CN116887444A - Device connection method, system, electronic device, and computer-readable storage medium - Google Patents

Device connection method, system, electronic device, and computer-readable storage medium Download PDF

Info

Publication number
CN116887444A
CN116887444A CN202310973592.4A CN202310973592A CN116887444A CN 116887444 A CN116887444 A CN 116887444A CN 202310973592 A CN202310973592 A CN 202310973592A CN 116887444 A CN116887444 A CN 116887444A
Authority
CN
China
Prior art keywords
server
connection
connection request
data
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310973592.4A
Other languages
Chinese (zh)
Inventor
林英辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xiaopai Technology Co ltd
Original Assignee
Shenzhen Xiaopai Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Xiaopai Technology Co ltd filed Critical Shenzhen Xiaopai Technology Co ltd
Priority to CN202310973592.4A priority Critical patent/CN116887444A/en
Publication of CN116887444A publication Critical patent/CN116887444A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application is applied to the technical field of communication, and discloses a device connection method, a system, electronic equipment and a computer readable storage medium, wherein the device connection method comprises the following steps: after the server side enters a hot spot hiding mode, receiving a connection request sent by the client side; judging whether private data exists in the connection request or not; and if the private data exists in the connection request, feeding back connection response data to the client side sending the connection request, wherein the connection response data comprises the hot spot name of the server side. The application aims to solve the technical problem of unstable connection between the client and the server.

Description

Device connection method, system, electronic device, and computer-readable storage medium
Technical Field
The application belongs to the technical field of communication, and relates to a device connection method, a system, electronic devices and a computer readable storage medium.
Background
Currently, when a client connects to a server, wiFi (Wireless Fidelity ) scanning is performed, and when a hotspot of the server is scanned, the client can connect to the server. In general, both a client with connection authority and a client without connection authority can scan the hot spot name of the server, so that both the client with connection authority and the client without connection authority can connect with the server, and the client without connection authority can preempt the resource of the server, thereby influencing the connection stability between the client with connection authority and the server.
The foregoing is provided merely for the purpose of facilitating understanding of the technical solutions of the present application and is not intended to represent an admission that the foregoing is prior art.
Disclosure of Invention
The application mainly aims to provide a device connection method, a system, electronic equipment and a computer readable storage medium, and aims to solve the technical problem of unstable connection between a client and a server.
In order to achieve the above object, the present application provides a device connection method, applied to a server, the device connection method comprising:
after the server side enters a hot spot hiding mode, receiving a connection request sent by the client side;
judging whether private data exists in the connection request or not;
and if the private data exists in the connection request, feeding back connection response data to the client side sending the connection request, wherein the connection response data comprises the hot spot name of the server side.
In order to achieve the above object, the present application provides a device connection method, applied to a client, the device connection method comprising:
packaging the private data into a connection request to be sent to the server;
sending the connection request to the server side so that the server side can: and after detecting that the private data exists in the connection request, feeding back connection response data to the client side sending the connection request, wherein the connection response data comprises the hot spot name of the server side.
To achieve the above object, the present application provides a device connection system including:
the server side is used for receiving a connection request sent by the client side after the server side enters a hot spot hiding mode; judging whether private data exists in the connection request or not; if the private data exists in the connection request, feeding back connection response data to the client side sending the connection request, wherein the connection response data comprises a hot spot name of the server side;
the client is used for packaging the private data into a connection request to be sent to the server; sending the connection request to the server side so that the server side can: and after detecting that the private data exists in the connection request, feeding back connection response data to the client side sending the connection request, wherein the connection response data comprises the hot spot name of the server side.
The application also provides an electronic device comprising: the device connection method includes a memory, a processor, and a program of the device connection method stored on the memory and executable on the processor, the program of the device connection method realizing the steps of the device connection method as described above when executed by the processor.
The present application also provides a computer-readable storage medium having stored thereon a program for realizing the device connection method, which when executed by a processor, realizes the steps of the device connection method as described above.
The application also provides a computer program product comprising a computer program which, when executed by a processor, implements the steps of a device connection method as described above.
The application provides a device connection method, a system, an electronic device and a computer readable storage medium, wherein the method and the system enable a client to not send a connection request with a hot spot name to a server by hiding the hot spot name of the server, so that connection cannot be established with the server by sending the connection request with the hot spot name to the server.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
In order to more clearly illustrate the embodiments of the application or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, and it will be obvious to a person skilled in the art that other drawings can be obtained from these drawings without inventive effort.
FIG. 1 is a schematic flow chart of a first embodiment of a device connection method of the present application;
FIG. 2 is a schematic diagram of a passive scanning flow of a client in the device connection method of the present application;
FIG. 3 is a schematic diagram of an active scanning procedure of a client in the device connection method of the present application;
FIG. 4 is a schematic diagram of an apparatus according to an embodiment of the device connection method of the present application;
fig. 5 is a schematic device structure diagram of a hardware operating environment related to a device connection method in an embodiment of the present application.
The achievement of the objects, functional features and advantages of the present application will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
In order to make the above objects, features and advantages of the present application more comprehensible, the following description of the embodiments accompanied with the accompanying drawings will be given in detail. It will be apparent that the described embodiments are only some, but not all, embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The client connects with the server in two connection modes, one is passive scanning of the client, the client monitors and records Beacon frames, when identifying the Beacon frames with the hot spot names of the server, the client connects with the server and sends probe frames to the client so that the client is connected with the server, the other is active scanning of the client, the client sends probe frames to all channels, the server receives the probe frames and responds to the probe frames with the hot spot names so that the client obtains the hot spot names of the server to connect with the server.
Example 1
Referring to fig. 1, an embodiment of the present application provides a device connection method, which is applied to a server, and in a first embodiment of the device connection method of the present application, the device connection method includes:
step S10, after a server enters a hot spot hiding mode, a connection request sent by a client is received;
in the embodiment of the present application, it should be noted that, the connection request is a request of a client for connecting to a server, and the connection request may be an exemplary probe frame, where the probe frame may be a ProbeReq frame, and the ProbeReq frame is a management frame in a WiFi network, and is used for actively scanning WiFi access points near the client.
Step S20, judging whether private data exists in the connection request;
step S30, if the private data exists in the connection request, feeding back connection response data to the client side sending the connection request, wherein the connection response data comprises the hot spot name of the server side.
In this embodiment, it should be noted that, the private data is used to identify a client capable of being connected to a server, the private data is encrypted private data, the private data is used to mark the client as a client capable of being connected to the server, and the private data may be a flag bit, a version number, a vendor name, a serial number, a device ID, and a check code of the encrypted client. And hiding the hot spot name of the server to avoid that the client identifies the hot spot name of the server, thereby avoiding that the client establishes connection with the server in a mode of sending a connection request with the hot spot name to the server.
Wherein, after step S20, the connection method of the device further includes:
step S40, if the private data is detected to be not in the connection request, the connection request is not responded.
In the embodiment of the present application, it should be noted that, when the connection request is detected that the private data does not exist, the connection request is not responded, and then the client terminal that does not exist the private data in the connection request does not establish a connection with the server terminal.
As an example, steps S10 to S40 include: after the server side enters a hot spot hiding mode, receiving a connection request sent by the client side, and judging whether private data exists in the connection request or not; if the private data exists in the connection request, judging whether the private data is matched with preset standard connection data of a server side or not; if the private data is matched with the preset standard connection data of the server, responding to the connection request to enable the client to be connected with the server; if the private data is not matched with the preset standard connection data of the server, the connection request is not responded, and the client is not connected with the server; and if the private data does not exist in the connection request, not responding to the connection request.
The method and the device enable the client to not send the connection request with the hot spot name to the server by hiding the hot spot name of the server, so that connection cannot be established with the server by sending the connection request with the hot spot name to the server, further enable the client to connect the server by feeding back connection response data to the client with the private data by judging whether the connection request sent by the client has the private data or not, thereby realizing connection between the server and the client with the private data, avoiding connection of the client without the private data to the server, avoiding occupation of resources of the server by the client without the private data, and improving connection stability between the server and the client with the private data.
The step of the server entering the hot spot hiding mode comprises the following steps:
step S11, deleting the hot spot name in the beacon frame of the server to enter a hot spot hiding mode.
In this embodiment, it should be noted that there are two ways in which the client is connected to the server, one is that the client actively scans, the other is that the client passively scans, the client monitors and records the Beacon frame, and when the Beacon frame with the hotspot name of the server is identified, the client is connected to the server, that is, when the server does not hide the hotspot name, the client can be connected to the server through the passive scanning, so that if the client is prevented from being forbidden to connect to the client, the hotspot name of the server is hidden. The other is that the client actively scans, the client sends a ProbeReq frame to all channels, the server receives the ProbeReq frame and responds to the ProbeRes frame with the hotspot name, so that the client obtains the hotspot name of the server to connect the server, that is, when the server does not hide the hotspot name, the server can respond to the ProbeRes frame with the hotspot name to the client, so that the client connects to the server, therefore, if the hotspot name is not hidden, the entering client can also connect to the server by actively scanning, so that the hotspot name of the server also needs to be hidden.
Specifically, step S11 includes: and deleting the hot spot name in the beacon frame of the server to hide the hot spot name of the server. The Beacon frame is a Beacon frame, and the Beacon frame is a special type of management frame used for broadcasting Basic Service Set (BSS) existence and attribute information in the WiFi network. The Beacon frame contains the network name, access point identifier, supported data rates, security functions, and other service information. Specifically, the hotspot name in the server is hidden, and the hotspot name in the Beacon frame can be deleted directly.
After the server side enters the hot spot hiding mode, the device connection method further comprises the following steps:
step S111, according to the preset sending period, sending the beacon frame hiding the hot spot name.
In the embodiment of the application, it is to be noted that the server side will send the beacon frame with the hidden hot spot name according to the preset sending period, that is, the server side will send the beacon frame with the hidden hot spot name at regular time, when the client side receives the beacon frame sent by the server side, the hot spot name of the server side cannot be obtained, so that the server side cannot be connected in a passive scanning mode, and the connection of the forbidden client side and the server side can be avoided.
And if the private data exists in the connection request, feeding back connection response data to the client side sending the connection request, wherein the step of feeding back connection response data comprises the following steps:
step S31, if the private data is detected to exist in the connection request, judging whether the private data is matched with the preset access data of the server side or not;
step S32, if the private data is matched with the preset access data of the server, feeding back connection response data to the client sending the connection request;
step S33, if the private data does not match with the preset access data of the server, the connection request is not responded.
In the embodiment of the present application, it should be noted that, the private data is characterized as specific data of the client, the private data may be an encrypted flag bit, version number, vendor name, serial number, device ID and check code of the client, the connection response data is used for responding to a connection request of the client, the connection response data has a hotspot name of the server, the connection response data may be a ProbeRes frame with a hotspot name of the server, the preset standard connection data is preset by a developer, and the client is allowed to access the data of the server, and the preset access data may include: flag bit, version number, and vendor name.
As an example, step S31 to step S33 include: if the connection request is detected to comprise private data, decrypting the private data; judging whether the decrypted private data is matched with the preset quasi-connection data or not; and if the decrypted private data is matched with the preset quasi connection data, responding to the connection request, and generating and sending connection response data to the client so that the access client can be connected with the server. In the embodiment of the application, by judging whether the private data is the same as the preset standard connection data of the server, and under the condition that the private data is the same as the preset standard connection data, responding to the connection request of the client, and sending connection response data to the access client so as to enable the access client to be connected with the server, thereby avoiding the private data from being in time, and enabling the private data to be connected with the server by the client which is different from the preset access data, so as to improve the connection stability of the server and the client.
Further, when the server side simultaneously monitors that the plurality of clients exist private data at present, and the private data of the plurality of clients are matched with the preset access data, the plurality of access clients can be determined simultaneously, that is, the server side can be connected with the plurality of access clients simultaneously, and the connection efficiency is improved.
The step of judging whether the private data is matched with the preset access data of the server side comprises the following steps:
step S311, decrypting the private data to obtain decrypted data;
step S312, judging whether the decrypted data is complete;
step 313, if the decrypted data is complete, judging whether the decrypted data is matched with the preset access data of the server;
in step S314, if the decrypted data is incomplete, the connection request is not responded.
In this embodiment, it should be noted that, the private data is encrypted private data to ensure security of the private data, the decrypted data is decrypted data of the private data, and the decrypted data may include: the client's flag bit, version number, vendor name, serial number, device ID, and check code.
As an example, step S311 to step S314 include: decrypting the private data to obtain decrypted data; judging whether the decrypted data is complete, namely judging whether the decrypted data comprises a flag bit, a version number, a manufacturer name, a serial number, an equipment ID and a check code of the client, and if the decrypted data is incomplete, not corresponding to the connection request. If the decrypted data is complete, then judging that the private data is matched with the preset standard connection data, specifically, judging whether the flag bit of the client in the decrypted data is identical to the flag bit in the preset standard connection data, judging whether the version number of the client in the decrypted data is identical to the version number in the preset standard connection data, and judging whether the manufacturer name of the client in the decrypted data is identical to the manufacturer name in the preset standard connection data, namely, judging whether the flag bit, the version number and the manufacturer name of the client are identical to the flag bit, the version number and the manufacturer name in the preset access data, and when the flag bit, the version number and the manufacturer name of the client are identical to the flag bit, the version number and the manufacturer name in the preset access data, determining that the private data is matched with the preset standard connection data.
According to the embodiment of the application, whether the decrypted private data is complete or not is judged, if the private data is incomplete, the connection request sent by the client is possibly tampered by a person, so that the connection request is not responded under the condition that the private data is incomplete, and the connection of the client without connection authority to the server can be avoided, namely, the server does not establish connection with the client without the private data or the client with the private data which is not matched with the preset access data of the server, and the connection security between the private data and the server and the client matched with the server is ensured.
Example two
Further, in another embodiment of the present application, the same or similar content as the above embodiment may be referred to the above description, and will not be repeated. In another embodiment of the device connection method of the present application, the device connection method is applied to a client, and the device connection method includes:
step A10, packaging the private data into a connection request to be sent to the server;
step a20, sending the connection request to the server, so that the server may: and after detecting that the private data exists in the connection request, feeding back connection response data to the client side sending the connection request, wherein the connection response data comprises the hot spot name of the server side.
In the embodiment of the present application, it should be noted that, in the development stage of the server and the client, the client that can be connected to the server is determined, and the private data is set in the connection request of the client. The private data is set in the connection request of the client, which may be to add a custom field in the WIFI protocol of the client, where the format of the custom field is: the method comprises the steps of storing field ID (Identity document), field length and field data in the field data, analyzing an acquisition request by a server to obtain the field ID of a client, reading the field data, and decrypting the field data.
As an example, steps a10 to a20 include: the embodiment of the application sets the private data for the client meeting the client admittance list of the server, thereby realizing that the client which is allowed to be connected with the server can be connected with the server. Furthermore, the private data can be encrypted by RSA (encryption algorithm), RSA has a public key and a secret key, a public key is preset by a client, a secret key is preset by a server, the client encrypts the private data by using the public key, and the server decrypts the private data by using the secret key. According to the embodiment of the application, the private data is obtained by encrypting the private data, and then the connection request with the private data is sent to the server, so that the security of data transmission is ensured, the private data is prevented from being cracked, and the client without the private data is prevented from being connected with the server, thereby ensuring the connection stability between the client with the private data and the server.
In order to better understand the technical concept of the present application, the implementation process of the present application is described with reference to fig. 2 and 3, fig. 2 is a schematic diagram of a passive scanning flow of a client, in which a service end hides a hotspot name and periodically transmits Beacon frames without hotspot names, that is, according to a preset transmission period, beacon frames without hotspot names are transmitted, and a client receives Beacon frames without hotspot names, and cannot acquire a hotspot name of the service end and cannot establish connection with the service end. Fig. 3 is a schematic diagram of a client active scanning flow.
In fig. 3, a client actively sends a connection request, that is, actively sends a ProneReq frame, a server identifies whether private data exists in the connection request after receiving the connection request of the client, if the private data exists, the server responds to the connection request, and sends a proneRes frame with a hotspot name of the server to the client, that is, sends connection response data with the hotspot name to the client, the client acquires the hotspot name in the proneRes frame and establishes connection with the server, and if the private data does not exist in the connection request, the client cannot connect with the server.
Example III
Referring to fig. 4, an embodiment of the present application further provides a device connection system, including:
the server 10 is configured to receive a connection request sent by the client after the server enters a hotspot hiding mode; judging whether private data exists in the connection request or not; and if the private data exists in the connection request, feeding back connection response data to the client side sending the connection request, wherein the connection response data comprises the hot spot name of the server side.
The client 20 is configured to encapsulate the private data into a connection request to be sent to the server; sending the connection request to the server side so that the server side can: and after detecting that the private data exists in the connection request, feeding back connection response data to the client side sending the connection request, wherein the connection response data comprises the hot spot name of the server side.
Optionally, the server 10 is further configured to:
and if the private data does not exist in the connection request, not responding to the connection request.
Optionally, the server 10 is further configured to:
and deleting the hot spot name in the beacon frame of the server to enter a hot spot hiding mode.
Optionally, the server 10 is further configured to:
and sending a beacon frame hiding the hot spot name according to a preset sending period.
Optionally, the server 10 further includes:
if the private data is detected to exist in the connection request, judging whether the private data is matched with the preset access data of the server side or not;
if the private data is matched with the preset access data of the server, feeding back connection response data to the client sending the connection request;
and if the private data is not matched with the preset access data of the server, not responding to the connection request.
Optionally, the server 10 further includes:
decrypting the private data to obtain decrypted data;
judging whether the decrypted data is complete or not;
if the decrypted data is complete, judging whether the decrypted data is matched with preset access data of the server side or not;
and if the decrypted data is incomplete, not responding to the connection request.
Optionally, the client 20 further includes:
packaging the private data into a connection request to be sent to the server;
sending the connection request to the server side so that the server side can: and after detecting that the private data exists in the connection request, feeding back connection response data to the client side sending the connection request, wherein the connection response data comprises the hot spot name of the server side.
The device connection system provided by the application adopts the device connection method in the embodiment, and aims to solve the technical problem of unstable connection between the client and the server. Compared with the prior art, the beneficial effects of the device connection method provided by the embodiment of the present application are the same as those of the device connection method provided by the above embodiment, and other technical features of the device connection system are the same as those disclosed by the method of the above embodiment, which are not described in detail herein.
Example IV
The embodiment of the application provides an electronic device, which may be a playing device, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the device connection method of the above embodiments.
Referring now to fig. 5, a schematic diagram of an electronic device suitable for use in implementing embodiments of the present disclosure is shown. The electronic devices in the embodiments of the present disclosure may include, but are not limited to, mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistant, personal digital assistants), PADs (portable Android device, tablet computers), PMPs (Portable Media Player, portable multimedia players), vehicle terminals (e.g., car navigation terminals), and the like, and stationary terminals such as digital TVs, desktop computers, and the like. The electronic device shown in fig. 5 is merely an example and should not be construed to limit the functionality and scope of use of the disclosed embodiments.
As shown in fig. 5, the electronic apparatus may include a processing device 1001 (e.g., a central processor, a graphics processor, or the like) that can perform various appropriate actions and processes according to a program stored in a ROM (Read-Only Memory) 1002 or a program loaded from a storage device 1003 into a RAM (Random Access Memory ) 1004. In the RAM1004, various programs and data required for the operation of the electronic device are also stored. The processing device 1001, the ROM1002, and the RAM1004 are connected to each other by a bus 1005. An input/output (I/O) interface 1006 is also connected to the bus.
In general, the following systems may be connected to the I/O interface 1006: input devices 1007 including, for example, a touch screen, touchpad, keyboard, mouse, image sensor, microphone, tachometer, gyroscope, and the like; an output device 1008 including, for example, an LCD (Liquid Crystal Display ), a speaker, a vibrator, and the like; storage device 1003 including, for example, a magnetic tape, a hard disk, and the like; and communication means 1009. The communication means may allow the electronic device to communicate with other devices wirelessly or by wire to exchange data. While electronic devices having various systems are shown in the figures, it should be understood that not all of the illustrated systems are required to be implemented or provided. More or fewer systems may alternatively be implemented or provided.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program may be downloaded and installed from a network through a communication system, or installed from a storage system, or installed from ROM. The above-described functions defined in the methods of the embodiments of the present disclosure are performed when the computer program is executed by a processing system.
The electronic device provided by the application adopts the device connection method in the first embodiment to solve the technical problem of unstable connection between the client and the server. Compared with the prior art, the beneficial effects of the product flow data distribution provided by the embodiment of the application are the same as those of the device connection method provided by the embodiment, and other technical features in the device connection system are the same as those disclosed by the method of the embodiment, so that the description is omitted herein.
It should be understood that portions of the present disclosure may be implemented in hardware, software, firmware, or a combination thereof. In the description of the above embodiments, particular features, structures, materials, or characteristics may be combined in any suitable manner in any one or more embodiments or examples.
The foregoing is merely illustrative of the present application, and the present application is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Example five
The present embodiment provides a computer-readable storage medium having computer-readable program instructions stored thereon for performing the device connection method in the first embodiment described above.
The computer readable storage medium provided by the embodiments of the present application may be, for example, a usb disk, but is not limited to, an apparatus or a device of an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor, or a combination of any of the above. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable EPROM (Electrical Programmable Read Only Memory, read-only memory) or flash memory, an optical fiber, a portable compact disc CD-ROM (compact disc read-only memory), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In this embodiment, the computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution apparatus, device, or apparatus. Program code embodied on a computer readable storage medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
The above-described computer-readable storage medium may be contained in an electronic device; or may exist alone without being assembled into an electronic device.
The computer-readable storage medium carries one or more programs that, when executed by an electronic device, cause the electronic device to: after the server side enters a hot spot hiding mode, receiving a connection request sent by the client side; judging whether private data exists in the connection request or not; and if the private data exists in the connection request, feeding back connection response data to the client side sending the connection request, wherein the connection response data comprises the hot spot name of the server side.
Computer program code for carrying out operations of the present disclosure may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a LAN (local area network ) or WAN (Wide Area Network, wide area network), or it may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of devices, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based devices which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules described in the embodiments of the present disclosure may be implemented in software or hardware. Wherein the name of the module does not constitute a limitation of the unit itself in some cases.
The application provides a computer readable storage medium, which stores computer readable program instructions for executing the device connection method, and aims to solve the technical problem of unstable connection between a client and a server. Compared with the prior art, the beneficial effects of the computer readable storage medium provided by the embodiment of the application are the same as those of the device connection method provided by the above embodiment, and are not described herein.
Example six
The application also provides a computer program product comprising a computer program which, when executed by a processor, implements the steps of a device connection method as described above.
The application provides a computer program product for solving the technical problem of unstable connection between a client and a server. Compared with the prior art, the beneficial effects of the computer program product provided by the embodiment of the present application are the same as those of the device connection method provided by the above embodiment, and are not described herein.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the application, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein, or any application, directly or indirectly, within the scope of the application.

Claims (10)

1. A device connection method, applied to a server, the device connection method comprising:
after the server side enters a hot spot hiding mode, receiving a connection request sent by the client side;
judging whether private data exists in the connection request or not;
and if the private data exists in the connection request, feeding back connection response data to the client side sending the connection request, wherein the connection response data comprises the hot spot name of the server side.
2. The device connection method according to claim 1, wherein after the step of judging whether the connection request has private data, the device connection method further comprises:
and if the private data does not exist in the connection request, not responding to the connection request.
3. The device connection method of claim 1, wherein the step of the server entering a hotspot hiding mode comprises:
and deleting the hot spot name in the beacon frame of the server to enter a hot spot hiding mode.
4. The device connection method according to claim 1, wherein after the entering of the hot spot hiding mode at the server side, the device connection method further comprises:
and sending a beacon frame hiding the hot spot name according to a preset sending period.
5. The device connection method according to claim 1, wherein the step of feeding back connection response data to the client that sent the connection request if the presence of the private data in the connection request is detected, comprises:
if the private data is detected to exist in the connection request, judging whether the private data is matched with the preset access data of the server side or not;
if the private data is matched with the preset access data of the server, feeding back connection response data to the client sending the connection request;
and if the private data is not matched with the preset access data of the server, not responding to the connection request.
6. The device connection method according to claim 5, wherein the step of determining whether the private data matches the preset admission data of the server includes:
decrypting the private data to obtain decrypted data;
judging whether the decrypted data is complete or not;
if the decrypted data is complete, judging whether the decrypted data is matched with preset access data of the server side or not;
and if the decrypted data is incomplete, not responding to the connection request.
7. A device connection method, applied to a client, comprising:
packaging the private data into a connection request to be sent to the server;
sending the connection request to the server side so that the server side can: and after detecting that the private data exists in the connection request, feeding back connection response data to the client side sending the connection request, wherein the connection response data comprises the hot spot name of the server side.
8. A device connection system, the device connection system comprising:
the server side is used for receiving a connection request sent by the client side after the server side enters a hot spot hiding mode; judging whether private data exists in the connection request or not; if the private data exists in the connection request, feeding back connection response data to the client side sending the connection request, wherein the connection response data comprises a hot spot name of the server side;
the client is used for packaging the private data into a connection request to be sent to the server; sending the connection request to the server side so that the server side can: and after detecting that the private data exists in the connection request, feeding back connection response data to the client side sending the connection request, wherein the connection response data comprises the hot spot name of the server side.
9. An electronic device, the electronic device comprising:
at least one processor;
and a memory communicatively coupled to the at least one processor;
wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the steps of the device connection method of any one of claims 1 to 7.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a program that implements a device connection method, the program implementing the device connection method being executed by a processor to implement the steps of the device connection method according to any one of claims 1 to 7.
CN202310973592.4A 2023-08-02 2023-08-02 Device connection method, system, electronic device, and computer-readable storage medium Pending CN116887444A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310973592.4A CN116887444A (en) 2023-08-02 2023-08-02 Device connection method, system, electronic device, and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310973592.4A CN116887444A (en) 2023-08-02 2023-08-02 Device connection method, system, electronic device, and computer-readable storage medium

Publications (1)

Publication Number Publication Date
CN116887444A true CN116887444A (en) 2023-10-13

Family

ID=88254927

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310973592.4A Pending CN116887444A (en) 2023-08-02 2023-08-02 Device connection method, system, electronic device, and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN116887444A (en)

Similar Documents

Publication Publication Date Title
US11968532B2 (en) Method and apparatus for connecting to wireless access point
US8621483B2 (en) Methods, apparatuses and computer program products for provisioning applications to in vehicle infotainment systems with secured access
US20190037399A1 (en) Ap connection method, terminal, and server
CN111757422B (en) Equipment activation method and device, user terminal, equipment to be activated and storage medium
CN111030827A (en) Information interaction method and device, electronic equipment and storage medium
CN112399392A (en) Communication connection method, device, equipment and storage medium of home care terminal
CN108092947B (en) Method and device for identity authentication of third-party application
CN112261651B (en) Terminal control method, device, terminal and storage medium
CN111130805B (en) Secure transmission method, electronic device, and computer-readable storage medium
CN112687363A (en) Health code public service method and platform
CN114979048B (en) Identity verification method, system, electronic device and medium based on instant messaging
CN109388917B (en) Hardware equipment authentication method, device, equipment and storage medium
CN111935138B (en) Protection method and device for secure login and electronic equipment
CN110602700A (en) Seed key processing method and device and electronic equipment
CN116887444A (en) Device connection method, system, electronic device, and computer-readable storage medium
CN109933960B (en) Service calling control method, service calling method, device and terminal
CN113891431A (en) Device wireless access method, device, computer device and storage medium
CN113836538A (en) Data model processing method, device, server and storage medium
CN114245161B (en) Live broadcast push method and device, storage medium and electronic equipment
CN112149168B (en) File data encryption method and device and electronic equipment
CN113660100B (en) Method, system and electronic equipment for generating soft token seed
CN113709023A (en) Iris electronic mail safety transmission method, system and storage medium
CN115412887A (en) Network distribution method, device, system, equipment and storage medium
CN114238918A (en) TEE environment-based inter-device interaction authorization method and device and readable storage medium
CN114239010A (en) Multi-node distributed authentication method, system, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination