CN114189861A - Wireless network connection method, device and system - Google Patents

Wireless network connection method, device and system Download PDF

Info

Publication number
CN114189861A
CN114189861A CN202111406713.4A CN202111406713A CN114189861A CN 114189861 A CN114189861 A CN 114189861A CN 202111406713 A CN202111406713 A CN 202111406713A CN 114189861 A CN114189861 A CN 114189861A
Authority
CN
China
Prior art keywords
identification code
network connection
access point
wireless access
wireless
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111406713.4A
Other languages
Chinese (zh)
Other versions
CN114189861B (en
Inventor
邓高亮
李林峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba China Co Ltd
Original Assignee
Alibaba China Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba China Co Ltd filed Critical Alibaba China Co Ltd
Priority to CN202111406713.4A priority Critical patent/CN114189861B/en
Publication of CN114189861A publication Critical patent/CN114189861A/en
Application granted granted Critical
Publication of CN114189861B publication Critical patent/CN114189861B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application provides a wireless network connection method, equipment and a system. The wireless network connection method can include: in response to the network connection request, the first device displays an identification code for implementing the network connection, the identification code including: a service set identification corresponding to the wireless access point and a randomly generated networking key of the first device, the first device not connected to the wireless access point; the second equipment scans and identifies the identification code so as to send the information carried by the identification code to the wireless access point, wherein the second equipment is connected to the Internet; the first device connects to the wireless access point through the networking key. According to the technical scheme, any operation of manual input of a user is not needed, the identification code is scanned and identified through the second equipment, the network connection operation of the first equipment can be rapidly and accurately realized, and the networking secret key is contained in the identification code, so that the condition that the networking secret key is leaked can be prevented, and the safety and reliability of network connection are improved.

Description

Wireless network connection method, device and system
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method, a device, and a system for wireless network connection.
Background
The Wireless Network is a Network that can interconnect various communication devices without wiring, and may be divided into a Wireless Wide Area Network (WWAN), a Wireless Local Area Network (WLAN), a Wireless Metropolitan Area Network (WMAN), and a Wireless Personal Area Network (WPAN), according to different Network coverage areas.
Prior art wireless network connections tend to include the following steps: a series of user names and passwords are generated in advance, and the user can manually input the assigned user names and passwords on the setting terminal to realize wireless network connection. However, when the user manually inputs the user name and the password, errors are easily generated, which not only increases the complexity of the network connection operation, but also reduces the speed of the network connection.
Disclosure of Invention
The embodiment of the application provides a wireless network connection method, equipment and a system, wherein the identification code is scanned and identified by the second equipment, so that the first equipment can be quickly and accurately connected to a wireless access point, and the quality and efficiency of network connection are ensured.
In a first aspect, an embodiment of the present application provides a wireless network connection method, including:
in response to the network connection request, the first device displays an identification code for implementing the network connection, the identification code including: a service set identification corresponding to a wireless access point and a randomly generated networking key of the first device, the first device not connected to a wireless access point;
the second equipment scans and identifies the identification code so as to send the information carried by the identification code to the wireless access point, wherein the second equipment is connected to the Internet;
the first device connects to the wireless access point through the networking key.
In a second aspect, an embodiment of the present application provides a wireless network connection system, including: a first device not connected to the wireless access point and a second device already connected to the internet;
the first device is used for responding to the network connection request and displaying an identification code for realizing the network connection, wherein the identification code comprises: a service set identification and a randomly generated networking key corresponding to the wireless access point;
the second device is used for scanning and identifying the identification code so as to send the information carried by the identification code to the wireless access point, and the second device is connected with the Internet;
the first device is configured to connect to the wireless access point through the networking key.
In a third aspect, an embodiment of the present application provides an electronic device, including: a memory, a processor; wherein the memory is configured to store one or more computer instructions, wherein the one or more computer instructions, when executed by the processor, implement the wireless network connection method of the first aspect.
In a fourth aspect, an embodiment of the present invention provides a computer storage medium for storing a computer program, where the computer program is used to enable a computer to implement the wireless network connection method shown in the first aspect when executed.
In a fifth aspect, an embodiment of the present invention provides a computer program product, including: computer program, which, when executed by a processor of an electronic device, causes the processor to carry out the steps of the wireless network connection method as shown in the first aspect above.
In a sixth aspect, an embodiment of the present invention provides a wireless network connection method, including:
responding to the network connection request, the live broadcast equipment displays an identification code for realizing network connection, wherein the identification code comprises: a service set identification corresponding to a wireless access point and a networking key randomly generated by the live device, wherein the live device is not connected to the wireless access point;
the mobile terminal scans and identifies the identification code so as to send information carried by the identification code to the wireless access point, wherein the mobile terminal is connected to the Internet;
the wireless device connects to the wireless access point through the networking key.
In a seventh aspect, an embodiment of the present invention provides a wireless network connection system, including: a live broadcast device not connected to the wireless access point and a mobile terminal connected to the internet;
the live broadcast equipment is used for responding to a network connection request and displaying an identification code for realizing network connection, wherein the identification code comprises: a service set identification and a randomly generated networking key corresponding to the wireless access point;
the mobile terminal is used for scanning and identifying the identification code so as to send the information carried by the identification code to the wireless access point, and the mobile terminal is connected with the Internet;
and the live broadcast equipment is used for connecting to the wireless access point through the networking secret key.
In an eighth aspect, an embodiment of the present application provides an electronic device, including: a memory, a processor; wherein the memory is configured to store one or more computer instructions, wherein the one or more computer instructions, when executed by the processor, implement the wireless network connection method of the sixth aspect.
In a ninth aspect, an embodiment of the present invention provides a computer storage medium for storing a computer program, where the computer program is used to enable a computer to implement the wireless network connection method shown in the above sixth aspect when executed.
In a tenth aspect, an embodiment of the present invention provides a computer program product, including: a computer program which, when executed by a processor of an electronic device, causes the processor to perform the steps of the wireless network connection method of the sixth aspect described above.
In an eleventh aspect, an embodiment of the present invention provides a wireless network connection method, which is applied to a first device that is not connected to a wireless access point, and the method includes:
acquiring a network connection request;
generating an identification code for implementing network connection based on the network connection request, wherein the identification code comprises: a service set identification corresponding to a wireless access point and a randomly generated networking key of the first device;
displaying the identification code so as to send information carried by the identification code to a wireless access point through second equipment;
and accessing the wireless access point through the networking key.
In a twelfth aspect, an embodiment of the present invention provides a wireless network connection apparatus, which is applied to a first device that is not connected to a wireless access point, where the apparatus includes:
the first acquisition module is used for acquiring a network connection request;
a first generating module, configured to generate an identification code for implementing network connection based on the network connection request, where the identification code includes: a service set identification corresponding to a wireless access point and a randomly generated networking key of the first device;
the first display module is used for displaying the identification code so as to send the information carried by the identification code to the wireless access point through the second equipment;
and the first processing module is used for accessing the wireless access point through the networking secret key.
In a thirteenth aspect, an embodiment of the present application provides an electronic device, including: a memory, a processor; wherein the memory is configured to store one or more computer instructions, wherein the one or more computer instructions, when executed by the processor, implement the wireless network connection method of the eleventh aspect.
In a fourteenth aspect, an embodiment of the present invention provides a computer storage medium for storing a computer program, where the computer program is configured to enable a computer to implement the wireless network connection method in the eleventh aspect when executed.
In a fifteenth aspect, an embodiment of the present invention provides a computer program product, including: a computer program which, when executed by a processor of an electronic device, causes the processor to perform the steps of the wireless network connection method of the eleventh aspect.
In a sixteenth aspect, an embodiment of the present invention provides a wireless network connection method, which is applied to a second device connected to the internet, and the method includes:
scanning and identifying an identification code displayed on a first device, wherein the first device is not connected to a wireless access point, and the identification code comprises: a service set identification corresponding to a wireless access point and a randomly generated networking key of the first device;
and sending the information carried by the identification code to the wireless access point.
In a seventeenth aspect, an embodiment of the present invention provides a wireless network connection apparatus, applied to a second device connected to the internet, the apparatus including:
the second processing module is used for scanning and identifying an identification code displayed on first equipment, wherein the first equipment is not connected to a wireless access point, and the identification code comprises: a service set identification corresponding to a wireless access point and a randomly generated networking key of the first device;
and the second sending module is used for sending the information carried by the identification code to the wireless access point.
In an eighteenth aspect, an embodiment of the present application provides an electronic device, including: a memory, a processor; wherein the memory is configured to store one or more computer instructions, wherein the one or more computer instructions, when executed by the processor, implement the wireless network connection method of the sixteenth aspect.
In a nineteenth aspect, an embodiment of the present invention provides a computer storage medium for storing a computer program, where the computer program is configured to enable a computer to implement the wireless network connection method of the sixteenth aspect when executed.
In a twentieth aspect, an embodiment of the present invention provides a computer program product, including: a computer program, which, when executed by a processor of an electronic device, causes the processor to perform the steps of the wireless network connection method of the sixteenth aspect.
According to the technical scheme provided by the embodiment of the application, in response to the obtained network connection request, the first device can display the identification code for realizing network connection, and then scan and identify the identification code through the second device, so that the information carried by the identification code can be sent to the wireless access point, after the wireless access point acquires the information carried by the identification code, the first device can be connected to the wireless access point through the networking secret key, thereby effectively realizing that the first device can be connected to the wireless access point quickly and accurately without any operation manually input by a user, and ensuring the quality and efficiency of network connection, in addition, as the networking secret key generated by the first device for realizing network connection is contained in the identification code, the networking secret key can be effectively prevented from being leaked, the safety and reliability of the wireless network connection method are improved, the quality and efficiency of data communication are ensured, and the practicability of the method is further improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart illustrating a wireless network connection method according to an embodiment of the present disclosure;
fig. 2 is a schematic view of a scenario of a wireless network connection method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of generating an identification code for implementing a network connection according to an embodiment of the present application;
FIG. 4 is a schematic flow chart illustrating a process for generating an identification code for use in implementing a network connection according to another embodiment of the present application;
fig. 5 is a schematic flowchart of a process that the second device scans and identifies the identification code to send information carried by the identification code to the wireless access point according to the embodiment of the present application;
fig. 6 is a flowchart illustrating another wireless network connection method according to an embodiment of the present application;
fig. 7 is an interaction diagram of a wireless network connection method according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a wireless network connection system according to an embodiment of the present application;
fig. 9 is a flowchart illustrating a wireless network connection method according to an embodiment of the present application;
fig. 10 is a flowchart illustrating a wireless network connection method according to an embodiment of the present application;
fig. 11 is a schematic structural diagram of a wireless network connection system according to an embodiment of the present application;
fig. 12 is a schematic structural diagram of a wireless network connection system according to an embodiment of the present application;
fig. 13 is a flowchart illustrating a wireless network connection method according to an embodiment of the present application;
fig. 14 is a flowchart illustrating a wireless network connection method according to another embodiment of the present application;
fig. 15 is a schematic structural diagram of a wireless network connection device according to an embodiment of the present application;
fig. 16 is a schematic structural diagram of an electronic device corresponding to the wireless network connection device shown in fig. 15;
fig. 17 is a schematic structural diagram of another wireless network connection device according to an embodiment of the present application;
fig. 18 is a schematic structural diagram of an electronic device corresponding to the wireless network connection device shown in fig. 17.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terminology used in the embodiments of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the examples of this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise, and "a" and "an" typically include at least two, but do not exclude the inclusion of at least one.
It should be understood that the term "and/or" as used herein is merely one type of association that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
The words "if", as used herein, may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
It is also noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a good or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such good or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of additional like elements in the article or system in which the element is included.
In addition, the sequence of steps in each method embodiment described below is only an example and is not strictly limited.
Definition of terms:
a wireless Access Point (Access Point, abbreviated as AP) is an Access Point of a wireless network, and is commonly called a "hot spot".
The MAC Address (Media Access Control Address) is a Media Access Control Address (MAC Control Address), also called a local area network Address (LAN Address), an Ethernet Address (Ethernet Address) or a Physical Address (Physical Address), which is used to identify the Address of the network device location.
A Pre-Shared Key (Pre-Shared Key, PSK for short) is an authentication encryption mode commonly used by home Wi-Fi, and a user can be networked only by inputting a correct password.
Multiple Pre-Shared keys (MPSK for short) are configured for each user to solve the disadvantage that all users use the same password.
WPA Enterprise: Wi-Fi Protected Access Enterprise is a commonly used authentication encryption mode of Enterprise-level Wi-Fi, and authentication is generally completed through a username and a password or a certificate.
Service Set Identifier (SSID): a wireless local area network can be divided into a plurality of sub-networks which need different authentication, each sub-network needs independent authentication, only the user who passes the authentication can enter the corresponding sub-network, and the unauthorized user is prevented from entering the network.
PEAP: protected Extensible Authentication Protocol, terminal input user name + password mode Authentication.
In order to facilitate those skilled in the art to understand the technical solutions provided in the embodiments of the present application, the following description is provided for the related technologies:
with the rapid development of network technology, the requirements for the security and convenience of the network are increased when network connection is performed, and especially for small and medium-sized enterprises, users pay more attention to the security and convenience of networking. Currently, the methods for implementing wireless network connection generally include two methods: one is to realize network connection by means of multi-pre-shared key MPSK, and the other is to realize network connection by means of user name and password authentication.
The network connection mode of MPSK generally includes the following steps: the method comprises the steps of configuring a plurality of passwords in advance, distributing the passwords to equipment according to a rule agreed in advance, and connecting the equipment with a network based on the distributed passwords. However, after the device is connected to the network, the identity of the device cannot be effectively identified, that is, an illegal user may be connected to the network and may perform normal data processing operations through the network, so that the network connection and the data security and reliability cannot be guaranteed, and the illegal operations of any device cannot be managed and controlled.
The network connection method through the user name and password authentication generally includes: a series of user names and passwords are generated in advance, and the user can manually input the assigned user names and passwords on the setting terminal to realize wireless network connection. However, when the user manually inputs the user name and the password, errors are easy to occur, which not only increases the complexity of the network connection operation and reduces the speed of the network connection, but also when the user name and the password are distributed, once the user name and the password are leaked, the illegal terminal can also perform the normal network connection operation through the leaked user name and password, and the security and reliability of the network connection and the data cannot be ensured.
In order to solve the above technical problem, the present embodiment provides a wireless network connection method, device and system. When the implementation is specifically, the first device may include any one of the following: personal Computers (PCs), printers, air conditioners, televisions and other devices capable of connecting to a wireless access point, etc., the second device may include any one of: the mobile phone, the tablet computer, the wearable device (smart watch, smart glasses) and other devices capable of performing scanning operations.
Specifically, the wireless network connection method may include: the first device can acquire the network connection request, after the network connection request is acquired, the first device can display an identification code for realizing network connection based on the received network connection request, then the second device can scan and identify the identification code so as to send information carried by the identification code to the wireless access point, and after the wireless access point acquires the information carried by the identification code, the first device can be connected to the wireless access point through the networking secret key, so that the first device can be connected to the wireless access point, and wireless network connection operation is realized.
In the technical scheme provided by this embodiment, the first device may display the identifier code for implementing network connection after acquiring the network connection request, and then scan and identify the identifier code through the second device, so as to send the information carried by the identifier code to the wireless access point, and after the wireless access point acquires the information carried by the identifier code, the first device may connect to the wireless access point through the networking key, thereby effectively implementing any operation without manual input by a user, and scan and identify the identifier code through the second device, so as to quickly and accurately implement connection of the first device to the wireless access point, thereby ensuring quality and efficiency of network connection, and in addition, because the networking key generated by the first device for implementing network connection is included in the identifier code, thereby effectively preventing the networking key from being leaked, and improving safety and reliability of the wireless network connection method, and the quality and efficiency of data communication are ensured, and the practicability of the method is further improved.
The following describes a wireless network connection method, device and system provided by various embodiments of the present application in detail through an exemplary application scenario. The features of the embodiments and examples described below may be combined with each other without conflict between the embodiments.
Fig. 1 is a flowchart illustrating a wireless network connection method according to an embodiment of the present disclosure; fig. 2 is a schematic view of a scenario of a wireless network connection method according to an embodiment of the present application; referring to fig. 1 to 2, the present embodiment provides a wireless network connection method, and a main body of the method may be a wireless network connection system, and the wireless network connection system may include a first device and a second device, the first device is not connected to a wireless access point, and the second device is connected to the internet. In the above embodiment, the implementation manner of connecting the second device to the internet may include wireless or wired network connection, and the network format of the wireless network connection may be any one of 2G (gsm), 2.5G (gprs), 3G (WCDMA, TD-SCDMA, CDMA2000, UTMS), 4G (LTE), 4G + (LTE +), WiMax, 5G, and the like.
It should be noted that the first device and the second device may be implemented as software or a combination of software and hardware, and when implemented specifically, the first device may include any one of the following: personal Computers (PCs), printers, air conditioners, televisions, cell phones, tablets, wearable devices, and other devices capable of connecting to a wireless access point, etc., the second device may include any one of the following: the mobile phone, the tablet computer, the wearable device (smart watch, smart glasses) and other devices capable of performing scanning operations. Specifically, the wireless network connection method may include:
step S101: in response to the network connection request, the first device displays an identification code for implementing the network connection, the identification code including: a service set identification corresponding to the wireless access point and a randomly generated networking key of the first device, the first device not connected to the wireless access point.
Step S102: the second device scans and identifies the identification code to send the information carried by the identification code to the wireless access point, and the second device is connected to the Internet.
Step S103: the first device connects to the wireless access point through the networking key.
The above steps are explained in detail below:
step S101: in response to the network connection request, the first device displays an identification code for implementing the network connection, the identification code including: a service set identification corresponding to the wireless access point and a randomly generated networking key of the first device, the first device not connected to the wireless access point.
Since the first device is a device that is not connected to the wireless access point, in order to enable the first device to be connected to the wireless access point, the first device may obtain the network connection request, in some examples, the network connection request may be generated based on a network connection operation input by a user at the first device, at this time, before the first device displays an identification code for implementing network connection, the method in this embodiment may further include: the method comprises the steps of obtaining network connection operation input by a user on first equipment, and generating a network connection request based on the network connection operation.
Specifically, an application program for implementing a network connection operation may be provided on the first device, a network connection control may be configured on the application program, and a user may perform a click operation or a sliding operation on the network connection control, so that a network connection operation input by the user through the application program may be obtained, and then a network connection request may be generated through the network connection operation.
In other examples, the network connection request may be generated based on a disconnected network connection status of the first device, and at this time, before the first device displays an identification code for implementing the network connection, the method in this embodiment may further include: acquiring a network connection state of first equipment; and when the network connection state is the disconnection state, generating a network connection request.
Specifically, for the first device, the network connection status of the first device may include: the wireless access point is connected with the first device, and the first device is connected with the wireless access point when the network connection state of the first device is the connected state. When the network connection state of the first device is a disconnection state, it indicates that the first device is not connected to the wireless access point, and in this case, in order to enable the first device to connect to the wireless access point, a network connection request may be generated based on the disconnection state of the first device.
As described above, since whether or not the network connection request is generated is related to the network connection state of the first device, the network connection state of the first device can be acquired in order to accurately acquire the network connection request. In some examples, obtaining the network connection status of the first device may include: identification information for identifying a network connection state of the first device is acquired, and the network connection state of the first device is determined based on the identification information. For example: when the identification information is "1", it may be determined that the network connection state of the first device is a connected state based on the identification information "1"; when the identification information is "0", then when it may be based on the identification information "0", then it may be determined that the network connection state of the first device is the disconnection state based on the identification information "0". In other examples, obtaining the network connection status of the first device may include: controlling the first equipment to send a heartbeat data packet to the network equipment, and determining that the network connection state of the first equipment is a connected state if the first equipment receives a heartbeat reply packet corresponding to the heartbeat data packet within a preset time period; and in a preset time period, if the first equipment does not receive the heartbeat reply packet corresponding to the heartbeat data packet, determining that the network connection state of the first equipment is a disconnection state.
When the network connection state of the first device is acquired and the network connection state is the disconnection state, in order to enable the first device to be connected to the wireless access point, the network connection request can be generated based on the disconnection state, so that the accuracy and reliability of the generation of the network connection request are effectively ensured.
After acquiring the network connection request, the first device may display an identification code for implementing the network connection in response to the network connection request, where the identification code may correspond to different manifestations, such as: the identification code may comprise any one of: bar code, two-dimensional code, three-dimensional code. In addition, the identification code includes a service set identification corresponding to the wireless access point and a randomly generated networking key of the first device.
It is noted that for the networking key included in the identification code, the networking key is randomly generated based on the network connection request, and different networking keys may be generated correspondingly for different network connection requests, and in some examples, the networking key may be a pre-shared key PSK. In addition, for the first device, if the first device corresponds to a plurality of wireless access points, the identification code may include a service set identifier corresponding to any one of the wireless access points, or the identification code may include a service set identifier corresponding to a target wireless access point, where the target wireless access point may be a wireless access point with the highest usage frequency, a wireless access point with the highest priority, or a wireless access point specified by a user, among the plurality of wireless access points.
Step S102: the second device scans and identifies the identification code to send the information carried by the identification code to the wireless access point, and the second device is connected to the Internet.
After the first equipment displays the identification code, the second equipment can scan and identify the identification code, a camera can be arranged on the second equipment, the identification code can be scanned and identified through the arranged camera, and therefore the second equipment can send the information carried by the identification code to the wireless access point, and the wireless access point can stably acquire the information carried by the identification code.
Step S103: the first device connects to the wireless access point through the networking key.
After the second device sends the information carried by the identification code (including the networking secret key randomly generated by the first device) to the wireless access point, the wireless access point can stably acquire the information carried by the identification code, and then the first device can be connected to the wireless access point through the networking secret key, so that the wireless network connection operation of the first device is realized.
In the wireless network connection method provided by this embodiment, in response to the obtained network connection request, the first device may display an identification code for implementing network connection, and then scan and identify the identification code through the second device, so as to send information carried by the identification code to the wireless access point, after the wireless access point acquires the information carried by the identification code, the first device may connect to the wireless access point through the networking key, thereby effectively implementing any operation without manual input by a user, and scan and identify the identification code through the second device, so as to quickly and accurately implement connection of the first device to the wireless access point, thereby ensuring quality and efficiency of network connection, and in addition, since the networking key generated by the first device for implementing network connection is included in the identification code, thereby effectively preventing the networking key from being leaked, the safety and reliability of the wireless network connection method are improved, the quality and efficiency of data communication are ensured, and the practicability of the method is further improved.
In some examples, before displaying the identification code for implementing the network connection on the first device, the method in this embodiment may further include: an identification code for implementing the network connection is generated.
After the first device acquires the network connection request, in order to enable the first device to display the identification code for implementing the network connection, the identification code for implementing the network connection may be generated based on the network connection request.
In some examples, the identification code may include a service set identifier corresponding to the wireless access point and a networking key randomly generated by the first device, in this case, this embodiment provides a generation manner of the identification code, and specifically, as shown in fig. 3, the generating of the identification code for implementing network connection in this embodiment may include:
step S301: the first device randomly generates a networking key based on the network connection request.
After the first device obtains the network connection request, a networking key may be randomly generated based on the network connection request, and in some examples, after the network connection request is obtained, a keyword extraction operation may be performed on the network connection request to obtain a request keyword, and then the request keyword may be analyzed, so as to randomly generate the networking key. In other examples, a first application program for implementing network connection operation is arranged on the first device, and the identification code is generated through the first application program; at this time, the randomly generating the networking key based on the network connection request may include: the first application program can randomly generate the networking key based on the network connection request, and then the first application program writes the configuration file of the identification code into the network driver of the first device, so that the first device can randomly generate the networking key based on the network connection request.
Step S302: a service set identification corresponding to the wireless access point is determined.
In order to accurately generate the identification code, a service set identifier corresponding to the wireless access point may be determined, where the first device may correspond to a plurality of wireless access points, and a target wireless access point is determined among the plurality of wireless access points, so that the service set identifier corresponding to the target wireless access point may be determined.
In some examples, determining the target wireless access point among the plurality of wireless access points may include: and acquiring the priority corresponding to each wireless access point, and determining the wireless access point with the highest priority as a target wireless access point. In other examples, determining the target wireless access point among the plurality of wireless access points may include: and acquiring network connection frequency corresponding to each wireless access point, and determining the wireless access point with the highest network connection frequency as a target wireless access point. In further examples, determining the target wireless access point among the plurality of wireless access points may include: and acquiring the selection operation input by the user aiming at any wireless access point, and determining the wireless access point corresponding to the selection operation as the target wireless access point.
Step S303: the first device generates an identification code based on the networking key and the service set identification.
After the networking key and the service set identifier are acquired, the networking key and the service set identifier may be analyzed to generate an identifier, where a generation main body of the identifier may be the first device or the first application program set in the first device, and specifically, when the generation main body of the identifier is the first application program, the networking key and the service set identifier may be analyzed after the first application program acquires the networking key and the service set identifier, so that the identifier may be acquired.
In this embodiment, the first device randomly generates a networking key based on the network connection request, then determines a service set identifier corresponding to the wireless access point, and generates an identifier based on the networking key and the service set identifier, thereby effectively realizing that the first device can generate an accurate and effective identifier, where the identifier includes the networking key and the service set identifier.
In other examples, the identification code may include: in this case, this embodiment provides a generation manner of an identification code, and specifically, as shown in fig. 4, the generation of the identification code for implementing network connection in this embodiment may include:
step S401: the first device randomly generates a networking key based on the network connection request.
The implementation manner and the implementation effect of the above steps in this embodiment are similar to the implementation manner and the implementation effect of step S301 in the above embodiment, and the above statements may be specifically referred to, and are not repeated herein.
Step S402: a local area network address corresponding to the first device and a service set identification corresponding to the wireless access point are determined.
Wherein to enable wireless network connection operations, a local area network address corresponding to the first device may be determined, which in some examples may include: the method includes the steps of obtaining an IP address of a first device, and determining a local area network address corresponding to the first device based on the IP address. In other examples, determining the local network address corresponding to the first device may include: geographic location information of the first device is obtained, and a local area network address corresponding to the first device is determined based on the geographic location information.
Step S403: an identification code is generated based on the networking key, the service set identification, and the local area network address.
After the networking key, the service set identifier and the local area network address are obtained, the networking key, the service set identifier and the local area network address can be analyzed and processed to generate an identifier code, wherein a generation main body of the identifier code can be the first device or a first application program arranged in the first device, and when the generation main body of the identifier code is the first application program, the networking key, the service set identifier and the local area network address can be analyzed and processed after the first application program obtains the networking key, the service set identifier and the local area network address, so that the identifier code can be obtained.
It should be noted that the identification code in the present embodiment is different from the identification code in the above embodiment, and the identification code in the above embodiment includes: a service set identifier corresponding to the wireless access point and a networking key randomly generated by the first device, namely the identifier at this moment comprises binary information; the identification code in this embodiment includes: the service set identification corresponding to the wireless access point, the randomly generated networking key of the first device and the local area network address corresponding to the first device, i.e. the identification code at this time comprises triplet information. When the identification code comprising the triple information is used for wireless network connection operation, the wireless access point can acquire the triple information carried by the identification code, and at the moment, the wireless access point can quickly find the equipment information needing to be accessed to the network based on the carried triple information, so that the quality and the efficiency of network connection can be improved; when the identification code comprising the binary information is used for carrying out wireless network connection operation, the wireless access point can acquire the binary information carried by the identification code, at the moment, the wireless access point cannot quickly find the equipment information needing to access the network based on the binary information, therefore, the quality and the efficiency of network connection are low, generally speaking, the quality and the efficiency of the wireless network connection operation carried out by using the identification code comprising the binary information are higher than those of the wireless network connection operation carried out by using the identification code comprising the binary information, and therefore, the identification code can preferably comprise the ternary information.
In this embodiment, the first device randomly generates a networking key based on the network connection request, then determines a local area network address corresponding to the first device and a service set identifier corresponding to the wireless access point, and generates an identification code based on the networking key, the service set identifier and the local area network address, thereby effectively realizing that the first device can generate an accurate and effective identification code, where the identification code includes the networking key, the service set identifier and the local area network address corresponding to the first device, and further improving the quality and efficiency of network connection operation based on the identification code.
Fig. 5 is a schematic flowchart of a process in which the second device scans and identifies the identification code to send information carried by the identification code to the wireless access point according to the embodiment of the present application; referring to fig. 5, in order to further ensure that the first device can safely and stably implement a wireless network connection operation, this embodiment provides an implementation manner for sending information carried by the identification code to the wireless access point, and specifically, the scanning and identifying the identification code by the second device in this embodiment to send the information carried by the identification code to the wireless access point may include:
step S501: and the second equipment scans and identifies the identification code and sends the information carried by the identification code to the server.
Step S502: and the server sends the information carried by the identification code to the wireless access point.
The second device can be in communication connection with the wireless access point through the server, and at the moment, the second device can scan and identify the identification code so as to send information carried by the identification code (a service set identifier corresponding to the wireless access point and a networking key randomly generated by the first device, or the service set identifier corresponding to the wireless access point, the networking key randomly generated by the first device and a local area network address corresponding to the first device) to the server, and after the server acquires the information carried by the identification code, the information carried by the identification code can be sent to the wireless access point, so that the wireless access point can stably acquire the information carried by the identification code.
In this embodiment, the second device scans and identifies the identification code, sends the information carried by the identification code to the server, and then sends the information carried by the identification code to the wireless access point through the server, thereby effectively ensuring that the wireless access point can stably acquire the information carried by the identification code.
In some examples, after sending the information carried by the identification code to the server, as shown in fig. 6, the method in this embodiment may further include:
step S601: the server obtains identity information of the second device.
Step S602: the server authenticates the second device based on the identity information.
Step S603: the server allows the information carried by the identification code to be sent to the wireless access point when the second device is authenticated.
Step S604: and when the second equipment is not authenticated, the server forbids to send the information carried by the identification code to the wireless access point.
In order to ensure the safety and reliability of the transmission of the identification code, after the information carried by the identification code is sent to the server, the server may perform an identity verification operation on the second device, specifically, the server may obtain identity information of the second device, and in some examples, the server may determine the identity of the second device according to the information carried by the obtained identification code, where the identity may be an IP address of the second device. In some examples, the second device may have a second application program disposed thereon, the scanning and identifying the identification code at the second device may include: the second device can scan and recognize the identification code through the second application program, so that information carried by the identification code can be sent to the server through the second application program, at this time, the server can obtain the identity of the second device through the second application program, and the identity of the second device can be user name information configured by the second application program.
After the identity information of the second device is acquired, performing identity authentication on the second device based on the identity information of the second device, specifically, analyzing and comparing the identity information of the second device with a plurality of standard identity information configured in advance, and when the plurality of standard identity information includes a standard identity corresponding to the identity of the second device, indicating that the second device has passed the identity authentication; and when the standard identity information does not comprise the standard identity corresponding to the identity of the second equipment, the second equipment is not authenticated.
When the second device passes the identity authentication, the second device is judged to be a legal device, and then the server can allow the information carried by the identification code to be sent to the wireless access point, so that the wireless access point can acquire the information carried by the identification code, and the first device can be connected with the wireless access point through the randomly generated network key. When the second device fails to be verified, it is indicated that the second device is an illegal device, and in order to ensure the security and reliability of the network connection, the server may prohibit sending the information carried by the identification code to the wireless access point, so that the first device cannot connect the wireless access point through the randomly generated network key.
In still other examples, when the second device fails to verify, then networking failure information may be generated and sent to the second device so that the user may learn the current wireless network connection status through the second device in time.
In the embodiment, after the information carried by the identification code is sent to the server, the server acquires the identity information of the second device, the server performs identity verification on the second device based on the identity information, when the second device passes the verification, the server allows the information carried by the identification code to be sent to the wireless access point, and when the second device does not pass the verification, the server prohibits the information carried by the identification code from being sent to the wireless access point, so that the first device can be accessed to the wireless access point through the second device when the second device is legal; when the second device is an illegal device, the first device is prohibited from accessing the wireless access point through the second device, so that the safety and reliability of the wireless network connection operation are effectively guaranteed.
During specific application, refer to fig. 7, regard as first equipment, mobile terminal as second equipment, the identification code as the two-dimensional code with the PC end, and the identification code includes: SSID, PSK, and MAC triplet information are taken as an example, and the wireless network connection method provided in this application embodiment may include the following steps:
step 1: install first APP on the PC end, can generate SSID and PSK and the two-dimensional code that the MAC address corresponds on the first APP.
Step 2: first APP can with the networking configuration file (wifi configuration file) that the two-dimensional code corresponds send to the PC on, network driver element (wireless network card) on the PC can learn the PSK that generates through first APP.
And step 3: the PC side may try networking operation based on the learned PSK, but because the wireless access point AP does not have the PSK at this time, the PC side fails networking operation and retries the operation all the time.
And 4, step 4: the two-dimensional code is displayed on the PC terminal, the second APP can be arranged on the mobile terminal, the two-dimensional code displayed on the PC terminal is scanned through the second APP, and therefore the mobile terminal can acquire the triple information carried by the two-dimensional code through the second APP.
And 5: the mobile terminal scans and identifies the two-dimensional code, and triple information (SSID, PSK and MAC) carried by the two-dimensional code can be sent to the server.
After the server acquires the triple information, the validity identification operation may be performed on the mobile terminal, specifically, the user name information configured on the second APP by the mobile terminal may be acquired, and the identity identification operation is performed on the mobile terminal through the user name information. It should be noted that a valid user name configured on the second APP by the mobile terminal may implement wireless network connection operations of the plurality of first devices, when the plurality of first devices all display respective two-dimensional code information, the two-dimensional code information displayed on the plurality of first devices is sequentially scanned by one mobile terminal, and if the mobile terminal is a valid terminal, the plurality of first devices may all be connected to the wireless access point through the mobile terminal.
Step 6: when the server identifies that the mobile terminal is a legal terminal, the server can send the triple information to the wireless access point AP, so that the AP can acquire the triple information.
And 7: the PC end and the AP both have triple information, and the PC end can successfully access the AP through the PSK to realize the connection operation of the wireless network.
In addition, the method in this embodiment may further include: the method comprises the steps of obtaining a weblog of a first device, wherein the weblog comprises network access information, network operation information and the like of the first device, and then storing the weblog in a correlation mode with an identity of a second device, so that illegal operation tracing and tracing operations can be achieved through the stored weblog.
In the technical scheme provided by the application embodiment, the Password (PSK) can be automatically generated through the PC terminal, the two-dimensional code comprising the password can be displayed on the PC terminal, then the mobile terminal scans the two-dimensional code, so that the mobile terminal can send the password to the AP through the server, the problem that the password cannot be received because no network exists before the PC terminal is not connected with the network can be avoided, the condition that any operation is input manually by a user is effectively avoided, the two-dimensional code is scanned through the mobile terminal, the PC terminal can be automatically connected to the AP, the quality and the efficiency of network connection are ensured, in addition, as the networking secret key generated by the first equipment for realizing the network connection is contained in the identification code, the networking secret key can be effectively prevented from being leaked, the safety and the reliability of the wireless network connection method are improved, and the quality and the efficiency of data communication are ensured, further improving the practicability of the method.
Fig. 8 is a schematic structural diagram of a wireless network connection system according to an embodiment of the present application; referring to fig. 8, the present embodiment provides a wireless network connection system, which may include: a first device 81 not connected to a wireless access point and a second device 82 already connected to the internet;
a first device 81 for displaying an identification code for implementing a network connection in response to a network connection request, the identification code including: a service set identification and a randomly generated networking key corresponding to the wireless access point;
the second equipment 82 is used for scanning and identifying the identification code so as to send the information carried by the identification code to the wireless access point, and the second equipment 82 is connected with the Internet;
a first device 81 for connecting to a wireless access point through a networking key.
In some instances, the network connection request is generated based on a network connection operation input by the user.
In some instances, the network connection request is generated based on a disconnected network connection state of the first device 81.
In some examples, prior to displaying the identification code for implementing the network connection on the first device 81, the first device 81 is configured to: an identification code for implementing the network connection is generated.
In some examples, when the first device 81 generates an identification code for implementing a network connection, the first device 81 is to: randomly generating a networking secret key based on the network connection request; determining a service set identification corresponding to the wireless access point; an identification code is generated based on the networking key and the service set identification.
In some examples, the identification code further comprises: a local area network address corresponding to the first device 81; when the first device 81 generates an identification code for implementing a network connection, the first device 81 is configured to: randomly generating a networking secret key based on the network connection request; determining a local area network address corresponding to the first device 81 and a service set identification corresponding to the wireless access point; an identification code is generated based on the networking key, the service set identification, and the local area network address.
In some examples, the identification code comprises any one of: bar code, two-dimensional code, three-dimensional code.
In some examples, when the second device 82 scans and identifies the identification code to send the information carried by the identification code to the wireless access point, the second device 82 is configured to: the second device 82 scans and identifies the identification code and sends the information carried by the identification code to the server;
at this time, the server in this embodiment is configured to: and sending the information carried by the identification code to the wireless access point.
In some examples, after sending the information carried by the identification code to the server, the server is configured to: acquiring identity information of the second device 82; authenticating the second device 82 based on the identity information; allowing the information carried by the identification code to be sent to the wireless access point when the second device 82 is authenticated; the transmission of information carried by the identification code to the wireless access point is inhibited when the second device 82 is not authenticated.
The wireless network connection system shown in fig. 8 can execute the method of the embodiment shown in fig. 1-7, and reference may be made to the related description of the embodiment shown in fig. 1-7 for a part not described in detail in this embodiment. The implementation process and technical effect of the technical solution refer to the descriptions in the embodiments shown in fig. 1 to 7, and are not described herein again.
In addition, an embodiment of the present invention provides a computer storage medium for storing computer software instructions for an electronic device, which includes a program for executing the wireless network connection method in the method embodiments shown in fig. 1 to 7.
Furthermore, an embodiment of the present invention provides a computer program product, including: computer program, which, when being executed by a processor of an electronic device, causes the processor to carry out the wireless network connection method in the method embodiments shown in fig. 1-7.
Fig. 9 is a flowchart illustrating a wireless network connection method according to an embodiment of the present application; referring to fig. 9, the present embodiment provides a wireless network connection method, where an execution subject of the wireless network connection method may be a wireless network connection system, and the wireless network connection system may include a live broadcast device and a mobile terminal, where the live broadcast device is not connected to a wireless access point, and the mobile terminal is connected to the internet. It should be noted that the live device and the mobile terminal may be implemented as software or a combination of software and hardware, and when implemented specifically, the live device may include any one of the following: personal Computers (PC), mobile phones, tablet computers, and so on, and the mobile terminal may include any one of the following: the mobile phone, the tablet computer, the wearable device (smart watch, smart glasses) and other devices capable of performing scanning operations. Specifically, the wireless network connection method may include:
step S901: responding to the network connection request, the live broadcast equipment displays an identification code for realizing network connection, wherein the identification code comprises: a service set identifier corresponding to the wireless access point and a networking key randomly generated by the live broadcast equipment, wherein the live broadcast equipment is not connected to the wireless access point;
step S902: the mobile terminal scans and identifies the identification code so as to send the information carried by the identification code to the wireless access point, and the mobile terminal is connected to the Internet;
step S903: the wireless device connects to the wireless access point through the networking key.
In some examples, the identification code further comprises: a local area network address corresponding to a live device; before displaying the identification code for implementing the network connection on the first device, the method further comprises: randomly generating a networking secret key based on the network connection request; determining a local area network address corresponding to the live broadcast equipment and a service set identifier corresponding to the wireless access point; an identification code is generated based on the networking key, the service set identification, and the local area network address.
In a live broadcast scene, live broadcast data is often transmitted to a preset network or a live broadcast service platform by live broadcast equipment, and then distribution operation of the live broadcast data is performed through the preset network or the live broadcast service platform. Specifically, the live broadcast device may send the live broadcast data to a preset network through a corresponding deployment network, so as to obtain a data resource for implementing the live broadcast operation through the preset network. The live broadcast equipment can request live broadcast data from a preset network or a live broadcast service platform through a preset gateway, so that the preset network or the live broadcast service platform can distribute the live broadcast data to a corresponding playing end, and then the corresponding live broadcast data can be played on the playing end. It should be noted that live scenes include, but are not limited to: remote education, live courses, telemedicine and the like in an education scene, and data to be live in different live scenes are different and can have different functional functions.
It should be noted that, in order to enable the live broadcast device to access to the wireless access point, the live broadcast device can display the two-dimensional code for realizing the network connection operation based on the network connection request, then the mobile terminal scans the two-dimensional code, and sends the information carried by the two-dimensional code to the wireless access point through the server, so that the wireless access point can acquire the networking key generated by the live broadcast device, and then the live broadcast device can access to the wireless access point through the networking key, so as to realize the network connection operation. After the live device is connected to the wireless access point, a live network operation can be achieved, specifically, the live device can obtain a live request, the live request in this embodiment may refer to live data sent by the live device or live data requested to be played by a playing end, and the live data corresponding to the live request may include video data, audio data, and the like. After the live broadcast request is generated or obtained, data transmission operation can be performed in a preset network based on the live broadcast request and the IP address corresponding to the live broadcast equipment, so that the live broadcast operation is effectively realized.
In addition, the specific implementation manner and implementation effect of steps S901 to S903 in this embodiment are similar to the implementation manner and implementation effect of steps S101 to S103 in the foregoing embodiment, and specific reference may be made to the above statements, and details are not described here again.
It should be noted that the method in this embodiment may also include the method in the embodiment shown in fig. 2 to 7, and for the part not described in detail in this embodiment, reference may be made to the relevant description of the embodiment shown in fig. 2 to 7. The implementation process and technical effect of the technical solution refer to the descriptions in the embodiments shown in fig. 2 to fig. 7, and are not described herein again.
In the wireless network connection method provided by this embodiment, in response to the obtained network connection request, the live broadcast device can display the identification code for implementing network connection, and then scan and identify the identification code through the mobile terminal, so as to send the information carried by the identification code to the wireless access point, after the wireless access point obtains the information carried by the identification code, the live broadcast device can be connected to the wireless access point through the networking key, thereby effectively implementing the connection of the live broadcast device to the wireless access point quickly and accurately without any operation manually input by a user through the mobile terminal by scanning and identifying the identification code through the mobile terminal, and ensuring the quality and efficiency of network connection, in addition, because the networking key for implementing network connection generated by the live broadcast device is included in the identification code, thereby effectively preventing the networking key from being leaked, the safety and reliability of the wireless network connection method are improved, the quality and efficiency of data communication are ensured, and the practicability of the method is further improved.
Fig. 10 is a flowchart illustrating a wireless network connection method according to an embodiment of the present application; referring to fig. 10, the present embodiment provides a wireless network connection method, and the execution subject of the wireless network connection method may be a wireless network connection system, and the wireless network connection system may include a vehicle-mounted device and a mobile terminal, the vehicle-mounted device is not connected to a wireless access point, and the mobile terminal is connected to the internet. It should be noted that the vehicle-mounted device and the mobile terminal may be implemented as software or a combination of software and hardware, and when implemented specifically, the vehicle-mounted device may be any device that is installed on a vehicle and is capable of connecting to a network, and the mobile terminal may include any one of the following: the mobile phone, the tablet computer, the wearable device (smart watch, smart glasses) and other devices capable of performing scanning operations. Specifically, the wireless network connection method may include:
step S1001: in response to the network connection request, the in-vehicle device displays an identification code for implementing the network connection, the identification code including: a service set identifier corresponding to the wireless access point and a networking key randomly generated by the vehicle-mounted equipment, wherein the vehicle-mounted equipment is not connected to the wireless access point;
step S1002: the mobile terminal scans and identifies the identification code so as to send the information carried by the identification code to the wireless access point, and the mobile terminal is connected to the Internet;
step S1003: the wireless device connects to the wireless access point through the networking key.
The vehicle-mounted device can be a vehicle control device, and in the running process of the vehicle, in order to accurately and effectively control the vehicle, the vehicle-mounted device can be controlled to be connected to the wireless access point firstly, and after the vehicle-mounted device is connected to the wireless access point, the vehicle can be controlled through the vehicle-mounted device. Specifically, the vehicle-mounted device may acquire a vehicle control request corresponding to the vehicle, where the vehicle control request may include operating state data and an IP address corresponding to the vehicle, and in some examples, the vehicle may be provided with a sensor, and the operating state data corresponding to the vehicle may be acquired through the sensor, and the operating state data corresponding to the vehicle may include at least one of: the vehicle driving method comprises the steps of obtaining the current vehicle speed, the driving direction and the environment information of a vehicle, wherein the environment information comprises the distribution position of surrounding objects, the vehicle speed of the vehicle in front of the vehicle and the road speed limit of the road where the vehicle is located. In some examples, the sensors may include an image capture sensor, a radar sensor, and a global positioning system GPS, and in particular, the operating condition data corresponding to the vehicle may be determined by the image capture sensor, the radar sensor, and the global positioning system GPS.
After the vehicle control request is acquired, the driving path planning information may be determined based on the vehicle control request, specifically, the vehicle control request may be sent to a server of a preset network to determine and provide a vehicle control resource corresponding to the vehicle control request through the server, and then the vehicle control request may be analyzed based on the vehicle control resource to determine the driving path planning information corresponding to the vehicle control request, so that the driving path planning information corresponding to the vehicle control request may be obtained. Alternatively, a machine learning model for analyzing the running state data is previously configured, and the machine learning model is trained to determine driving path planning information corresponding to the vehicle. After the vehicle control request is acquired, the vehicle control request may be input to the machine learning model, so that driving path planning information corresponding to the vehicle control request may be obtained.
After the driving path planning information is acquired, the vehicle can be controlled based on the driving path planning information, so that the control operation of the vehicle is effectively realized. It is to be noted that, as for the in-vehicle apparatus, the in-vehicle apparatus may be provided on the vehicle, or the in-vehicle apparatus may be provided independently of the vehicle, in which case the in-vehicle apparatus may be communicatively connected to the vehicle CPU.
In addition, when the vehicle-mounted device is a vehicle control device, the vehicle control device can be adjusted according to different vehicles, that is, algorithm modules included in the vehicle control device are different according to different vehicle types, and in this case, the vehicle control device can implement not only control operation of automatic driving of the vehicle, but also other operation. For example, different vehicle control devices may be involved for a logistics vehicle, a public service vehicle, a medical service vehicle, and a terminal service vehicle. Algorithm modules included in the vehicle control device are exemplified below for the four kinds of autonomous vehicles, respectively:
wherein, the logistics vehicle refers to the vehicle that uses in the logistics scene, for example: the logistics vehicle with the automatic sorting function, the refrigeration and heat preservation function and the measurement function can be used. These logistics vehicles may involve different algorithm modules.
For example, the logistics vehicles can be provided with an automatic sorting device, and the automatic sorting device can automatically take out, convey, sort and store the goods after the logistics vehicles reach the destination. This relates to an algorithm module for goods sorting, which mainly implements logic control of goods taking out, carrying, sorting, storing and the like.
For another example, in a cold chain logistics scenario, the logistics vehicle may further include a refrigeration and insulation device, and the refrigeration and insulation device may implement refrigeration or insulation of transported fruits, vegetables, aquatic products, frozen foods, and other perishable foods, so that the transportation environment is in a proper temperature environment, and the long-distance transportation problem of perishable foods is solved. The algorithm module is mainly used for dynamically and adaptively calculating the proper temperature of cold meal or heat preservation according to the information such as the property, the perishability, the transportation time, the current season, the climate and the like of food (or articles), and automatically adjusting the cold-storage heat preservation device according to the proper temperature, so that a transport worker does not need to manually adjust the temperature when the vehicle transports different foods or articles, the transport worker is liberated from the complicated temperature regulation and control, and the efficiency of cold-storage heat preservation transportation is improved.
For another example, in most logistics scenarios, the fee is charged according to the volume and/or weight of the parcel, but the number of logistics parcels is very large, and the measurement of the volume and/or weight of the parcel by a courier is only dependent, which is very inefficient and has high labor cost. Therefore, in some logistics vehicles, a measuring device is added, so that the volume and/or the weight of the logistics packages can be automatically measured, and the cost of the logistics packages can be calculated. This relates to an algorithm module for logistics package measurement, which is mainly used to identify the type of logistics package, determine the measurement mode of logistics package, such as volume measurement or weight measurement or combined measurement of volume and weight, and can complete the measurement of volume and/or weight according to the determined measurement mode and complete the cost calculation according to the measurement result.
The public service vehicle refers to a vehicle providing some public service, for example: can be a fire truck, an ice removing vehicle, a watering cart, a snow shoveling vehicle, a garbage disposal vehicle, a traffic guidance vehicle and the like. These public service vehicles may involve different algorithm modules.
For example, in the case of an automatically driven fire fighting vehicle, the main task is to perform a reasonable fire fighting task on the fire scene, which involves an algorithm module for the fire fighting task, which at least needs to implement logic such as identification of the fire situation, planning of the fire fighting scheme, and automatic control of the fire fighting device.
For another example, for an ice removing vehicle, the main task is to remove ice and snow on the road surface, which involves an algorithm module for ice removal, the algorithm module at least needs to realize the recognition of the ice and snow condition on the road surface, formulate an ice removal scheme according to the ice and snow condition, such as which road sections need to be deiced, which road sections need not to be deiced, whether a salt spreading manner, the salt spreading gram number, and the like are adopted, and the logic of automatic control of a deicing device under the condition of determining the ice removal scheme.
The medical service vehicle is an automatic driving vehicle capable of providing one or more medical services, the vehicle can provide medical services such as disinfection, temperature measurement, dispensing and isolation, and the algorithm modules relate to algorithm modules for providing various self-service medical services.
The terminal service vehicle is a self-service automatic driving vehicle which can replace some terminal devices and provide certain convenient service for users, and for example, the vehicles can provide services such as printing, attendance checking, scanning, unlocking, payment and retail for the users.
For example, in some application scenarios, a user often needs to go to a specific location to print or scan a document, which is time consuming and labor intensive. Therefore, a terminal service vehicle capable of providing printing/scanning service for a user appears, the service vehicles can be interconnected with user terminal equipment, the user sends a printing instruction through the terminal equipment, the service vehicle responds to the printing instruction, documents required by the user are automatically printed, the printed documents can be automatically sent to the position of the user, the user does not need to queue at a printer, and the printing efficiency can be greatly improved. Or, the scanning instruction sent by the user through the terminal equipment can be responded, the scanning vehicle is moved to the position of the user, the user places the document to be scanned on the scanning tool of the service vehicle to complete scanning, queuing at the printer/scanner is not needed, and time and labor are saved. This involves an algorithm module providing print/scan services that needs to identify at least the interconnection with the user terminal equipment, the response to print/scan instructions, the positioning of the user's location, and travel control.
For another example, as new retail scenes are developed, more and more electronic stores sell goods to large office buildings and public areas by means of self-service vending machines, but the self-service vending machines are placed at fixed positions and are not movable, and users need to go by the self-service vending machines to purchase needed goods, so that the convenience is poor. Therefore, self-service driving vehicles capable of providing retail services appear, the service vehicles can carry commodities to move automatically and can provide corresponding self-service shopping APP or shopping entrances, a user can place an order for the self-service driving vehicles providing retail services through the APP or shopping entrances by means of a terminal such as a mobile phone, the order comprises names and numbers of commodities to be purchased, and after the vehicle receives an order placement request, whether the current remaining commodities have the commodities purchased by the user and whether the quantity is sufficient can be determined. This involves algorithm modules that provide retail services that implement logic primarily to respond to customer order requests, order processing, merchandise information maintenance, customer location, payment management, etc.
It should be noted that the method in this embodiment may also include the method in the embodiment shown in fig. 2 to 7, and for the part not described in detail in this embodiment, reference may be made to the relevant description of the embodiment shown in fig. 2 to 7. The implementation process and technical effect of the technical solution refer to the descriptions in the embodiments shown in fig. 2 to fig. 7, and are not described herein again.
The wireless network connection method provided by the embodiment effectively realizes that the vehicle-mounted equipment can access the wireless access point through the mobile terminal to realize network connection operation, and then can effectively control the vehicle through the vehicle-mounted equipment which has accessed the wireless access point, so that the convenience of controlling the vehicle is improved, the good experience of a user is ensured, and the practicability of the method is further improved.
Fig. 11 is a schematic structural diagram of a wireless network connection system according to an embodiment of the present application; referring to fig. 11, the present embodiment provides a wireless network connection system, which may include: a live device 1101 not connected to a wireless access point and a mobile terminal 1102 already connected to the internet;
a live device 1101 configured to display an identification code for implementing a network connection in response to the network connection request, the identification code including: a service set identification and a randomly generated networking key corresponding to the wireless access point;
the mobile terminal 1102 is used for scanning and identifying the identification code so as to send information carried by the identification code to the wireless access point, and the mobile terminal 1102 is connected with the internet;
a live device 1101 for connecting to a wireless access point through a networking key.
In some examples, the identification code further comprises: a local area network address corresponding to the live device 1101; before displaying the identification code for enabling the network connection on the first device, the live device 1101 is further configured to perform the following steps: randomly generating a networking secret key based on the network connection request; determining a local area network address corresponding to the live device 1101 and a service set identification corresponding to the wireless access point; an identification code is generated based on the networking key, the service set identification, and the local area network address.
The wireless network connection system shown in fig. 11 can execute the method of the embodiment shown in fig. 9, and reference may be made to the related description of the embodiment shown in fig. 9 for a part not described in detail in this embodiment. The implementation process and technical effect of the technical solution are described in the embodiment shown in fig. 9, and are not described herein again.
In addition, an embodiment of the present invention provides a computer storage medium for storing computer software instructions for an electronic device, which includes a program for executing the wireless network connection method in the method embodiment shown in fig. 9.
Furthermore, an embodiment of the present invention provides a computer program product, including: a computer program which, when executed by a processor of an electronic device, causes the processor to perform the wireless network connection method in the method embodiment shown in fig. 9.
Fig. 12 is a schematic structural diagram of a wireless network connection system according to an embodiment of the present application; referring to fig. 12, the present embodiment provides a wireless network connection system, which may include: an in-vehicle device 1201 not connected to a wireless access point and a mobile terminal 1202 already connected to the internet;
an in-vehicle device 1201 for displaying an identification code for realizing network connection in response to a network connection request, the identification code including: a service set identification and a randomly generated networking key corresponding to the wireless access point;
the mobile terminal 1202 is used for scanning and identifying the identification code so as to send the information carried by the identification code to the wireless access point, and the mobile terminal 1202 is connected with the internet;
and an in-vehicle device 1201 for connecting to the wireless access point through the networking key.
In some examples, the identification code further comprises: a local area network address corresponding to the in-vehicle device 1201; before the identification code for realizing the network connection is displayed on the first device, the in-vehicle device 1201 is further configured to perform the steps of: randomly generating a networking secret key based on the network connection request; determining a local area network address corresponding to the vehicle-mounted device 1201 and a service set identifier corresponding to the wireless access point; an identification code is generated based on the networking key, the service set identification, and the local area network address.
The wireless network connection system shown in fig. 12 can execute the method of the embodiment shown in fig. 10, and reference may be made to the related description of the embodiment shown in fig. 10 for a part not described in detail in this embodiment. The implementation process and technical effect of the technical solution are described in the embodiment shown in fig. 10, and are not described herein again.
In addition, an embodiment of the present invention provides a computer storage medium for storing computer software instructions for an electronic device, which includes a program for executing the wireless network connection method in the method embodiment shown in fig. 10.
Furthermore, an embodiment of the present invention provides a computer program product, including: the computer program, when executed by a processor of the electronic device, causes the processor to perform the wireless network connection method in the method embodiment shown in fig. 10.
Fig. 13 is a flowchart illustrating a wireless network connection method according to an embodiment of the present application; referring to fig. 13, this embodiment provides a wireless network connection method, and in particular, an execution subject of the method may be a wireless network connection apparatus, and the wireless network connection apparatus may be implemented as software, or as a combination of software and hardware, and in some examples, the wireless network connection method may be applied to a first device that is not connected to a wireless access point, that is, the wireless network connection apparatus may be implemented as the first device, and at this time, the wireless network connection method in this embodiment may include:
step S1301: and acquiring the network connection request.
Step S1302: generating an identification code for implementing the network connection based on the network connection request, wherein the identification code comprises: a service set identification corresponding to the wireless access point and a randomly generated networking key of the first device.
Step S1303: and displaying the identification code so as to send the information carried by the identification code to the wireless access point through the second equipment.
Step S1304: the wireless access point is accessed through the networking key.
In some examples, when the first device generates an identification code for implementing the network connection, the first device is to: randomly generating a networking secret key based on the network connection request; determining a service set identification corresponding to the wireless access point; an identification code is generated based on the networking key and the service set identification.
In some examples, the identification code further comprises: a local area network address corresponding to the first device; when a first device generates an identification code for implementing a network connection, the first device is configured to: randomly generating a networking secret key based on the network connection request; determining a local area network address corresponding to the first device and a service set identification corresponding to the wireless access point; an identification code is generated based on the networking key, the service set identification, and the local area network address.
In some examples, the identification code comprises any one of: bar code, two-dimensional code, three-dimensional code.
The implementation process and the implementation effect of the above steps in this embodiment are similar to the implementation process and the implementation effect of the execution step of the first device in the embodiment corresponding to fig. 1 to fig. 7, and specific reference may be made to the above statements, and details are not repeated here.
Fig. 14 is a flowchart illustrating a wireless network connection method according to another embodiment of the present application; referring to fig. 14, this embodiment provides another wireless network connection method, specifically, an execution subject of the method may be a wireless network connection apparatus, and the wireless network connection apparatus may be implemented as software, or as a combination of software and hardware, and in some examples, the wireless network connection method may be applied to a second device that is already connected to the internet, that is, the wireless network connection apparatus may be implemented as the second device, and at this time, the wireless network connection method in this embodiment may include:
step S1401: scanning and identifying an identification code displayed on a first device, wherein the first device is not connected to a wireless access point, and the identification code comprises: a service set identification corresponding to the wireless access point and a randomly generated networking key of the first device.
Step S1402: and sending the information carried by the identification code to the wireless access point.
The implementation process and the implementation effect of the above steps in this embodiment are similar to the implementation process and the implementation effect of the execution step of the second device in the embodiment corresponding to fig. 1 to fig. 7, and specific reference may be made to the above statements, and details are not repeated here.
Fig. 15 is a schematic structural diagram of a wireless network connection device according to an embodiment of the present application; referring to fig. 15, the present embodiment provides a wireless network connection apparatus for performing the wireless network connection method shown in fig. 13, and in particular, the wireless network connection apparatus may be applied to a first device that is not connected to a wireless access point, that is, the wireless network connection apparatus may be implemented as the first device, and in this case, the wireless network connection apparatus may include:
a first obtaining module 1501 is configured to obtain the network connection request.
A first generating module 1502, configured to generate, based on the network connection request, an identification code for implementing the network connection, where the identification code includes: a service set identification corresponding to the wireless access point and a randomly generated networking key of the first device.
A first display module 1503, configured to display the identification code, so as to send, by the second device, information carried by the identification code to the wireless access point.
A first processing module 1504 for accessing a wireless access point through a networking key.
In some examples, when the first generation module 1502 generates an identification code for implementing a network connection, the first generation module 1502 is to: randomly generating a networking secret key based on the network connection request; determining a service set identification corresponding to the wireless access point; an identification code is generated based on the networking key and the service set identification.
In some examples, the identification code further comprises: a local area network address corresponding to the first device; when the first generation module 1502 generates an identification code for implementing a network connection, the first generation module 1502 is configured to: randomly generating a networking secret key based on the network connection request; determining a local area network address corresponding to the first device and a service set identification corresponding to the wireless access point; an identification code is generated based on the networking key, the service set identification, and the local area network address.
In some examples, the identification code comprises any one of: bar code, two-dimensional code, three-dimensional code.
The wireless network connection device shown in fig. 15 can execute the method of the embodiment shown in fig. 13, and reference may be made to the related description of the embodiment shown in fig. 13 for a part not described in detail in this embodiment. The implementation process and technical effect of the technical solution refer to the description in the embodiment shown in fig. 13, and are not described herein again.
In one possible design, the structure of the wireless network connection apparatus shown in fig. 15 may be implemented as an electronic device, which may be a Personal Computer (PC), a printer, an air conditioner, a television, a mobile phone, a tablet Computer, a wearable device, and other devices capable of connecting to a wireless access point. As shown in fig. 16, the electronic device may include: a first processor 1601 and a first memory 1602. Wherein the first memory 1602 is used for storing programs for executing the wireless network connection method provided in the embodiment shown in fig. 13, and the first processor 1601 is configured to execute the programs stored in the first memory 1602.
The program includes one or more computer instructions, where the one or more computer instructions, when executed by the first processor 1601, enable the following steps to be performed: and acquiring the network connection request. Generating an identification code for implementing the network connection based on the network connection request, wherein the identification code comprises: a service set identification corresponding to the wireless access point and a randomly generated networking key of the first device. And displaying the identification code so as to send the information carried by the identification code to the wireless access point through the second equipment. The wireless access point is accessed through the networking key.
Further, the first processor 1601 is further configured to perform all or part of the steps in the embodiment shown in fig. 13.
The electronic device may further include a first communication interface 1603 for the electronic device to communicate with other devices or a communication network.
In addition, an embodiment of the present invention provides a computer storage medium for storing computer software instructions for an electronic device, which includes a program for executing the wireless network connection method in the method embodiment shown in fig. 13.
Furthermore, an embodiment of the present invention provides a computer program product, including: a computer program which, when executed by a processor of an electronic device, causes the processor to perform the wireless network connection method in the method embodiment shown in fig. 13.
Fig. 17 is a schematic structural diagram of another wireless network connection device according to an embodiment of the present application; referring to fig. 17, the present embodiment provides another wireless network connection apparatus for performing the wireless network connection method shown in fig. 15, and in particular, the wireless network connection apparatus may be applied to a second device that is connected to the internet, that is, the wireless network connection apparatus may be implemented as the second device, and in this case, the wireless network connection apparatus may include:
a second processing module 1701, configured to scan and recognize an identification code displayed on a first device, where the first device is not connected to the wireless access point, and the identification code includes: a service set identification corresponding to the wireless access point and a randomly generated networking key of the first device.
A second sending module 1702, configured to send the information carried by the identification code to the wireless access point.
The wireless network connection device shown in fig. 17 can execute the method of the embodiment shown in fig. 14, and reference may be made to the related description of the embodiment shown in fig. 14 for a part not described in detail in this embodiment. The implementation process and technical effect of this technical solution are described in the embodiment shown in fig. 14, and are not described herein again.
In one possible design, the structure of the wireless network connection device shown in fig. 17 may be implemented as an electronic device. As shown in fig. 18, the electronic device may include: a second processor 1801 and a second memory 1802. Wherein the second memory 1802 is used for storing a program for the corresponding electronic device to perform the wireless network connection method provided in the embodiment shown in fig. 14, and the second processor 1801 is configured to execute the program stored in the second memory 1802.
The program includes one or more computer instructions, wherein the one or more computer instructions, when executed by the second processor 1801, enable the following steps to be performed: scanning and identifying an identification code displayed on a first device, wherein the first device is not connected to a wireless access point, and the identification code comprises: a service set identification corresponding to the wireless access point and a randomly generated networking key of the first device; and sending the information carried by the identification code to the wireless access point.
Further, the second processor 1801 is also configured to perform all or part of the steps in the embodiment shown in fig. 14. The electronic device may further include a second communication interface 1803, configured to communicate with another device or a communication network.
In addition, an embodiment of the present invention provides a computer storage medium for storing computer software instructions for an electronic device, which includes a program for executing the wireless network connection method in the method embodiment shown in fig. 14.
Furthermore, an embodiment of the present invention provides a computer program product, including: a computer program which, when executed by a processor of an electronic device, causes the processor to perform the wireless network connection method in the method embodiment shown in fig. 14.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by adding a necessary general hardware platform, and of course, can also be implemented by a combination of hardware and software. With this understanding in mind, the above-described technical solutions and/or portions thereof that contribute to the prior art may be embodied in the form of a computer program product, which may be embodied on one or more computer-usable storage media having computer-usable program code embodied therein (including but not limited to disk storage, CD-ROM, optical storage, etc.).
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

Claims (12)

1. A wireless networking method, comprising:
in response to the network connection request, the first device displays an identification code for implementing the network connection, the identification code including: a service set identification corresponding to a wireless access point and a randomly generated networking key of the first device, the first device not connected to a wireless access point;
the second equipment scans and identifies the identification code so as to send the information carried by the identification code to the wireless access point, wherein the second equipment is connected to the Internet;
the first device connects to the wireless access point through the networking key.
2. The method of claim 1, wherein prior to displaying an identification code for implementing the network connection on the first device, the method further comprises:
an identification code for implementing the network connection is generated.
3. The method of claim 2, wherein generating an identification code for implementing the network connection comprises:
the first device randomly generates the networking key based on the network connection request;
determining a service set identification corresponding to the wireless access point;
the first device generates the identification code based on the networking key and the service set identification.
4. The method of claim 2, wherein the identification code further comprises: a local area network address corresponding to the first device; generating an identification code for implementing a network connection, comprising:
the first device randomly generates the networking key based on the network connection request;
determining a local area network address corresponding to the first device and a service set identification corresponding to the wireless access point;
generating the identification code based on the networking key, the service set identification, and the local area network address.
5. The method according to any one of claims 1-4, wherein the identification code comprises any one of: bar code, two-dimensional code, three-dimensional code.
6. The method of claim 1, wherein the second device performs scanning recognition on the identification code to send information carried by the identification code to the wireless access point, and comprises:
the second equipment scans and identifies the identification code and sends information carried by the identification code to a server;
and the server sends the information carried by the identification code to the wireless access point.
7. The method of claim 6, wherein after sending the information carried by the identification code to a server, the method further comprises:
the server acquires identity information of the second equipment;
the server authenticates the second device based on the identity information;
when the second equipment passes the verification, the server allows the information carried by the identification code to be sent to a wireless access point;
and when the second equipment is not verified, the server prohibits sending the information carried by the identification code to the wireless access point.
8. A wireless networking method, comprising:
responding to the network connection request, the live broadcast equipment displays an identification code for realizing network connection, wherein the identification code comprises: a service set identification corresponding to a wireless access point and a networking key randomly generated by the live device, wherein the live device is not connected to the wireless access point;
the mobile terminal scans and identifies the identification code so as to send information carried by the identification code to the wireless access point, wherein the mobile terminal is connected to the Internet;
the wireless device connects to the wireless access point through the networking key.
9. The method of claim 8, wherein the identification code further comprises: a local area network address corresponding to the live device; before displaying the identification code for implementing the network connection on the first device, the method further comprises:
randomly generating the networking key based on the network connection request;
determining a local area network address corresponding to the live broadcast device and a service set identifier corresponding to the wireless access point;
generating the identification code based on the networking key, the service set identification, and the local area network address.
10. A wireless network connection method applied to a first device not connected to a wireless access point, the method comprising:
acquiring a network connection request;
generating an identification code for implementing network connection based on the network connection request, wherein the identification code comprises: a service set identification corresponding to a wireless access point and a randomly generated networking key of the first device;
displaying the identification code so as to send information carried by the identification code to a wireless access point through second equipment;
and accessing the wireless access point through the networking key.
11. A wireless network connection method applied to a second device connected to the internet, the method comprising:
scanning and identifying an identification code displayed on a first device, wherein the first device is not connected to a wireless access point, and the identification code comprises: a service set identification corresponding to a wireless access point and a randomly generated networking key of the first device;
and sending the information carried by the identification code to the wireless access point.
12. A wireless networking system, comprising: a first device not connected to the wireless access point and a second device already connected to the internet;
the first device is used for responding to the network connection request and displaying an identification code for realizing the network connection, wherein the identification code comprises: a service set identification and a randomly generated networking key corresponding to the wireless access point;
the second device is used for scanning and identifying the identification code so as to send the information carried by the identification code to the wireless access point, and the second device is connected with the Internet;
the first device is configured to connect to the wireless access point through the networking key.
CN202111406713.4A 2021-11-24 2021-11-24 Wireless network connection method, device and system Active CN114189861B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111406713.4A CN114189861B (en) 2021-11-24 2021-11-24 Wireless network connection method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111406713.4A CN114189861B (en) 2021-11-24 2021-11-24 Wireless network connection method, device and system

Publications (2)

Publication Number Publication Date
CN114189861A true CN114189861A (en) 2022-03-15
CN114189861B CN114189861B (en) 2023-10-20

Family

ID=80541463

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111406713.4A Active CN114189861B (en) 2021-11-24 2021-11-24 Wireless network connection method, device and system

Country Status (1)

Country Link
CN (1) CN114189861B (en)

Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103037538A (en) * 2012-12-17 2013-04-10 广州市动景计算机科技有限公司 Data transmission method and mobile terminal
CN103458408A (en) * 2013-08-19 2013-12-18 小米科技有限责任公司 Network connection method and network sharing method and device
US20140282924A1 (en) * 2013-03-14 2014-09-18 Samsung Electronics Co., Ltd Application connection for devices in a network
CN104244245A (en) * 2014-09-12 2014-12-24 普联技术有限公司 Wireless access authentication method, wireless router device and wireless terminal
WO2015165370A1 (en) * 2014-04-28 2015-11-05 Tencent Technology (Shenzhen) Company Limited Network connection method and user equipment
WO2015188756A1 (en) * 2014-06-11 2015-12-17 Tencent Technology (Shenzhen) Company Limited Wireless network access method and apparatus, terminal, and server
CN105430643A (en) * 2015-10-28 2016-03-23 广州美渠信息科技有限公司 Method and apparatus for establishing control connection according to information of quick response codes
CN106375166A (en) * 2016-09-30 2017-02-01 无锡小天鹅股份有限公司 Network allocation method, device and system for household electrical appliance and intelligent router
CN106412907A (en) * 2016-09-14 2017-02-15 广东欧珀移动通信有限公司 Network access methods and system, and related devices
CN106412685A (en) * 2016-09-19 2017-02-15 南京创维信息技术研究院有限公司 Wireless network connection method based on smart television and smart television
US20170223536A1 (en) * 2014-09-30 2017-08-03 Hewlett Packard Enterprise Development Lp Advertising multiple service set identifiers
CN107094294A (en) * 2016-02-18 2017-08-25 腾讯科技(深圳)有限公司 Method for connecting network and device
US20170374692A1 (en) * 2016-06-23 2017-12-28 Solutioninc Limited Configuration of access points in a communication network
CN108307529A (en) * 2016-09-26 2018-07-20 宇龙计算机通信科技(深圳)有限公司 A kind of hotspot connection method and its mobile terminal
CN109548018A (en) * 2019-01-11 2019-03-29 腾讯科技(深圳)有限公司 Wireless network access method, device, equipment and system
CN110505629A (en) * 2019-08-12 2019-11-26 珠海格力电器股份有限公司 A kind of networking method and system of household electrical appliances
US20200169886A1 (en) * 2018-11-23 2020-05-28 Samsung Eletrônica da Amazônia Ltda. Secure method for configuring internet of things (iot) devices through wireless technologies
CN111511043A (en) * 2020-04-14 2020-08-07 腾讯科技(深圳)有限公司 Network connection method, device, electronic equipment and storage medium
CN111629376A (en) * 2019-02-28 2020-09-04 阿里巴巴集团控股有限公司 Information display method, device, equipment and system
CN111683370A (en) * 2019-03-11 2020-09-18 腾讯科技(深圳)有限公司 Access authentication method, device and system of wireless network equipment
CN112600820A (en) * 2020-12-09 2021-04-02 腾讯科技(深圳)有限公司 Network connection method, device, computer equipment and storage medium
CN113489630A (en) * 2021-06-09 2021-10-08 深圳Tcl新技术有限公司 Network distribution method, device, storage medium and electronic terminal

Patent Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103037538A (en) * 2012-12-17 2013-04-10 广州市动景计算机科技有限公司 Data transmission method and mobile terminal
US20140282924A1 (en) * 2013-03-14 2014-09-18 Samsung Electronics Co., Ltd Application connection for devices in a network
CN103458408A (en) * 2013-08-19 2013-12-18 小米科技有限责任公司 Network connection method and network sharing method and device
WO2015165370A1 (en) * 2014-04-28 2015-11-05 Tencent Technology (Shenzhen) Company Limited Network connection method and user equipment
WO2015188756A1 (en) * 2014-06-11 2015-12-17 Tencent Technology (Shenzhen) Company Limited Wireless network access method and apparatus, terminal, and server
CN104244245A (en) * 2014-09-12 2014-12-24 普联技术有限公司 Wireless access authentication method, wireless router device and wireless terminal
US20170223536A1 (en) * 2014-09-30 2017-08-03 Hewlett Packard Enterprise Development Lp Advertising multiple service set identifiers
CN105430643A (en) * 2015-10-28 2016-03-23 广州美渠信息科技有限公司 Method and apparatus for establishing control connection according to information of quick response codes
CN107094294A (en) * 2016-02-18 2017-08-25 腾讯科技(深圳)有限公司 Method for connecting network and device
US20170374692A1 (en) * 2016-06-23 2017-12-28 Solutioninc Limited Configuration of access points in a communication network
CN106412907A (en) * 2016-09-14 2017-02-15 广东欧珀移动通信有限公司 Network access methods and system, and related devices
CN106412685A (en) * 2016-09-19 2017-02-15 南京创维信息技术研究院有限公司 Wireless network connection method based on smart television and smart television
CN108307529A (en) * 2016-09-26 2018-07-20 宇龙计算机通信科技(深圳)有限公司 A kind of hotspot connection method and its mobile terminal
CN106375166A (en) * 2016-09-30 2017-02-01 无锡小天鹅股份有限公司 Network allocation method, device and system for household electrical appliance and intelligent router
US20200169886A1 (en) * 2018-11-23 2020-05-28 Samsung Eletrônica da Amazônia Ltda. Secure method for configuring internet of things (iot) devices through wireless technologies
CN109548018A (en) * 2019-01-11 2019-03-29 腾讯科技(深圳)有限公司 Wireless network access method, device, equipment and system
CN111629376A (en) * 2019-02-28 2020-09-04 阿里巴巴集团控股有限公司 Information display method, device, equipment and system
CN111683370A (en) * 2019-03-11 2020-09-18 腾讯科技(深圳)有限公司 Access authentication method, device and system of wireless network equipment
CN110505629A (en) * 2019-08-12 2019-11-26 珠海格力电器股份有限公司 A kind of networking method and system of household electrical appliances
CN111511043A (en) * 2020-04-14 2020-08-07 腾讯科技(深圳)有限公司 Network connection method, device, electronic equipment and storage medium
CN112600820A (en) * 2020-12-09 2021-04-02 腾讯科技(深圳)有限公司 Network connection method, device, computer equipment and storage medium
CN113489630A (en) * 2021-06-09 2021-10-08 深圳Tcl新技术有限公司 Network distribution method, device, storage medium and electronic terminal

Also Published As

Publication number Publication date
CN114189861B (en) 2023-10-20

Similar Documents

Publication Publication Date Title
US11212100B2 (en) Systems and methods of providing and electronically validating tickets and tokens
US10908620B2 (en) Authorizing drone access to fulfillment centers
CN105847282B (en) Vehicle control method, server and system
US20190069179A1 (en) Authorized access to vehicle data
US10127746B2 (en) Systems and methods for electronic ticket validation using proximity detection for two or more tickets
US20180165971A1 (en) Flight Control Method And Apparatus, Flight Clearance Method, Flight Safety Maintenance Method And Apparatus, Server, And Aerial Vehicle
US9852392B2 (en) 3D model and beacon for automatic delivery of goods
US20160086391A1 (en) Fleetwide vehicle telematics systems and methods
SA519400979B1 (en) Activity-Triggered Provisioning of Portable Wireless Networks
WO2023151500A1 (en) Wireless communication method, gateway, device, and system
US20150213660A1 (en) Systems and Methods for Electronic Ticket Validation Using Proximity Detection
WO2016022329A1 (en) Short-range device communications for secured resource access
US20180035248A1 (en) Activity-triggered provisioning of portable wireless networks
CN109983487A (en) To the article delivery of unattended vehicle
CN113452811B (en) Data communication method, device, computer storage medium and system
CN108733992B (en) Processing method and system of electronic equipment
CN113825225B (en) Roaming registration method, AMF network element, equipment and system of private network
CN108650220A (en) Provide, obtain method, the equipment of mobile terminal certificate and automobile end chip certificate
CN109831910A (en) Haulage vehicle information management system and method
CN115002811A (en) Private network control method, data processing method, equipment control method and equipment
US9392409B2 (en) Method and system for wireless local area network proximity recognition
EP4372633A1 (en) Recycling information management method and device therefor
CN114189861B (en) Wireless network connection method, device and system
KR20200033514A (en) Vehicle accident video sharing method and apparatus
WO2018213198A1 (en) Systems and methods of providing and electronically validating tickets and tokens

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant