communication system and method
CN106572148A (en)Intelligent product network configuration method and network configuration system
US8862096B1 (en)Provisioning of multiple wireless devices by an access point
CN102960005A (en)Authentication system and authentication method therefor in a wireless LAN environment
JP2014509468A (en) Method and system for out-of-band delivery of wireless network credentials
EP3833153A1 (en)Network connection methods and devices
CN116264682A (en) Equipment network access method and device, electronic equipment, storage medium
WO2017127150A1 (en)Systems and methods for provisioning devices
CN114640691A (en)Equipment connection method and system and corresponding Internet of things equipment
CN112448970A (en)Equipment connection method and system and corresponding Internet of things equipment
CN112637846B (en)Hotspot connection method and device
US7996664B2 (en)Method and system for improved communication network setup

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp