Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one
It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention
Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition
Other one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim member
Part is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be
Intermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or wirelessly coupling.It is used herein to arrange
Diction "and/or" includes one or more associated wholes for listing item or any cell and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also
Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art
The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here
To explain.
Those skilled in the art of the present technique be appreciated that " terminal " used herein above, " terminal device ", " intelligent terminal ",
" mobile phone terminal " had both included the equipment of wireless signal receiver, only had setting for the wireless signal receiver of non-emissive ability
It is standby, and the equipment including receiving and emitting hardware, have the reception that two-way communication on bidirectional communication link, can be executed and
Emit the equipment of hardware.This equipment may include: honeycomb or other communication equipments, with single line display or multi-line
Display or honeycomb or other communication equipments without multi-line display;PCS(Personal Communications
Service, PCS Personal Communications System), it can be with combine voice, data processing, fax and/or communication ability;PDA
(Personal Digital Assistant, personal digital assistant), may include radio frequency receiver, pager, internet/
Intranet access, web browser, notepad, calendar and/or GPS (Global Positioning System, global location
System) receiver;Conventional laptop and/or palmtop computer or other equipment have and/or including radio frequency receiver
Conventional laptop and/or palmtop computer or other equipment.Various " terminals " used herein above can be it is portable, can transport
It is defeated, be mounted in the vehicles (aviation, sea-freight and/or land), or be suitable for and/or be configured in local runtime, and/
Or with distribution form, operate in any other position operation in the earth and/or space.Various " terminals " used herein above may be used also
To be communication terminal, access terminals, music/video playback terminal, such as it can be PDA, MID (Mobile Internet
Device, mobile internet device) and/or mobile phone with music/video playing function, be also possible to smart television,
The equipment such as set-top box, intelligent video camera head, intelligent remote controller, intelligent socket.
Those skilled in the art of the present technique are appreciated that remote network devices used herein above comprising but be not limited to count
The cloud that calculation machine, network host, single network server, multiple network server collection or multiple servers are constituted.Here, Yun Youji
It is constituted in a large number of computers or network servers of cloud computing (Cloud Computing), wherein cloud computing is distributed computing
One kind, a super virtual computer consisting of a loosely coupled set of computers.In the embodiment of the present invention, distal end
It can be realized and be communicated by any communication mode between the network equipment, terminal device and WNS server, including but not limited to, is based on
The mobile communication of 3GPP, LTE, WIMAX, based on TCP/IP, the computer network communication of udp protocol and based on bluetooth, infrared
The low coverage wireless transmission method of transmission standard.
The present invention is the series of network access technology solution proposed for the development in response to Internet of Things, applied field
Scape is more suitable for the local area network realized with WiFi technology, but theoretically should be with operating system without being necessarily associated with.Based on this, originally
Invention not only provides target network on the one hand for the mobile intelligent terminal of the similar mobile phone of central control action etc and connects
Enter guidance method and corresponding device, providing automation to access the target network for other smart machines, intelligent terminal connects
The guide entered, moreover, on the other hand, or independently of its except the intelligent terminal for playing central control action
His smart machine, intelligent terminal provide target network cut-in method, so that the intelligent terminal is improved, to realize such intelligence eventually
Exempt from setting access target network in end.In view of this, the following description will be around the expansion description respectively of these aspects.Described connects
Enter guidance method and cut-in method, is substantially the different aspect for belonging to a system schema.Utilize the access guiding side
Method is dished out the data of guide formula, and the cut-in method can be then utilized, real on the basis of using the guide formula data
Existing network insertion.
It is necessary to first carry out following guiding explanation to application scenarios of the invention and its principle.
The present invention wants improved mobile phone terminal, will implement target network access guidance method provided by the invention, accordingly
, the present invention wants improved intelligent terminal, will implement target network cut-in method provided by the invention.Mobile phone terminal and intelligence
Terminal, which cooperates, completes the operating process that intelligent terminal accesses the target network, and the target network is that mobile phone terminal is current
The network of access, intelligent terminal access configuration information required for the target network, are provided by mobile phone terminal.
But for cost or succinct consideration, intelligent terminal is usually the relatively simple equipment of function or even certain feelings
Human-computer interaction interface cannot be provided under condition, in this case, cannot allow such as mobile phone user setting WiFi network SSID and
Therefore the information such as password in technical principle, need to transmit these configuration informations from mobile phone terminal to intelligent terminal, so as to intelligent end
Target network is accessed after end configuration itself.
The mobile phone terminal configuration information described to intelligent terminal transmission, typically can as the present invention will disclosed in implementation
Described in example, at least implemented using two ways, first way is the point-to-point direct-connected skill based on WiFi Direct standard implementation
Intelligent terminal is placed in the service node mode (ap mode) by the standard criterion by art, waits mobile phone terminal with work station (STA)
Its backward transmission of mode entry intelligent terminal configuration information, until intelligent terminal obtains the configuration information, and it will
The workstation mode for itself switching back to the standard configures itself and accesses target network, thus completes from confidence
Breath is transferred to the overall process of access.This process is all based on the network for working in data link layer that 802.11 agreements are standardized
Frame realizes transmission;The second way is described will to match confidence based on acoustic signals carrier transmission technique provided by the invention
Breath is integrated in an audio file with music information, plays the audio file, generates acoustic signals, is received simultaneously by intelligent terminal
After parsing, configures itself and complete the access of target network.No matter which kind of mode is taken, if the configuration information is without adding
It is close, it is just easy to be intercepted and captured and cracked by Malware in transmission process, is all exposed to hacker so as to cause entire target network.
Therefore, between intelligent terminal and mobile phone terminal provided by the invention, the characteristics of sufficiently excavating and utilize asymmetric encryption techniques,
Both guarantee the communication security of mobile phone terminal and intelligent terminal, and it is expected the more unexpected technical effects of harvest.
Asymmetric encryption techniques, also known as public key cryptography refer to (being disclosed close by corresponding a pair of of unique keys
Key and private cipher key) composition encryption method, public-key cryptography is public key, and private cipher key is private key, between public key and private key
It is associated with by algorithm uniqueness, realizes association mathematically, the ciphertext via private key encryption can be decrypted using public key, otherwise
So.Currently known rivest, shamir, adelman is more, such as RSA, ElGamal, knapsack algorithm, Rabin, Diffie-Hellman
(D-H) public key encryption algorithm in Key Exchange Protocol, (ECC, elliptic curve add Elliptic Curve Cryptography
Close algorithm) etc..Those skilled in the art should be enough to understand the flexible fortune of this widely applied technology and its various algorithms
With.Public key encryption solves the publication and problem of management of key, is the core of current commercial code.In public encryption system,
It does not disclose in plain text, discloses ciphertext.
Based on asymmetric encryption techniques, when intelligent terminal of the invention dispatches from the factory, it is written on its chip and is added by asymmetric
The private key that secret skill art generates, also, simultaneously, in a manner of being appended hereto hardware, or in a manner of Web Publishing etc., the open and private
The associated public key of key.Theoretically, an intelligent terminal holds a pair of of private key and public key, not only may insure using the public key
Secure communication is realized with intelligent terminal, and can be used for examining the legitimate origin or channel of intelligent terminal.In view of work
On it is practical and convenient, the public key of intelligent terminal is printed on the packing box of intelligent terminal or a visualization table of its shell
It is characterized up in region, and with the format of two dimensional code, in this way, mobile phone terminal of the invention utilizes a two-dimensional code scanning mould
Block is scanned the two dimensional code of the public key for characterizing intelligent terminal, can obtain the public key.Mobile phone terminal utilizes the public key
Encryption configuration information forms ciphertext and is transferred to intelligent terminal, and intelligent terminal has private key by oneself with it and decrypts the ciphertext received, then
Configuration information therein is extracted, whole process is safe and reliable.
In the scene of some variations, by the service node mode for the intelligent terminal realized based on WiFi Direct technology
Under log-on message and the public key expressed in the two dimensional code together, mobile phone terminal scans the two dimensional code, obtains public
While key, corresponding log-on message can be also obtained.After configuring itself using the log-on message, that is, it can access intelligence eventually
End, to establish point-to-point direct-connected carry out data transmission.It therefore in this case, can be by mobile phone after one key scanning of user
Terminal and intelligent terminal silence cooperate, and realize the intelligent terminal access target network.
In certain scenes, if intelligent terminal is a camera, user wishes that subsequent mobile phone terminal can receive intelligent terminal
The video data of offer, and it is desirable that carry out safer encryption to this video data, can be by mobile phone terminal using non-
Symmetric cryptosystem generates a pair of new key, and mobile phone terminal retains own private key, its public key is transferred to intelligent terminal, intelligence
Its data to be transmitted can be transferred to mobile phone terminal using the public key encryption by terminal, and mobile phone terminal has private key solution by oneself with it
Close acquisition video data gives that expression display can be perceived.Certainly, this Technology application can increase the operation load of mobile phone terminal, but
It is effective.Although asymmetric techniques safety with higher, intelligent terminal once factory, private key with
Public key has been fixed, immutable, and once for a long time, be still cracked possibility, therefore, in the field that high security requires, is passed through
The new key that mobile phone terminal generates ensures the secure communication between mobile phone terminal and intelligent terminal, has positive effect.
It will be detailed below several skills of the invention proposed to realize above-mentioned scene with above-mentioned principle
The specific embodiment of art scheme.
It should be noted that a kind of target network provided by the invention accesses guidance method, be as active initiator, or
What person was described as the visual angle of central controlling party, which can be embodied as by computer program by programming and existed
Similar mobile phone terminal, tablet computer or have in intelligentized control equipment is run, for example, run Android, IOS,
The mobile phone of Windows Phone system or the APP (application program) that guidance method realization is utilized with installation in tablet computer, by
The application program executes the guidance method.
Referring to Fig. 1, this method is specifically wrapped in an exemplary embodiments of target network access guidance method of the invention
Include following steps:
Step S11, two-dimensional code scanning user interface is called to obtain the public key of intelligent terminal.
As in the preceding description in relation to scene, intelligent terminal provides corresponding in such a way that two dimensional code carries out Visualization
Public key, mobile phone terminal activate two-dimensional code scanning functional module, wait user's by the user interface of its two-dimensional code scanning of calling
Scan operation.After two dimensional code of the mobile phone terminal to nearly intelligent terminal is expressed region by user, the public key of intelligent terminal can be obtained.
If it is made itself to be under service node (AP) mode by intelligent terminal based on what WiFi Direct technology was realized
Service set (SSID), the password even log-on messages such as cipher mode and the public key characterize together in its two dimension
At code, this step can naturally also obtain the log-on message while obtaining the public key, in later use.
Step S12, ciphertext is formed using the configuration information of public key encryption access current goal network.
It is well known that not only having WiFi mould group, display, control chip on mobile phone, also there is microphone, loudspeaker
Equal components, these components can be implemented to call by the APP installed on mobile phone terminal, correspondingly, guidance method of the invention
Executing subject is the mobile phone for being loaded with the APP specially realized.
Due to the main object of the present invention be in order to handle network access technique, the target network being currently accessed, just
Refer to network representated by WiFi AP that mobile phone is just accessing at present, and the configuration information, it is also to access the target network
Required login authentication information.According to the agreement of WiFi agreement, those skilled in the art be could be aware that, these information generally include
The service set (SSID) and login password of WiFi wireless routing (representing target network), also need in some cases include
The cipher mode of login password, and login password can also be needed not be provided for open network.Although there are versions for WiFi agreement more
For the fact, but these be related to realize access network and indispensability configuration information can by those skilled in the art according to agreement text
Part is corresponding to be determined, therefore, is repeated here to its details and its change programme.
When mobile phone terminal itself accesses target network, by the Beacon frame of scanning WiFi AP, or pass through transmission
Probe Request frame provides modes such as the response frame Probe Response that obtains WiFi AP, or with user in APP
Interface on active setting match, to determine a service set, i.e. SSID determines that one to be accessed with this
WiFi AP network is also that a target network to be accessed has been determined.Then, mobile phone terminal will usually be obtained to user with
The corresponding login password of the SSID (except open network), corresponding cipher mode such as WPA, WPA2, WEP and its details
Deng, can both have been selected by user and also by mobile phone terminal by its WiFi mode realize automatic identification.After obtaining these basic informations,
By a series of conventional association (Association) operation, mobile phone terminal can be accessed to the target network, as a result, hand
Configuration information needed for machine terminal also just obtains access target network.These configuration informations were both potentially stored in the machine,
It can be only stored in running memory, depending on default option of the user when network insertion option is arranged.In general, can lead to
The configuration file about network insertion of lookup the machine is crossed to recognize its archive to the configuration information of network.It is real in certain applications
In example, also can provide a series of interfaces obtain user to service set scan select and its corresponding password, from
And determine corresponding configuration information.
Once obtaining the configuration information, it can be encrypted using well known asymmetric encryption techniques, be encrypted
Content afterwards forms ciphertext, which needs to decrypt using the own private key of intelligent terminal, correctly to obtain wherein
Configuration information.
If, can be by mobile phone end as previously described for the communication security reinforced between subsequent mobile phone terminal and intelligent terminal
End generates a pair of of new key using asymmetric encryption techniques, and mobile phone terminal stores its own key, and its public key is appended hereto institute
The configuration information stated encrypts form ciphertext together, awaiting transmission.
Step S13, pass through ciphertext described in radio signal propagation.
The ciphertext constitutes a kind of guide formula data, is propagated by wireless signal, receives this ciphertext
Intelligent terminal can realize logic, the information for being included using the ciphertext, to realize access target network according to intrinsic program
The purpose of network.
The circulation way of ciphertext, the realization dependent on the communication link between mobile phone terminal and intelligent terminal.Before such as
The scene and its flexible situation of change, it will be understood that, can be at least using two kinds of thinkings of WiFi standard and acoustic signals as axis
Develop out following several implementations:
It is described close to transmit that one, the public key for obtaining intelligent terminal simultaneously and log-on message silence establish communication link
Text.
The case where log-on message of itself is published on its two dimensional code suitable for intelligent terminal, the present invention are calling two dimensional code
When scanning user interface is scanned two dimensional code, i.e., the public key of intelligent terminal is obtained simultaneously and is logged in needed for intelligent terminal
Log-on message.Mobile phone terminal disconnects the connection with target network, after configuring itself using the log-on message, that is, can access positive place
Intelligent terminal under service node mode, to establish point-to-point communication link.Then, can 802.11 agreements number
According to the format of the data frame of the link layer ciphertext described to intelligent terminal transmission.Intelligent terminal receive corresponding wireless signal it
Afterwards, utilization is decrypted to it.After waiting intelligent terminal completion configuration information reception, voluntarily it is switched to workstation mode and attempts access
When target network, the communication link of mobile phone terminal and intelligent terminal is disconnected, and just can be self-healing mobile phone terminal and target network
Connection.The realization of this process does not depart from a kind of convenience fortune of the technical foundation such as WiFi Direct or AD-Hoc actually
With, a key operation may be implemented, those skilled in the art should know.
Secondly, according to predetermined protocol scanning discovery and establish with the communication link of intelligent terminal to transmit ciphertext.
By the point-to-point communication technology of WiFi Direct or Ad-Hoc etc, according to the protocol rule of default, by holding
Hand and connective methods are built between the mobile phone terminal for being loaded with APP of the present invention and one or more external smart machine
Vertical communication link, or only detect the ciphertext hiding in (such as Probe Request) in one or more detection, with
The form of WiFi signal radiates in space and realizes broadcast.Refering to aforementioned, in some typical examples, it is based on WiFi Direct skill
Art, intelligent terminal default are in AP operating mode, and waiting mobile phone terminal is shaken hands and is associated with STA mode, connect to realize
Enter, the ciphertext that mobile phone terminal can be described to intelligent terminal transmission by data frame in the case where access.But if intelligence
There is improved rendezvous protocol rule between terminal and mobile phone terminal, then only need a side to load on ciphertext one or more
In a detection frame or in other management frames or control frame, another party also can get ciphertext (such case that these frames are included
Under, the connection status that can really transmit data frame is not implemented in mobile phone terminal and intelligent terminal).Intelligent terminal is either with even
The mode of state is connect, or after receiving configuration information in a manner of notconnect state, then switch back into STA mode, described in access
Target network.
It can be seen that can use a variety of based on the existing various technological visions of WiFi and its neighboring technology specification
Improved means realize the foundation of the communication link between mobile phone terminal and intelligent terminal, and the ciphertext is passed through
Including control frame, management frame, data frame it is various using 802.11 agreements as standard network frame formed wireless signal into
Row transmission.
Thirdly, non-under the WiFi connection status, the ciphertext that utilizes acoustic signals broadcast described.
The present invention can get rid of the peripheries such as WiFi Direct and Ad-Hoc technical standard, by making the ciphertext
At the acoustic signals to spatial, to realize the effect to the intelligent terminal transmission configuration information.In order to realize this
Effect discloses the generating process of acoustic signals in detail below:
Firstly, will include the ciphertext of the configuration information (when necessary including that mobile phone is separately generated with asymmetric techniques
Public key) with preset music score of Chinese operas information synthesize audio file.
It is described close comprising configuration information in the present embodiment different from the technology carried out data transmission using WiFi signal
Text is to realize that the wireless transmission of data is carried out into acoustic signals by carrier wave, belongs to data to be transmitted.Due to mobile phone
It is provided with loudspeaker assembly and its coding, decoding chip etc. in terminal, therefore, passes through the function of those existing components of calling mobile phone
Energy interface, can be realized communication function.In order to which this wireless transmission method is better achieved, need to do data to be transmitted as follows
The processing of process.It is related to the specific steps of the process incorporated by reference to Fig. 2, and refering to following:
Step S131, a preset frequency configuration file is called, the ciphertext is transformed into the frequency configuration file
Become audio-frequency information on listed corresponding frequency of sound wave, by this coded audio information to the more of such as Dolby Digital etc
In one or more sound channels of sound channel system.The audio-frequency information just establishes digitized association with corresponding sound channel as a result,.It needs
It should be noted that the frequency configuration file is the carrier for being stored multiple frequency point datas, certainly, if Frequency point compared with
To be simple, also frequency point may not necessarily be stored in the form of a file.
As a more specific embodiment for realizing above-mentioned cataloged procedure, array is generated with the ciphertext, it will
Data head data are added in ciphertext array.The check code and error correcting code of calculated version number and ciphertext length, version number are digital, close
Literary length, the check code of version number and ciphertext length and error correcting code form edition data, and edition data is added to ciphertext array
In.Then, ciphertext to be transmitted is subjected to segment processing, the identical multistage subdata of formation length, and is the life of every cross-talk data
At error-detecging code and error correcting code, every cross-talk data, the error-detecging code of every cross-talk data and error correcting code are formed into segment data, by segments
According to being added in ciphertext array.Cross processing is carried out to multiple segment datas.Come in fact specifically, being referred to following steps
It is existing:
Step A, reading frequency configuration file.
Step B, addition represent 16 binary digits of data head to array.
Step C, calculated version number (16 system) and data length (16 system) error-detecging code and error correcting code.
Version number and data length and its error correcting code are added to array by step D.
Character string (8 system) to be sent by sound wave is segmented by step E.
Step F judges whether to final stage, if it is, entering step D, adds the error detection of final stage data
Code;If it is not, then entering step F, error-detecging code and error correcting code are all added to every one piece of data.
Every one piece of data and its error-detecging code and error correcting code are added in array by step G.
Step H, polishing array is vacant, by 0 polishing of remaining digit.This array is 2 dimension groups.A number can be used
Group also can be used different arrays and place version number and data length and its error correcting code, every one piece of data etc..
Data in array are done interleaving processing by step I.
Data head is generated single-frequency acoustic signals by step J.
Version number and data length and its error correcting code are generated three frequency acoustic signals by step K.
Data after interleaving and its error-detecging code and error correcting code are generated eight frequency acoustic signals by step L.
Step M does gain compensation to acoustic signals.
Step N adds time window, generally smoothing windows to the acoustic signals of each syllable.
Several variants are disclosed further for those skilled in the art below in conjunction with each detailed step of above-mentioned cataloged procedure
Member's reference:
In one embodiment, version number is 16 system number D0, transmission data length is 2 16 system numbers D1, D2;Version
Number and transmission data length check code be D3.If D1 is not equal to 0, D3=(D1*D2+D0) %16 not equal to 0 and D2;
Otherwise, D3=(D1+D2+D0) %16.
RS is carried out to the numeric string of the check code composition of version number, transmission data length, version number and transmission data length
Encoding operation generates the RS code including error correcting code.
For example, build version number and data length error-detecging code: in array, data [0] is 16 system version numbers, data
[1], data [2] is 16 binary data length, and data [3] is error-detecging code.If data [1]!=0&&data [2]!=0, then
Data [3]=(data [1] * data [2]+data [0]) %16;Otherwise data [3]=(data [1]+data [2]+data
[0]) %16.
In one embodiment, each number in every cross-talk data multiplied by preset weighting coefficient and is summed, is then removed
With 8 generate quotient with remainder, then by quotient with remainder sum divided by 8 modulus, generate the error-detecging code of every cross-talk data;To every cross-talk number
Carry out RS encoding operation according to the numeric string of the error-detecging code composition of, every cross-talk data, generate include error correcting code RS code.
Cross processing is carried out to multiple segment datas are as follows: obtain multiple segment datas from transmission array of data;It will be each
Segment data is filled into matrix by row, and extracts multi-group data by Leie time from this matrix, forms change data.It will conversion
Data replacement segment data is added in transmission array of data.
In one embodiment, segment data error detection code generation method are as follows: first multiplied by weighting coefficient and ask every segment data
With, then will with divided by 8 generate quotient with remainder, then by quotient with remainder sum divided by 8 modulus.Final data error-detecging code generation side
Method are as follows: all data are added, then will with divided by 8 modulus.The error correction code generation method of each segment data are as follows: inner-institute
Sieve door code.The method of interleaving are as follows: data are first filled into matrix by row, are then extracted by column.
The data transmission method based on multifrequency sound wave in above-described embodiment, disperses continuous mistake by the way of interleaving,
Error correction anti-interference ability is improved, and generates the RS code for having error correcting code, using two kinds of error detection modes and two kinds of error correcting system mixing
It uses, can be improved error correction anti-interference ability.
In one embodiment, single-frequency data head signal generates, according to 16 binary data head data in data head frequency meter
The middle method chosen data and generate simple signal are as follows: default single-frequency frequency meter selects in single-frequency frequency meter according to data head data
Access is according to generation simple signal: simple signal are as follows:
sin(2.0*M_PI*twofTable[0][num1]*i*T);
TwofTable is single-frequency frequency meter, and as 2 dimension groups, num1 is data head data, for example, working as data head data
When num1=3, the data of the position of twofTable [0] [3], as required frequency are searched.T is the period, M_PI π, 0=<
I < NFRAME, NFRAME are frame length, are the length of the audio frame in audio-frequency information.TwofTable is single-frequency frequency meter, frequency
It is staggered with multifrequency frequency meter, num1 is data head data.
In one embodiment, three frequency frequency meters are set, 3 frequency signals are generated to edition data.By the version number of 16 systems
3 are divided into multiple groups of data for one group accordingly, select corresponding frequency synthesis 3 to believe frequently in three frequency frequency meters according to sequencing
Number.
3 frequency signals are respectively as follows:
0.3*sin(2.0*M_PI*threefTable[0][num1]*i*T)、
0.3*sin(2.0*M_PI*threefTable[1][num2]*i*T)、
0.4*sin(2.0*M_PI*threefTable[2][num3]*i*T));
ThreefTable is three frequency frequency meters, and num1, num2, num3 is 3 numbers in the group data sent the same time
According to T is the period, and M_PI π, 0=< i < NFRAME, NFRAME are frame length, is the length of the audio frame in audio-frequency information.
In one embodiment, three frequency version numbers and data length signal are generated are as follows: 16 system version numbers and data length
With 3 for one group, the 3 frequency signal of frequency synthesis on corresponding position is selected in corresponding frequency meter according to sequencing
(0.3*sin(2.0*M_PI*threefTable[0][num1]*i*T)+
0.3*sin(2.0*M_PI*threefTable[1][num2]*i*T)+
0.4*sin(2.0*M_PI*threefTable[2][num3]*i*T));
Wherein threefTable is 3 frequency frequency meters, and num1, num2, num3 is 3 signals sent the same time.
Expand signal peak on year-on-year basis to signal to 1, improves and play gain.
In one embodiment, matrix frequency table is preset, obtains change data from transmission array of data, change data is
Octal data.It is one group with 8 octal numbers and change data is divided into multiple transmission numeric strings sent in the same time, root
Corresponding 8 frequency signal of frequency synthesis is selected in default matrix frequency table according to the sequencing for sending digital in numeric string.Conversion
The 8 frequency signals that each octal number of data generates are as follows:
Sig [i] +=sigcoeff [k] * sin (2.0*M_PI*fTable [k] [num [k]] * i*T);
Wherein, fTable is matrix frequency table, and num [k] is k-th of the octal number sent the same time in numeric string
According to sigcoeff [k] is to the weighting coefficient for representing the signal of k-th of octal data in transmission numeric string, and T is period, M_
PI is π, and 0=< i < NFRAME, NFRAME are frame length, is the length of the audio frame in audio-frequency information.
In one embodiment, change data can be octal system, hexadecimal etc., raw below by taking octal system as an example
At eight frequency data-signals.8 binary datas, for one group, select corresponding position in corresponding frequency meter according to sequencing with 8
On 8 frequency signal of frequency synthesis:
Sig [i] +=sigcoeff [k] * sin (2.0*M_PI*fTable [k] [num [k]] * i*T);
FTable be 8 frequency frequency meters, num [k], for the same time send 8 data, sigcoeff be weighting coefficient with
Reduce the influence of high frequency attenuation.
Signal peak is expanded to 1 to 8 frequency signals on year-on-year basis, improves and plays gain.
The frequency of 8 frequency frequency meter fTable generates formula are as follows:
FTable [i] [j]=basefreq+ (i*FREQ_PER_GROUP+j) * (freqgap);0=< i
<FREQ_GROUP_NUM;0=< j < FREQ_PER_GROUP.
This formula is used to generate the frequency meter fTable for representing data, and FREQ_GROUP_NUM is group of frequencies number, FREQ_
PER_GROUP is every group of frequency number for including, and basefreq is fundamental frequency, and freqgap is frequency interval.
For example, one piece of data to be sent is the matrix frequency table that 76543210, fTable is a 8*8,7 are located at first
Frequency fTable [0] [7] (note: subscript is since 0) and coefficient on the 8th position of a set of frequencies are then chosen in position
sigcoeff[0]。
6 are located at the second position, then choose the frequency fTable [1] [6] and coefficient on the 7th position of second group of frequency
sigcoeff[1]。
5 are located at the third place, then choose frequency fTable [2] [5] and coefficient on the 6th position of third group frequency
sigcoeff[1]。
The rest may be inferred, generates corresponding signal respectively and is added again, i.e.,
sigcoeff[0]*sin(2.0*M_PI*fTable[0][7]*i*T)+
sigcoeff[1]*sin(2.0*M_PI*fTable[1][6]*i*T)+
sigcoeff[2]*sin(2.0*M_PI*fTable[2][5]*i*T)+
sigcoeff[3]*sin(2.0*M_PI*fTable[3][4]*i*T)+
sigcoeff[4]*sin(2.0*M_PI*fTable[4][3]*i*T)+
sigcoeff[5]*sin(2.0*M_PI*fTable[5][2]*i*T)+
sigcoeff[6]*sin(2.0*M_PI*fTable[6][1]*i*T)+
sigcoeff[7]*sin(2.0*M_PI*fTable[7][0]*i*T)。
0=< i < NFRAME, NFRAME are frame length, this signal just contains 76543210 this 8 in same amount of time
Data information.The bandwidth of 8 groups of frequencies in fTable does not overlap.
As it can be seen that through the above steps, the conventional coding means that can flexibly use in conjunction with those skilled in the art are same, just
The coding to the configuration information can be achieved, " modulation " arrives some specific frequency of sound wave in the form of digitized by configuration information
On, it is configured to the audio-frequency information for broadcasting, is associated in specific one or multiple sound channels.
Step S132, preset music score of Chinese operas file is read, is based on the music score of Chinese operas file generated music information, and by the music
Information coding is not filled by one or more sound channels of audio-frequency information into multichannel.
Similarly by taking Dolby Digital multi-channel system as an example, if the coded audio information into L channel,
The music information can be encoded in right channel.It is well known that since Dolby Digital ambiophonic system is by 5
Full frequency-domain sound channel and 1 subwoofer sound channel composition, also referred to as 5.1 sound channels, 5 sound channels be respectively it is left front, right before, it is preceding in set, it is left
It surrounds and right surrounds, music signal and audio-frequency information can actually be filled into respectively to one or more sound of this 5 sound channels
In road, a sound channel is respectively accounted for each other without limiting to.
Specifically, realizing that the process of coding is referred to following specific steps and realizes using music score of Chinese operas file:
Step a, circulation read music score of Chinese operas file.
Step b obtains the number for representing numbered musical notation.
Step c obtains the symbol for representing tone.
Step d obtains the symbol for representing beat.
Step e calculates the duration of each sound.
Step f, gives out music signal.
Step g, is filled into right channel.
The music score of Chinese operas file follows certain agreement or rule and realizes, can be realized using currently known music score of Chinese operas file
Form can also use some existing melodies, can both be provided by system default, can also be supplied to user and carry out customized set
Its source or music score of Chinese operas coding are set, as long as method of the invention is corresponded to parsing according to the agreement or rule.Such as:
In one embodiment, music score of Chinese operas file can represent the letter of " tremble, thunder, miaow, send out, search, drawing, is uncommon " using number 1-7
Spectrum, symbol+,-,=etc. respectively represent in high C tune C and reconcile the tones such as low C tune, symbol!,@, #, $, %, * respectively represent entirely
Bat, 1/2 bat, 1/4 bat, 1/8 bat, 1/16 bat, 3/2 bat and 2 bats.
Per minute 60 are defined to clap, i.e., one to clap be 1 second, the frequency of high C tune be 1047,1175,1319,1397,1568,
1760,1976};The frequency of middle C tune is { 523,587,659,698,784,880,988 };The frequency of low C tune be 262,294,
330,349,392,440,494};Unit is Hz.
3 are one group in music score of Chinese operas file, represent a sound, such as 6=!Indicate " drawing " sound for the low C tune clapped entirely, i.e. frequency
For 440Hz, the time is 1 second, and the signal calculation formula of this sound is 0.8*sin (2.0*M_PI*f*j*T) * w [j];0=< j <
Wherein f selects 440Hz, ptichTime to select 1 second to pitchTime, and w [j] is window function.Every 3 are recycled as one group of reading
Music score of Chinese operas file generates corresponding syllable and is combined into music.
As can be seen that using above-mentioned process, corresponding music information can be generated using music score of Chinese operas file, those music letter
Breath is encoded into one or more sound channels different from the audio-frequency information position of multi-channel system, establishes sound channel
Being associated between music information.
Step S133, the coded data comprising the audio-frequency information and the sound channel of music information is converted into specific format
Audio file.
After the coding of the coding and music information that complete above-mentioned audio-frequency information, corresponding coded number is just formd
According on this basis, the coding of each sound channel being independently converted into the monophone of specific format with well known mode
Audio file or the multitrack audio file for being integrally converted into specific format are completed audio-frequency information and music information
The operation of Composite tone file.As for the format of audio file, more flexibly, such as audio file formats known in wav, mp3 etc.
It can realize this conversion, by related crossover tool without enumerating.
This audio file realized, substantially by the close of the configuration information comprising access target network
Text is loaded into music information in a manner of digitized, therefore, by playing these audio files, can be carried out by sound wave
Data broadcasting.
Then, after generating the audio file, that is, corresponding playout software is called to play the audio file, to form sound wave
Signal is propagated in free space, to broadcast the ciphertext comprising configuration information.
The mobile terminal of mobile phone etc, generally be configured with corresponding audio playing software, due to audio file be according to
What specific format was converted, it can normally be identified by audio playing software, therefore, by calling audio playing software,
Play the audio file.As previously mentioned, audio file can be the audio-frequency information comprising configuration information and the sound
Two files that happy information is separately encoded, can also be integrated into same file, regardless of its way of realization, can lead to here
It crosses music player software to carry out while playing, the music information described in broadcasting while playing audio-frequency information, from there through raising
The music that sound device plays back weakens the broadcast effect of the audio-frequency information.Data are formed by playing audio-frequency information
Music is played while sound wave, is allowed the sound of broadcasting not seem dull, is improved the audio experience for playing sound, played data sound wave
While play music, song, the sound such as voice, improve the rhythmical image and timing for playing sound, improve and play listening for sound
Feel impression, and influence is transmitted without on data.Audience is capable of the music of hearing devices sending, also just can clearly know to lead to
Letter process realizes better man-machine interaction experience.
It is in order to which data sound wave caused by audio-frequency information is hidden in institute it should be pointed out that carrying out multichannel broadcasting
Within the scope of the playing duration for stating music caused by music score of Chinese operas file, musical sound is enabled to weaken data sound wave, as long as abiding by
Such substantially rule is kept, just need not emphasize the tight consistent of the broadcasting initial time of each sound channel.Also, in general, each sound
The broadcasting initial time in road, theoretically also uses restraint in coding stage, and therefore, those skilled in the art protect the present invention
The understanding of shield range should not be bound to this one can flexible technical characteristic.
By playing the audio file, data broadcasting effect is realized, so that the configuration information comprising target network
Ciphertext in the form of the appreciable acoustic signals of human ear (20Hz~20KHz) to airborne spread, in general interior space model
It in enclosing, can be received by corresponding radio equipment, to realize that data are transmitted.In the acoustic signals formed according to this form
In, since the ciphertext comprising configuration information is converted according to specific frequency point, just described to be formed by ciphertext
Transmission data are loaded into music sound wave signal in a manner of carrier wave, by related communication processing means, can be extracted wherein
Ciphertext be used.
The process of data is received the decode and extracted about to by playing the audio file, will be sent out at subsequent
It is further disclosed in bright target network cut-in method.
As can be seen that the embodiment of the disclosure above, it is sufficient to mobile phone terminal be made reliably to contain target network to spatial
The ciphertext of the configuration information of network, as long as various wireless signals enumerated above can be received and parsed to it, and solution
Close ciphertext therein finally obtains configuration information, theoretically, i.e., the target network described using configuration information access.
In addition, the general improvement project as above-described embodiment, describes please continue to refer to embodiment below, with deeper
Enter to understand the present invention.
Referring to Fig. 3, in another embodiment of target network of the present invention access guidance method, it is further provided after following
Continuous step:
Step S14, the result information fed back based on the configuration information for being originated from the intelligent terminal is obtained.
The mobile phone terminal of Central Control Function is played, is suitable for that can to know whether intelligent terminal can be successfully accessed in time described
Network, and can know this message, then need with necessary identification.Therefore, mobile phone terminal, which will acquire, is originated from intelligence eventually
The result information at end, and subsequent processing is made based on this result information.
Intelligent terminal of the invention obtain include configuration information the wireless signal of ciphertext after, it will be parsed and will be utilized
Own private key decrypts it, final to obtain the configuration information.In turn, intelligent terminal utilizes the configuration information, obtains related
The information such as service set, the password even cipher mode of target network, configure itself, the program of starting access target network,
Attempt to establish with target network and be associated with (Association), until establishing connection.Finally, based on this connection attempt as a result,
Whether successful result information is for example with several UDP message packet broadcasts (since udp protocol is opposite by characterization connection for intelligent terminal
It is unstable, therefore be suitable for once sending multiple data packets), it is sent to mobile phone terminal, in the form of ACK control frame for another example to complete
Interactive process.It should be noted that the data that intelligent terminal of the invention issues it will encrypt.Therefore, always
Mobile phone terminal in waiting state either by network frame, or passes through the forms such as UDP message packet or even sound carrier
After obtaining the response from intelligent terminal, all it is regarded as result information and is subject to subsequent processing.
Result information described in step 15, the public key decryptions using the intelligent terminal.
After no matter mobile phone terminal obtains the result information from intelligent terminal in what manner, the intelligent terminal is just utilized
Public key trial this result information is decrypted.The success or failure of decryption will affect mobile phone terminal to the legal next of intelligent terminal
The judgement in source.It similarly, can also be to being considered as intelligent end if intelligent terminal fails to receive the result information from intelligent terminal always
End fails to decrypt the information with the public key encryption, to make certain judgement.It should be noted that result letter designated herein
Breath, unrelated with the content that it is characterized, which has accessed target network either characterizing intelligent terminal, can also be with table
Sign intelligent terminal, which fails, accesses target network.Mobile phone terminal only focuses on here using asymmetric techniques and realizes product
Identification.
If step 16 determines --- it fails to decrypt to fail in the result information or scheduled duration and obtain
When taking the result information, warning information is generated.
As previously mentioned, the public key for the intelligent terminal that mobile phone terminal obtains, should be theoretically the private key phase with intelligent terminal
Match, otherwise, may infer that intelligent terminal is fake products, or although can not conclude that intelligent terminal is fake products, until
The public key being provided by it less has been tampered with.No matter which kind of situation, all have reason to mention the legitimate origin of the product or its channel
Query out.Specifically, mobile phone terminal fails when decrypting the result information, it was demonstrated that the private key of intelligent terminal is provided with it
Public key be not same to mathematically associated password pair;Mobile phone terminal fails when obtaining the result information, also pole
It is possible that because intelligent terminal cannot be decrypted correctly mobile phone terminal and no result information is caused to ring using the data of the public key encryption
It answers, therefore also turns out that the private key of intelligent terminal with its public key provided is not same to mathematically associated password pair.This feelings
Under condition, mobile phone terminal can be by user interface display alarm message, or by loudspeaker sonorous alarm etc., generates alarm letter
Breath.Further, if equipped with the technology alerted when cannot decrypt the ciphertext from mobile phone terminal when it in intelligent terminal
Means, then user can more clearly determine whether that this identity is tested with the respective warning information of intelligent terminal by mobile phone terminal
Card process receives the influence of signal of communication stability, to be conducive to exclude necessary interference, Accurate Diagnosis leads to intelligent terminal
The problem of target network can not be accessed.
As it can be seen that the embodiment of above-mentioned extension, further the advantages of performance asymmetric encryption techniques, determines intelligence eventually for user
The legal identity at end and for user check connectivity problem provide convenient and fast technical foundation.
It should be pointed out that in some scenes above-mentioned, it is indicated that in some cases, mobile phone terminal is transmitted to intelligent terminal
When configuration information, the public key for the password centering that it is voluntarily generated also is transmitted to intelligent terminal, is safer for the ease of ensuring
Data laser propagation effect.In these scenes, mobile phone terminal can be connect it for computational efficiency and communication security consideration is improved
The data from the intelligent terminal received, only when can be with the private key successful decryption for the password centering that mobile phone terminal voluntarily generates
When, the progress of these data just can be perceived into expression processing, express that it with audio, video, picture and text, the sound and other effects, be
User is perceived.
It can be seen that target network of the invention accesses guidance method, realizes safer reliably propagate and access mesh
The method for marking the configuration information of network, can more effectively guide external smart terminal and more safely access in target network.
In intelligent terminal side, due to needing the foundation between the mobile phone terminal for sending the ciphertext comprising configuration information corresponding
Property, therefore, it is possible to be realized by target network cut-in method of the invention.
Referring to Fig. 4, target network cut-in method of the invention includes the following steps:
Step S21, external wireless signals are read to be parsed, obtains wherein entrained ciphertext.
In the access guidance method that aforementioned related mobile phone terminal is realized, give a variety of for propagating the nothing of the ciphertext
Line signal form, preferred two kinds of wireless signals, one is the work realized based on WiFi technology data link layer network
Frame, another kind is can acoustic signals characterized by auditory frequency range by human ear.And in former wireless signal, then it can be flexible
(such as management frame, data frame) is propagated on ground with different types of network frame, depends on those skilled in the art how clever completely
R. concomitans WiFi Direct standard and Ad-Hoc standard living.And latter wireless signal, then it needs with corresponding decoding technique
To obtain the ciphertext that acoustic signals are included.Anyway, data are obtained from wireless signal, are that number is loaded in wireless signal
According to inverse process, the embodiment stated before this invention provides full and accurately to be realized and loads data into skill in wireless signal
On the basis of art scheme, it will be appreciated by those skilled in the art that even if the description subsequently with respect to each embodiment can not be detailed, it can also
Voluntarily the loading technique according to aforementioned announcement knows subsequent corresponding scheme, that is, using mobile phone terminal realization come certainty
The realization of ground acquisition intelligent terminal.It is provided nevertheless, those skilled in the art still can refer to several times for several different situations
Related acquisition ciphertext explanation it is of the invention to understand:
One is directed to the case where transmitting ciphertext based on 802.11 agreements (WiFi technology):
No matter which kind of mode intelligent terminal is accessed using in the aforementioned guidance method implemented in relation to mobile phone terminal, works as the two
When based on establishing point-to-point direct-connected relationship, data frame transfer data can be passed through;Even if the two fails to establish point-to-point direct-connected pass
System can also realize that data are transmitted, therefore, whether based on WiFi Direct by the frame format of control frame, management frame etc
Technology is still based on Ad-Hoc technology, in spite of point-to-point notional direct-connected relationship is established, can pass through various forms
With 802.11 protocol formats expression work the network frame of data link layer come realize mobile phone terminal to intelligent terminal transmit
It carries and contains the purpose of the ciphertext of target network configuration information.Correspondingly, intelligent terminal can be according to WiFi
The technical specifications such as Direct, Ad-Hoc, to its received wireless signal carry out the parsing of correspondence, therefrom obtain described close
Text.Obviously, it to be farthest compatible with prior art standard, and realizes in an optimal manner, as an exemplary embodiments,
Intelligent terminal is suitable for being switched to itself, or default is in service node (AP) mode of WiFi Direct standard,
The ciphertext sent is corresponded to according to respective protocol with the mobile phone terminal outside receiving.Configuration in intelligent terminal later use ciphertext
Information configuration from behind, then by the workstation mode for itself switching back into WiFi Direct standard so as to complete access mesh
Mark the movement of network.
Secondly, for based on acoustic signals transmission ciphertext the case where:
As previously mentioned, mobile phone terminal is by digitized processing, the ciphertext for containing configuration information is special with one or more
The form for determining the carrier wave of frequency point is loaded into formation audio file in melody and plays out, and when its broadcasting, that is, is formed and contains carrier wave
The wireless acoustic signals of signal, the ciphertext are to load on the load of at least one specific frequency point of airborne acoustic signals
In wave.Therefore, the premise for obtaining the ciphertext in acoustic signals is parsed to acoustic signals, and number is converted analog signals into
Change data to be handled.
In view of the correspondence of intelligent terminal and mobile phone terminal, corresponding microphone circuit should be arranged to receive in intelligent terminal
Via the acoustic signals of spatial.Nature should have accordingly it is also to be understood that in hardware realization to the received sound of institute
Wave signal carries out the respective chip that based on simulation or based on number mode is decoded.Theoretically, audio is received
For circuit, can not understand whether be music and multichannel, therefore, it is necessary to carry out technical identification.Carry out technology identification
Mode is varied, and the following two ways that provides is for those skilled in the art's reference:
First way is the mode based on analog filtering processing:
Intelligent terminal passes through the acoustic signals that its radio reception circuit obtains, and source is varied, only above-mentioned by the present invention
The acoustic signals from mobile phone terminal for being loaded with ciphertext, which are only, really needs processed object.And the sound propagated in the sky
Wave signal carries out in an analog manner, therefore, can be according to shown in fig. 5 as under type extraction contains configuration information
Ciphertext:
Step a, according to given frequency, acoustic signals are filtered, obtain corresponding carrier signal.
The received acoustic signals of institute include multiple carrier waves, the carrier wave therein contained where the ciphertext of configuration information, root
Either one or more according to aforementioned, therefore, intelligent terminal (can correspond to aforementioned guiding according to scheduled frequency
Frequency listed by the frequency configuration file of method) acoustic signals are filtered, corresponding carrier signal is obtained, the carrier signal
It just include the relevant content of the ciphertext.
Step b, digitized sampling is carried out to the carrier signal, obtains corresponding digitalized data.
Because the acoustic signals are substantially analog signals, it is necessarily required in radio reception circuit to filtered
Carrier signal carries out analog-to-digital conversion, to obtain the data comprising ciphertext of number.
Step c, the digitalized data is decoded, obtains the configuration information comprising access target network
Ciphertext.
Decoding designated herein, because it is only necessary to the digitalized datas to filtered carrier signal to be decoded, because
This will become more simple, and those skilled in the art provide according to cataloged procedure above-mentioned in conjunction with latter technique identification method
Reference, can realize and decode according to its inverse process, the final ciphertext for containing configuration information accordingly that obtains is for rear continued access
Enter target network.
The second way is the processing mode of pure digi-tal.
Since digit chip is widely used in most intelligent terminals, in this case, radio reception circuit has received from the air
After the carrier signal, then advanced row digital-to-analogue conversion carries out subsequent processing to the data after conversion.Corresponding processing side
Formula has correspondence with cataloged procedure above-mentioned certainly, following to disclose corresponding step for those skilled in the art referring to understanding:
Following detailed step is taken in order to realize the purpose firstly the need of synchronous alignment decoding data head:
Step A1 saves continuous 3 frame audio.Data head is two 16 system numbers.
Step A2 calculates the frequency that intermediate frame includes.
Step A3 calculates the corresponding number of frequency.
Step A4 judges whether number is data head, if it is, entering step 405.
3 frame audio molecule frames are calculated the corresponding number of each subframe by step A5.
Step A6, if the corresponding number of at least continuous 4 subframes is equal to data head.
Step A7, decoding data head.
Step A8, copy remaining data are used for decoding data head, and remaining data have synchronized alignment.
In one embodiment, the audio frame for obtaining load change data detects each audio using goertzel algorithm
Multiple frequencies that frame includes, and save loudness of a sound energy corresponding with multiple frequencies;It can be obtained using Goertzel rudimentary algorithm
Frequency real and imaginary parts identical with conventional discrete Fou-rier transformation (DFT) or FFT.According to loudness of a sound energy from high to low suitable
Sequence calculates the data that each frequency includes in multiple frequencies and carries out RS decoding, and is converted back according to interleaving rule when encoding
Original sequence;When judging that error-detecging code is correct, then it is judged as transmission data.
Secondly, needing decoded version number and data length.Specifically include following sub-step:
Step B1 obtains the audio frame for being loaded with version number and data length.
Step B2 detects the frequency that every frame includes using goertzel algorithm.
Step B3 calculates the corresponding data of each frequency.
Step B4 carries out rs decoding when data are 6 full.The algorithm that data number and the RS coding that this step obtains use
Correlation, such as RS (7,3) etc..
Step B5, error-detecging code create-rule when according to coding calculate error-detecging code.
Step B6, B7 judges whether version number matches and whether the error-detecging code received is correct, if it is, into
Step B8: data length successfully decoded starts decoding data.
Finally, decoding includes the data of ciphertext.It sees below:
Step C1 obtains the audio frame of transmission data.
Step C2 detects the frequency that every frame most probable includes using goertzel algorithm, while saving next may include
Frequency, and save the ratio of corresponding energy.
Step C3 calculates the data that most probable includes and the data that next may include according to frequency.
Step C4, interleaving rule when according to coding transform the data into back correct sequence.
Step C5, each section is all first done rs decoding with the data that most probable includes.
Step C6 judges whether every section of error-detecging code is correct, if yes then enter step C8, judges that last error-detecging code is
It is no correct.If it is not, then entering step C7, most probable on corresponding position is successively replaced according to the sequence of energy ratio from big to small
The data for including are the data that next may include, and make RS decoding.
Step C9 successively judges whether every section of error-detecging code is correct after replacement, if yes then enter step C8, if otherwise
It enters step C11: realigning and find data head.
By executing above-mentioned step, corresponding transmission data can be finally obtained, also can be obtained described contain
The ciphertext of configuration information.
According to the above-mentioned announcement to two embodiments for obtaining the ciphertext comprising configuration information, could be aware that, intelligent terminal
Obtain that mobile phone sends contains the ciphertext of configuration information, therefore, can execute subsequent step.
The ciphertext is decrypted in the pre-stored private key of step 22, reading, obtains configuration information wherein included.
As previously mentioned, the password of intelligent terminal to be it is just generated when leaving the factory, in its production process, password centering
Private key be written into corresponding chip, therefore, intelligent terminal can read this pre-stored own private key, and use
The ciphertext obtained is decrypted in corresponding asymmetric encryption techniques algorithm, and decrypting resulting data is to be used to access mesh
Mark the configuration information of network.It should be noted that between algorithm used in algorithm used in mobile phone terminal and intelligent terminal
It is inevitable consistent.Due to the data using private key decryption public key encryption, or otherwise utilize the data of public key decryptions private key encryption
Technology is well known to those skilled in the art, therefore without repeating.
In variants of the invention, to determine improper communication convenient for user, when using the private key to the ciphertext progress
After decryption failure, the components such as driving sound, light are issued the first warning information by intelligent terminal, and user thus can be true from intelligent terminal
Know that the held public key of mobile phone terminal is illegal.It on the other hand, can also be with this case where private key for attempting Brute Force intelligent terminal
Kind mode is identified.
In another variants, it is unsuccessfully derived from data transmission quality bad the case where causing in order to exclude private key decryption, intelligence
Terminal will utilize one result information of its private key encryption, and by the result information with control frame or data frame even acoustic signals it
The form of class feeds back to mobile phone terminal and does corresponding identification, if mobile phone terminal can utilize the public key decryptions result information, two-phase
In conjunction with that can know that communication quality is bad, if mobile phone terminal is also warned, in conjunction with warning for intelligent terminal, then mobile phone end can determine
Held public key and the held private key of intelligent terminal is held to mismatch.
Corresponding to the variants that mobile phone terminal is realized, when also accompanying includes voluntarily to be generated by mobile phone terminal in the ciphertext
Public key when, the present invention will also read the public key, after subsequent intelligent terminal access target network, will utilize the outside public key encryption
Data are transferred to the mobile phone terminal as public key provider, and using the public key decryptions mobile phone terminal transmit come data.
Due to the variable-key that mobile phone terminal voluntarily generates, it has been cured different from the key of intelligent terminal, so, utilize new public key
Communicating with private key will become safer.
Step 23 configures itself using the configuration information and accesses the target network.
After intelligent terminal obtains the configuration information of decryption in the manner previously described, corresponding SSID, password can be obtained very
To its cipher mode, then ensuring itself to be under workstation mode, accessed using the WiFi of these information configurations itself
Setting starts linker, final to establish the connection for arriving the target network.
In the case of certain, in order to realize more preferably human-computer interaction, refering to described previously, whether intelligent terminal can will succeed
The consequential signal of the access target network, with WiFi signal (network frames of 802.11 agreements), Bluetooth signal, acoustic signals
Forms such as (similarly with guidance methods of the invention) are back to the source for sending configuration information.A more easy implementation
It is that the alarm signal of light and/or sound is carried out by the LED light or the Alarm Unit of buzzer etc that are mounted on this intelligent terminal
Confirmation forms the second warning information.Wherein, this notice is realized by Alarm Unit, primarily to human perception is looked after,
And by sending consequential signal, then the communication of intelligent terminal and mobile phone terminal can be achieved, understood and carried out such as by mobile phone terminal
The preceding utilization, without repeating.It still needs to emphasize, the delivering path of consequential signal is varied, but has succeeded for characterization
It accesses for the consequential signal of target network, is suitable for broadcasting the data packets of several UDP formats to notify mobile phone terminal, so as to hand
Machine terminal handles subsequent matters as previously described accordingly.And after logging in target network failure with the configuration information, such as
Preceding described, intelligent terminal can be used as consequential signal by 802.11 agreements in data link layer or the broadcast table in the form of acoustic signals
Sign logs in the network frame of the target network failure.
It needs to be illustrated, the public key of the intelligent terminal when leaving the factory, can be attached directly to the shell of intelligent terminal
On one Visualization region of body defined, it is especially on the Visualization region with text or recognizable figure
Two dimensional code expresses the public key, subject to machine recognition.Currently, the packaging dispatched from the factory together with intelligent terminal can also be printed on
On box or gummed paper, carrier of the gummed paper as two dimensional code, also be may be affixed on the shell of intelligent terminal when necessary.
In addition, corresponding to a variants of aforementioned announcement, with quick response code form come when expressing public key, due to the number of two dimensional code
It is larger according to amount of storage, therefore, log-on message when intelligent terminal being under the service node mode of WiFi Direct standard,
It can also be contained in together in content expressed by the two dimensional code, so that mobile phone terminal need to only scan the two dimensional code, can obtain simultaneously
The public key and log-on message for obtaining intelligent terminal make mobile phone terminal be successfully accessed intelligent end with the log-on message configurating mobile terminal
End.
It could be aware that intelligent terminal only needs by the target network cut-in method for being implemented in intelligent terminal disclosed above
Reception includes that a series of processing can be completed in the wireless signal for the ciphertext of configuration information for accessing target network, it is not necessary to artificial
Intervene, moreover, the communication technology based on safety and extraneous progress data interchange, whole process are apparently more safe and simple, high
Effect.
Further, modularized thoughts are based on, the present invention will provide corresponding device based on various methods above-mentioned.
Referring to Fig. 6, a kind of mobile phone terminal of the present invention, including scanning element 11, encryption unit 12 and propagation
Unit 13 is illustrated with regard to the function that each unit is realized below.
The scanning element 11, for calling two-dimensional code scanning user interface to obtain the public key of intelligent terminal.
As in the preceding description in relation to scene, intelligent terminal provides corresponding in such a way that two dimensional code carries out Visualization
Public key, mobile phone terminal activate two-dimensional code scanning functional module, wait user's by the user interface of its two-dimensional code scanning of calling
Scan operation.After two dimensional code of the mobile phone terminal to nearly intelligent terminal is expressed region by user, the public key of intelligent terminal can be obtained.
If it is made itself to be under service node (AP) mode by intelligent terminal based on what WiFi Direct technology was realized
Service set (SSID), the password even log-on messages such as cipher mode and the public key be together according to well known two
Dimension code coding rule is encoded in two dimensional code, which naturally also can obtain institute by corresponding decoding program
The log-on message is obtained while the public key stated, in later use.As known to those skilled in the art how by the public affairs
Key and the log-on message are encoded to the technological means in two dimensional code under the premise of abiding by two dimensional code coding rule, for this reason
It does not repeat.
The encryption unit 12, it is close to be formed for the configuration information using public key encryption access current goal network
Text.
It is well known that not only having WiFi mould group, display, control chip on mobile phone, also there is microphone, loudspeaker
Equal components, these components can be implemented to call by the APP installed on mobile phone terminal, thus, mobile phone terminal of the invention passes through
An APP is loaded to realize its functional module.
Due to the main object of the present invention be in order to handle network access technique, the target network being currently accessed, just
Refer to network representated by WiFi AP that mobile phone is just accessing at present, and the configuration information, it is also to access the target network
Required login authentication information.According to the agreement of WiFi agreement, those skilled in the art be could be aware that, these information generally include
The service set (SSID) and login password of WiFi wireless routing (representing target network), also need in some cases include
The cipher mode of login password, and login password can also be needed not be provided for open network.Although there are versions for WiFi agreement more
For the fact, but these be related to realize access network and indispensability configuration information can by those skilled in the art according to agreement text
Part is corresponding to be determined, therefore, is repeated here to its details and its change programme.
When mobile phone terminal itself accesses target network, by the Beacon frame of scanning WiFi AP, or pass through transmission
Probe Request frame provides modes such as the response frame Probe Response that obtains WiFi AP, or with user in APP
Interface on active setting match, to determine a service set, i.e. SSID determines that one to be accessed with this
WiFi AP network is also that a target network to be accessed has been determined.Then, mobile phone terminal will usually be obtained to user with
The corresponding login password of the SSID (except open network), corresponding cipher mode such as WPA, WPA2, WEP and its details
Deng, can both have been selected by user and also by mobile phone terminal by its WiFi mode realize automatic identification.After obtaining these basic informations,
By a series of conventional association (Association) operation, mobile phone terminal can be accessed to the target network, as a result, hand
Configuration information needed for machine terminal also just obtains access target network.These configuration informations were both potentially stored in the machine,
It can be only stored in running memory, depending on default option of the user when network insertion option is arranged.In general, can lead to
The configuration file about network insertion of lookup the machine is crossed to recognize its archive to the configuration information of network.It is real in certain applications
In example, also can provide a series of interfaces obtain user to service set scan select and its corresponding password, from
And determine corresponding configuration information.
Once obtaining the configuration information, encryption unit 12 can be carried out it using well known asymmetric encryption techniques
Encryption, encrypted content form ciphertext, which needs to decrypt using the own private key of intelligent terminal, so as to correct
Obtain configuration information therein.
If, can be by mobile phone end as previously described for the communication security reinforced between subsequent mobile phone terminal and intelligent terminal
The encryption unit 12 at end generates a pair of of new key using asymmetric encryption techniques, and mobile phone terminal stores its own key, and by its
Public key, which is appended hereto the configuration information and encrypts together, forms ciphertext, awaiting transmission.
The propagation unit 13, for passing through ciphertext described in radio signal propagation.
The ciphertext constitutes a kind of guide formula data, is propagated by wireless signal, receives this ciphertext
Intelligent terminal can realize logic, the information for being included using the ciphertext, to realize access target network according to intrinsic program
The purpose of network.
The circulation way of ciphertext, the realization dependent on the communication link between mobile phone terminal and intelligent terminal.Before such as
The scene and its flexible situation of change, it will be understood that, can be at least using two kinds of thinkings of WiFi standard and acoustic signals as axis
Develop out following several implementations:
It is described close to transmit that one, the public key for obtaining intelligent terminal simultaneously and log-on message silence establish communication link
Text.
The case where log-on message of itself is published on its two dimensional code suitable for intelligent terminal, the present invention are single in the scanning
When member 11 calls two-dimensional code scanning user interface to be scanned two dimensional code, i.e., public key and the login of intelligent terminal are obtained simultaneously
Log-on message needed for intelligent terminal.Mobile phone terminal disconnects the connection with target network, what further calling mobile phone terminal was equipped with
Unit is logged in, after which configures itself using the log-on message, accesses the intelligence being under service node mode
Terminal, to establish point-to-point communication link.Then, propagation unit 13 can 802.11 agreements data link layer number
According to the format of the frame ciphertext described to intelligent terminal transmission.After intelligent terminal receives corresponding wireless signal, benefit is decrypted to it
With.After waiting intelligent terminal completion configuration information reception, when being voluntarily switched to workstation mode trial access target network, hand
The communication link of machine terminal and intelligent terminal disconnects, and just can be self-healing the connection of mobile phone terminal and target network.This process
Realization, do not depart from actually the technical foundation such as WiFi Direct or AD-Hoc a kind of convenience use, may be implemented one
Key operation, those skilled in the art should know.
Secondly, logged in by one unit according to predetermined protocol scanning discovery and establish with the communication link of intelligent terminal with
Transmit ciphertext.
The login list provided by the point-to-point communication technology of WiFi Direct or Ad-Hoc etc, calling mobile phone terminal
Protocol rule of the member according to default, by shaking hands and connective methods, in the mobile phone terminal for being loaded with APP of the present invention and outer
Communication link is established between one or more smart machine of portion, or only detects the ciphertext hiding in one or more
It detects in (such as Probe Request), is radiated in the form of WiFi signal in space and realize broadcast.It is some typical refering to aforementioned
In example, be based on WiFi Direct technology, intelligent terminal default be in AP operating mode, wait mobile phone terminal with STA mode into
Row is shaken hands and is associated with, to realize access, mobile phone terminal can be transmitted by data frame to intelligent terminal in the case where access
The ciphertext.But if having improved rendezvous protocol rule between intelligent terminal and mobile phone terminal, only need a side
Ciphertext is loaded in one or more of detection frames or in other management frames or control frame, another party also can get this
(in this case, the company that can really transmit data frame is not implemented in mobile phone terminal and intelligent terminal to the ciphertext that a little frames are included
Connect state).Intelligent terminal is either in a manner of connection status, or after receiving configuration information in a manner of notconnect state,
Then STA mode is switched back into, the target network is accessed.
It can be seen that can use a variety of based on the existing various technological visions of WiFi and its neighboring technology specification
Improved means realize the foundation of the communication link between mobile phone terminal and intelligent terminal, and the ciphertext is passed through
Including control frame, management frame, data frame it is various using 802.11 agreements as standard network frame formed wireless signal into
Row transmission.
Thirdly, non-under the WiFi connection status, the ciphertext that utilizes acoustic signals broadcast described.
The present invention can get rid of the peripheries such as WiFi Direct and Ad-Hoc technical standard, by making the ciphertext
At the acoustic signals to spatial, to realize the effect to the intelligent terminal transmission configuration information.In order to realize this
Effect discloses the generating process of acoustic signals in detail below:
Firstly, propagation unit 13 call its be equipped with generation module, will include the ciphertext of the configuration information (when necessary
The public key that separately generates of asymmetric techniques is used including mobile phone) audio file is synthesized with preset music score of Chinese operas information.
It is described close comprising configuration information in the present embodiment different from the technology carried out data transmission using WiFi signal
Text is to realize that the wireless transmission of data is carried out into acoustic signals by carrier wave, belongs to data to be transmitted.Due to mobile phone
It is provided with loudspeaker assembly and its coding, decoding chip etc. in terminal, therefore, passes through the function of those existing components of calling mobile phone
Energy interface, can be realized communication function.In order to which this wireless transmission method is better achieved, need to do data to be transmitted as follows
The processing of process.It is related to the specific steps of the process incorporated by reference to Fig. 2, and refering to following:
Step S131, a preset frequency configuration file is called, the ciphertext is transformed into the frequency configuration file
Become audio-frequency information on listed corresponding frequency of sound wave, by this coded audio information to the more of such as Dolby Digital etc
In one or more sound channels of sound channel system.The audio-frequency information just establishes digitized association with corresponding sound channel as a result,.It needs
It should be noted that the frequency configuration file is the carrier for being stored multiple frequency point datas, certainly, if Frequency point compared with
To be simple, also frequency point may not necessarily be stored in the form of a file.
As a more specific embodiment for realizing above-mentioned cataloged procedure, array is generated with the ciphertext, it will
Data head data are added in ciphertext array.The check code and error correcting code of calculated version number and ciphertext length, version number are digital, close
Literary length, the check code of version number and ciphertext length and error correcting code form edition data, and edition data is added to ciphertext array
In.Then, ciphertext to be transmitted is subjected to segment processing, the identical multistage subdata of formation length, and is the life of every cross-talk data
At error-detecging code and error correcting code, every cross-talk data, the error-detecging code of every cross-talk data and error correcting code are formed into segment data, by segments
According to being added in ciphertext array.Cross processing is carried out to multiple segment datas.Come in fact specifically, being referred to following steps
It is existing:
Step A, reading frequency configuration file.
Step B, addition represent 16 binary digits of data head to array.
Step C, calculated version number (16 system) and data length (16 system) error-detecging code and error correcting code.
Version number and data length and its error correcting code are added to array by step D.
Character string (8 system) to be sent by sound wave is segmented by step E.
Step F judges whether to final stage, if it is, entering step D, adds the error detection of final stage data
Code;If it is not, then entering step F, error-detecging code and error correcting code are all added to every one piece of data.
Every one piece of data and its error-detecging code and error correcting code are added in array by step G.
Step H, polishing array is vacant, by 0 polishing of remaining digit.This array is 2 dimension groups.A number can be used
Group also can be used different arrays and place version number and data length and its error correcting code, every one piece of data etc..
Data in array are done interleaving processing by step I.
Data head is generated single-frequency acoustic signals by step J.
Version number and data length and its error correcting code are generated three frequency acoustic signals by step K.
Data after interleaving and its error-detecging code and error correcting code are generated eight frequency acoustic signals by step L.
Step M does gain compensation to acoustic signals.
Step N adds time window, generally smoothing windows to the acoustic signals of each syllable.
Several variants are disclosed further for those skilled in the art below in conjunction with each detailed step of above-mentioned cataloged procedure
Member's reference:
In one embodiment, version number is 16 system number D0, transmission data length is 2 16 system numbers D1, D2;Version
Number and transmission data length check code be D3.If D1 is not equal to 0, D3=(D1*D2+D0) %16 not equal to 0 and D2;
Otherwise, D3=(D1+D2+D0) %16.
RS is carried out to the numeric string of the check code composition of version number, transmission data length, version number and transmission data length
Encoding operation generates the RS code including error correcting code.
For example, build version number and data length error-detecging code: in array, data [0] is 16 system version numbers, data
[1], data [2] is 16 binary data length, and data [3] is error-detecging code.If data [1]!=0&&data [2]!=0, then
Data [3]=(data [1] * data [2]+data [0]) %16;Otherwise data [3]=(data [1]+data [2]+data
[0]) %16.
In one embodiment, each number in every cross-talk data multiplied by preset weighting coefficient and is summed, is then removed
With 8 generate quotient with remainder, then by quotient with remainder sum divided by 8 modulus, generate the error-detecging code of every cross-talk data;To every cross-talk number
Carry out RS encoding operation according to the numeric string of the error-detecging code composition of, every cross-talk data, generate include error correcting code RS code.
Cross processing is carried out to multiple segment datas are as follows: obtain multiple segment datas from transmission array of data;It will be each
Segment data is filled into matrix by row, and extracts multi-group data by Leie time from this matrix, forms change data.It will conversion
Data replacement segment data is added in transmission array of data.
In one embodiment, segment data error detection code generation method are as follows: first multiplied by weighting coefficient and ask every segment data
With, then will with divided by 8 generate quotient with remainder, then by quotient with remainder sum divided by 8 modulus.Final data error-detecging code generation side
Method are as follows: all data are added, then will with divided by 8 modulus.The error correction code generation method of each segment data are as follows: inner-institute
Sieve door code.The method of interleaving are as follows: data are first filled into matrix by row, are then extracted by column.
The data transmission method based on multifrequency sound wave in above-described embodiment, disperses continuous mistake by the way of interleaving,
Error correction anti-interference ability is improved, and generates the RS code for having error correcting code, using two kinds of error detection modes and two kinds of error correcting system mixing
It uses, can be improved error correction anti-interference ability.
In one embodiment, single-frequency data head signal generates, according to 16 binary data head data in data head frequency meter
The middle method chosen data and generate simple signal are as follows: default single-frequency frequency meter selects in single-frequency frequency meter according to data head data
Access is according to generation simple signal: simple signal are as follows:
sin(2.0*M_PI*twofTable[0][num1]*i*T);
TwofTable is single-frequency frequency meter, and as 2 dimension groups, num1 is data head data, for example, working as data head data
When num1=3, the data of the position of twofTable [0] [3], as required frequency are searched.T is the period, M_PI π, 0=<
I < NFRAME, NFRAME are frame length, are the length of the audio frame in audio-frequency information.TwofTable is single-frequency frequency meter, frequency
It is staggered with multifrequency frequency meter, num1 is data head data.
In one embodiment, three frequency frequency meters are set, 3 frequency signals are generated to edition data.By the version number of 16 systems
3 are divided into multiple groups of data for one group accordingly, select corresponding frequency synthesis 3 to believe frequently in three frequency frequency meters according to sequencing
Number.
3 frequency signals are respectively as follows:
0.3*sin(2.0*M_PI*threefTable[0][num1]*i*T)、
0.3*sin(2.0*M_PI*threefTable[1][num2]*i*T)、
0.4*sin(2.0*M_PI*threefTable[2][num3]*i*T));
ThreefTable is three frequency frequency meters, and num1, num2, num3 is 3 numbers in the group data sent the same time
According to T is the period, and M_PI π, 0=< i < NFRAME, NFRAME are frame length, is the length of the audio frame in audio-frequency information.
In one embodiment, three frequency version numbers and data length signal are generated are as follows: 16 system version numbers and data length
With 3 for one group, the 3 frequency signal of frequency synthesis on corresponding position is selected in corresponding frequency meter according to sequencing
(0.3*sin(2.0*M_PI*threefTable[0][num1]*i*T)+
0.3*sin(2.0*M_PI*threefTable[1][num2]*i*T)+
0.4*sin(2.0*M_PI*threefTable[2][num3]*i*T));
Wherein threefTable is 3 frequency frequency meters, and num1, num2, num3 is 3 signals sent the same time.
Expand signal peak on year-on-year basis to signal to 1, improves and play gain.
In one embodiment, matrix frequency table is preset, obtains change data from transmission array of data, change data is
Octal data.It is one group with 8 octal numbers and change data is divided into multiple transmission numeric strings sent in the same time, root
Corresponding 8 frequency signal of frequency synthesis is selected in default matrix frequency table according to the sequencing for sending digital in numeric string.Conversion
The 8 frequency signals that each octal number of data generates are as follows:
Sig [i] +=sigcoeff [k] * sin (2.0*M_PI*fTable [k] [num [k]] * i*T);
Wherein, fTable is matrix frequency table, and num [k] is k-th of the octal number sent the same time in numeric string
According to sigcoeff [k] is to the weighting coefficient for representing the signal of k-th of octal data in transmission numeric string, and T is period, M_
PI is π, and 0=< i < NFRAME, NFRAME are frame length, is the length of the audio frame in audio-frequency information.
In one embodiment, change data can be octal system, hexadecimal etc., raw below by taking octal system as an example
At eight frequency data-signals.8 binary datas, for one group, select corresponding position in corresponding frequency meter according to sequencing with 8
On 8 frequency signal of frequency synthesis:
Sig [i] +=sigcoeff [k] * sin (2.0*M_PI*fTable [k] [num [k]] * i*T);
FTable be 8 frequency frequency meters, num [k], for the same time send 8 data, sigcoeff be weighting coefficient with
Reduce the influence of high frequency attenuation.
Signal peak is expanded to 1 to 8 frequency signals on year-on-year basis, improves and plays gain.
The frequency of 8 frequency frequency meter fTable generates formula are as follows:
FTable [i] [j]=basefreq+ (i*FREQ_PER_GROUP+j) * (freqgap);0=< i
<FREQ_GROUP_NUM;0=< j < FREQ_PER_GROUP.
This formula is used to generate the frequency meter fTable for representing data, and FREQ_GROUP_NUM is group of frequencies number, FREQ_
PER_GROUP is every group of frequency number for including, and basefreq is fundamental frequency, and freqgap is frequency interval.
For example, one piece of data to be sent is the matrix frequency table that 76543210, fTable is a 8*8,7 are located at first
Frequency fTable [0] [7] (note: subscript is since 0) and coefficient on the 8th position of a set of frequencies are then chosen in position
sigcoeff[0]。
6 are located at the second position, then choose the frequency fTable [1] [6] and coefficient on the 7th position of second group of frequency
sigcoeff[1]。
5 are located at the third place, then choose frequency fTable [2] [5] and coefficient on the 6th position of third group frequency
sigcoeff[1]。
The rest may be inferred, generates corresponding signal respectively and is added again, i.e.,
sigcoeff[0]*sin(2.0*M_PI*fTable[0][7]*i*T)+
sigcoeff[1]*sin(2.0*M_PI*fTable[1][6]*i*T)+
sigcoeff[2]*sin(2.0*M_PI*fTable[2][5]*i*T)+
sigcoeff[3]*sin(2.0*M_PI*fTable[3][4]*i*T)+
sigcoeff[4]*sin(2.0*M_PI*fTable[4][3]*i*T)+
sigcoeff[5]*sin(2.0*M_PI*fTable[5][2]*i*T)+
sigcoeff[6]*sin(2.0*M_PI*fTable[6][1]*i*T)+
sigcoeff[7]*sin(2.0*M_PI*fTable[7][0]*i*T)。
0=< i < NFRAME, NFRAME are frame length, this signal just contains 76543210 this 8 in same amount of time
Data information.The bandwidth of 8 groups of frequencies in fTable does not overlap.
As it can be seen that through the above steps, the conventional coding means that can flexibly use in conjunction with those skilled in the art are same, just
The coding to the configuration information can be achieved, " modulation " arrives some specific frequency of sound wave in the form of digitized by configuration information
On, it is configured to the audio-frequency information for broadcasting, is associated in specific one or multiple sound channels.
Step S132, preset music score of Chinese operas file is read, is based on the music score of Chinese operas file generated music information, and by the music
Information coding is not filled by one or more sound channels of audio-frequency information into multichannel.
Similarly by taking Dolby Digital multi-channel system as an example, if the coded audio information into L channel,
The music information can be encoded in right channel.It is well known that since Dolby Digital ambiophonic system is by 5
Full frequency-domain sound channel and 1 subwoofer sound channel composition, also referred to as 5.1 sound channels, 5 sound channels be respectively it is left front, right before, it is preceding in set, it is left
It surrounds and right surrounds, music signal and audio-frequency information can actually be filled into respectively to one or more sound of this 5 sound channels
In road, a sound channel is respectively accounted for each other without limiting to.
Specifically, realizing that the process of coding is referred to following specific steps and realizes using music score of Chinese operas file:
Step a, circulation read music score of Chinese operas file.
Step b obtains the number for representing numbered musical notation.
Step c obtains the symbol for representing tone.
Step d obtains the symbol for representing beat.
Step e calculates the duration of each sound.
Step f, gives out music signal.
Step g, is filled into right channel.
The music score of Chinese operas file follows certain agreement or rule and realizes, can be realized using currently known music score of Chinese operas file
Form can also use some existing melodies, can both be provided by system default, can also be supplied to user and carry out customized set
Its source or music score of Chinese operas coding are set, as long as the present invention is corresponded to parsing according to the agreement or rule.Such as:
In one embodiment, music score of Chinese operas file can represent the letter of " tremble, thunder, miaow, send out, search, drawing, is uncommon " using number 1-7
Spectrum, symbol+,-,=etc. respectively represent in high C tune C and reconcile the tones such as low C tune, symbol!,@, #, $, %, * respectively represent entirely
Bat, 1/2 bat, 1/4 bat, 1/8 bat, 1/16 bat, 3/2 bat and 2 bats.
Per minute 60 are defined to clap, i.e., one to clap be 1 second, the frequency of high C tune be 1047,1175,1319,1397,1568,
1760,1976};The frequency of middle C tune is { 523,587,659,698,784,880,988 };The frequency of low C tune be 262,294,
330,349,392,440,494};Unit is Hz.
3 are one group in music score of Chinese operas file, represent a sound, such as 6=!Indicate " drawing " sound for the low C tune clapped entirely, i.e. frequency
For 440Hz, the time is 1 second, and the signal calculation formula of this sound is 0.8*sin (2.0*M_PI*f*j*T) * w [j];0=< j <
Wherein f selects 440Hz, ptichTime to select 1 second to pitchTime, and w [j] is window function.Every 3 are recycled as one group of reading
Music score of Chinese operas file generates corresponding syllable and is combined into music.
As can be seen that using above-mentioned process, corresponding music information can be generated using music score of Chinese operas file, those music letter
Breath is encoded into one or more sound channels different from the audio-frequency information position of multi-channel system, establishes sound channel
Being associated between music information.
Step S133, the coded data comprising the audio-frequency information and the sound channel of music information is converted into specific format
Audio file.
After the coding of the coding and music information that complete above-mentioned audio-frequency information, corresponding coded number is just formd
According on this basis, the coding of each sound channel being independently converted into the monophone of specific format with well known mode
Audio file or the multitrack audio file for being integrally converted into specific format are completed audio-frequency information and music information
The operation of Composite tone file.As for the format of audio file, more flexibly, such as audio file formats known in wav, mp3 etc.
It can realize this conversion, by related crossover tool without enumerating.
This audio file realized, substantially by the close of the configuration information comprising access target network
Text is loaded into music information in a manner of digitized, therefore, by playing these audio files, can be carried out by sound wave
Data broadcasting.
Then, after generating the audio file, i.e., the playing module as provisioned in propagation unit 13 calls corresponding play
Software plays the audio file, to form acoustic signals, is propagated in free space, described comprising with confidence to broadcast
The ciphertext of breath.
The mobile terminal of mobile phone etc, generally be configured with corresponding audio playing software, due to audio file be according to
What specific format was converted, it can normally be identified by audio playing software, therefore, by calling audio playing software,
Play the audio file.As previously mentioned, audio file can be the audio-frequency information comprising configuration information and the sound
Two files that happy information is separately encoded, can also be integrated into same file, regardless of its way of realization, can lead to here
It crosses music player software to carry out while playing, the music information described in broadcasting while playing audio-frequency information, from there through raising
The music that sound device plays back weakens the broadcast effect of the audio-frequency information.Data are formed by playing audio-frequency information
Music is played while sound wave, is allowed the sound of broadcasting not seem dull, is improved the audio experience for playing sound, played data sound wave
While play music, song, the sound such as voice, improve the rhythmical image and timing for playing sound, improve and play listening for sound
Feel impression, and influence is transmitted without on data.Audience is capable of the music of hearing devices sending, also just can clearly know to lead to
Letter process realizes better man-machine interaction experience.
It is in order to which data sound wave caused by audio-frequency information is hidden in institute it should be pointed out that carrying out multichannel broadcasting
Within the scope of the playing duration for stating music caused by music score of Chinese operas file, musical sound is enabled to weaken data sound wave, as long as abiding by
Such substantially rule is kept, just need not emphasize the tight consistent of the broadcasting initial time of each sound channel.Also, in general, each sound
The broadcasting initial time in road, theoretically also uses restraint in coding stage, and therefore, those skilled in the art protect the present invention
The understanding of shield range should not be bound to this one can flexible technical characteristic.
By playing the audio file, data broadcasting effect is realized, so that the configuration information comprising target network
Ciphertext in the form of the appreciable acoustic signals of human ear (20Hz~20KHz) to airborne spread, in general interior space model
It in enclosing, can be received by corresponding radio equipment, to realize that data are transmitted.In the acoustic signals formed according to this form
In, since the ciphertext comprising configuration information is converted according to specific frequency point, just described to be formed by ciphertext
Transmission data are loaded into music sound wave signal in a manner of carrier wave, by related communication processing means, can be extracted wherein
Ciphertext be used.
The process of data is received the decode and extracted about to by playing the audio file, will be sent out at subsequent
It is further disclosed in bright intelligent terminal.
As can be seen that the embodiment of the disclosure above, it is sufficient to mobile phone terminal be made reliably to contain target network to spatial
The ciphertext of the configuration information of network, as long as various wireless signals enumerated above can be received and parsed to it, and solution
Close ciphertext therein finally obtains configuration information, theoretically, i.e., the target network described using configuration information access.
In addition, the general improvement project as above-described embodiment, describes please continue to refer to embodiment below, with deeper
Enter to understand the present invention.
Referring to Fig. 7, in another embodiment of mobile phone terminal of the present invention, it is further provided receiving unit 14, checklist
Member 15 and decision unit 16, for providing more perfect function.
The receiving unit 14, for obtaining the knot fed back based on the configuration information for being originated from the intelligent terminal
Fruit information.
The mobile phone terminal of Central Control Function is played, is suitable for that can to know whether intelligent terminal can be successfully accessed in time described
Network, and can know this message, then need with necessary identification.Therefore, mobile phone terminal will be single using the reception
Member 14 obtains the result information for being originated from intelligent terminal, and makes subsequent processing based on this result information.
Intelligent terminal of the invention obtain include configuration information the wireless signal of ciphertext after, it will be parsed and will be utilized
Own private key decrypts it, final to obtain the configuration information.In turn, intelligent terminal utilizes the configuration information, obtains related
The information such as service set, the password even cipher mode of target network, configure itself, the program of starting access target network,
Attempt to establish with target network and be associated with (Association), until establishing connection.Finally, based on this connection attempt as a result,
Whether successful result information is for example with several UDP message packet broadcasts (since udp protocol is opposite by characterization connection for intelligent terminal
It is unstable, therefore be suitable for once sending multiple data packets), it is sent to mobile phone terminal, in the form of ACK control frame for another example to complete
Interactive process.It should be noted that the data that intelligent terminal of the invention issues it will encrypt.Therefore, always
Mobile phone terminal in waiting state either by network frame, or passes through the forms such as UDP message packet or even sound carrier
After obtaining the response from intelligent terminal, all it is regarded as result information and is subject to subsequent processing.
The verification unit 15, for result information described in the public key decryptions using the intelligent terminal.
After no matter mobile phone terminal obtains the result information from intelligent terminal in what manner, the intelligent terminal is just utilized
Public key trial this result information is decrypted.The success or failure of decryption will affect mobile phone terminal to the legal next of intelligent terminal
The judgement in source.It similarly, can also be to being considered as intelligent end if intelligent terminal fails to receive the result information from intelligent terminal always
End fails to decrypt the information with the public key encryption, to make certain judgement.It should be noted that result letter designated herein
Breath, unrelated with the content that it is characterized, which has accessed target network either characterizing intelligent terminal, can also be with table
Sign intelligent terminal, which fails, accesses target network.Mobile phone terminal only focuses on here using asymmetric techniques and realizes product
Identification.
The decision unit 16, if for determining --- it fails and decrypts the result information or pre- timing
It is failed when obtaining the result information in length, generates warning information.
As previously mentioned, the public key for the intelligent terminal that mobile phone terminal obtains, should be theoretically the private key phase with intelligent terminal
Match, otherwise, may infer that intelligent terminal is fake products, or although can not conclude that intelligent terminal is fake products, until
The public key being provided by it less has been tampered with.No matter which kind of situation, all have reason to mention the legitimate origin of the product or its channel
Query out.Specifically, mobile phone terminal fails when decrypting the result information, it was demonstrated that the private key of intelligent terminal is provided with it
Public key be not same to mathematically associated password pair;Mobile phone terminal fails when obtaining the result information, also pole
It is possible that because intelligent terminal cannot be decrypted correctly mobile phone terminal and no result information is caused to ring using the data of the public key encryption
It answers, therefore also turns out that the private key of intelligent terminal with its public key provided is not same to mathematically associated password pair.This feelings
Under condition, mobile phone terminal can be by user interface display alarm message, or by loudspeaker sonorous alarm etc., generates alarm letter
Breath.Further, if equipped with the technology alerted when cannot decrypt the ciphertext from mobile phone terminal when it in intelligent terminal
Means, then user can more clearly determine whether that this identity is tested with the respective warning information of intelligent terminal by mobile phone terminal
Card process receives the influence of signal of communication stability, to be conducive to exclude necessary interference, Accurate Diagnosis leads to intelligent terminal
The problem of target network can not be accessed.
As it can be seen that the embodiment of above-mentioned extension, further the advantages of performance asymmetric encryption techniques, determines intelligence eventually for user
The legal identity at end and for user check connectivity problem provide convenient and fast technical foundation.
It should be pointed out that in some scenes above-mentioned, it is indicated that in some cases, mobile phone terminal is transmitted to intelligent terminal
When configuration information, the public key for the password centering that it is voluntarily generated also is transmitted to intelligent terminal, is safer for the ease of ensuring
Data laser propagation effect.In these scenes, mobile phone terminal can be connect it for computational efficiency and communication security consideration is improved
The data from the intelligent terminal received, only when can be with the private key successful decryption for the password centering that mobile phone terminal voluntarily generates
When, the progress of these data just can be perceived into expression processing, express that it with audio, video, picture and text, the sound and other effects, be
User is perceived.
It can be seen that mobile phone terminal of the invention, realizes the safer configuration for reliably propagating access target network
The scheme of information can more effectively guide external smart terminal and more safely access in target network.
In intelligent terminal side, due to needing the foundation between the mobile phone terminal for sending the ciphertext comprising configuration information corresponding
Property, therefore, it is possible to carry out modular construction by target network cut-in method of the invention.
Referring to Fig. 8, intelligent terminal of the invention includes resolution unit 21, decryption unit 22 and access unit 23.With
The lower function of disclosing each unit in detail and realized:
The resolution unit 21, is parsed for reading external wireless signals, obtains wherein entrained ciphertext.
In the access guidance scheme that aforementioned related mobile phone terminal is realized, give a variety of for propagating the nothing of the ciphertext
Line signal form, preferred two kinds of wireless signals, one is the work realized based on WiFi technology data link layer network
Frame, another kind is can acoustic signals characterized by auditory frequency range by human ear.And in former wireless signal, then it can be flexible
(such as management frame, data frame) is propagated on ground with different types of network frame, depends on those skilled in the art how clever completely
R. concomitans WiFi Direct standard and Ad-Hoc standard living.And latter wireless signal, then it needs with corresponding decoding technique
To obtain the ciphertext that acoustic signals are included.Anyway, data are obtained from wireless signal, are that number is loaded in wireless signal
According to inverse process, the embodiment stated before this invention provides full and accurately to be realized and loads data into skill in wireless signal
On the basis of art scheme, it will be appreciated by those skilled in the art that even if the description subsequently with respect to each embodiment can not be detailed, it can also
Voluntarily the loading technique according to aforementioned announcement knows subsequent corresponding scheme, that is, using mobile phone terminal realization come certainty
The realization of ground acquisition intelligent terminal.It is provided nevertheless, those skilled in the art still can refer to several times for several different situations
Related acquisition ciphertext explanation resolution unit 21 of the invention to understand:
One is directed to the case where transmitting ciphertext based on 802.11 agreements (WiFi technology):
No matter which kind of mode intelligent terminal is accessed using in the aforementioned guidance method implemented in relation to mobile phone terminal, works as the two
When based on establishing point-to-point direct-connected relationship, data frame transfer data can be passed through;Even if the two fails to establish point-to-point direct-connected pass
System can also realize that data are transmitted, therefore, whether based on WiFi Direct by the frame format of control frame, management frame etc
Technology is still based on Ad-Hoc technology, in spite of point-to-point notional direct-connected relationship is established, can pass through various forms
With 802.11 protocol formats expression work the network frame of data link layer come realize mobile phone terminal to intelligent terminal transmit
It carries and contains the purpose of the ciphertext of target network configuration information.Correspondingly, intelligent terminal can be according to WiFi
The technical specifications such as Direct, Ad-Hoc, to its received wireless signal carry out the parsing of correspondence, therefrom obtain described close
Text.Obviously, it to be farthest compatible with prior art standard, and realizes in an optimal manner, as an exemplary embodiments,
Intelligent terminal is suitable for being switched to itself, or default is in service node (AP) mode of WiFi Direct standard,
The ciphertext sent is corresponded to according to respective protocol with the mobile phone terminal outside receiving.Configuration in intelligent terminal later use ciphertext
Information configuration from behind, then by the workstation mode for itself switching back into WiFi Direct standard so as to complete access mesh
Mark the movement of network.
Secondly, for based on acoustic signals transmission ciphertext the case where:
As previously mentioned, mobile phone terminal is by digitized processing, the ciphertext for containing configuration information is special with one or more
The form for determining the carrier wave of frequency point is loaded into formation audio file in melody and plays out, and when its broadcasting, that is, is formed and contains carrier wave
The wireless acoustic signals of signal, the ciphertext are to load on the load of at least one specific frequency point of airborne acoustic signals
In wave.Therefore, the premise for obtaining the ciphertext in acoustic signals is parsed to acoustic signals, and number is converted analog signals into
Change data to be handled.
In view of the correspondence of intelligent terminal and mobile phone terminal, corresponding microphone circuit should be arranged to receive in intelligent terminal
Via the acoustic signals of spatial.Nature should have accordingly it is also to be understood that in hardware realization to the received sound of institute
Wave signal carries out the respective chip that based on simulation or based on number mode is decoded.Theoretically, audio is received
For circuit, can not understand whether be music and multichannel, therefore, it is necessary to carry out technical identification.Carry out technology identification
Mode is varied, and the following two ways that provides is for those skilled in the art's reference:
First way is the mode based on analog filtering processing:
Intelligent terminal passes through the acoustic signals that its radio reception circuit obtains, and source is varied, only above-mentioned by the present invention
The acoustic signals from mobile phone terminal for being loaded with ciphertext, which are only, really needs processed object.And the sound propagated in the sky
Wave signal carries out in an analog manner, therefore, can be according to shown in fig. 5 as under type extraction contains configuration information
Ciphertext:
Step a, according to given frequency, acoustic signals are filtered, obtain corresponding carrier signal.
The received acoustic signals of institute include multiple carrier waves, the carrier wave therein contained where the ciphertext of configuration information, root
Either one or more according to aforementioned, therefore, intelligent terminal (can correspond to aforementioned guiding according to scheduled frequency
Frequency listed by the frequency configuration file of method) acoustic signals are filtered, corresponding carrier signal is obtained, the carrier signal
It just include the relevant content of the ciphertext.
Step b, digitized sampling is carried out to the carrier signal, obtains corresponding digitalized data.
Because the acoustic signals are substantially analog signals, it is necessarily required in radio reception circuit to filtered
Carrier signal carries out analog-to-digital conversion, to obtain the data comprising ciphertext of number.
Step c, the digitalized data is decoded, obtains the configuration information comprising access target network
Ciphertext.
Decoding designated herein, because it is only necessary to the digitalized datas to filtered carrier signal to be decoded, because
This will become more simple, and those skilled in the art provide according to cataloged procedure above-mentioned in conjunction with latter technique identification method
Reference, can realize and decode according to its inverse process, the final ciphertext for containing configuration information accordingly that obtains is for rear continued access
Enter target network.
The second way is the processing mode of pure digi-tal.
Since digit chip is widely used in most intelligent terminals, in this case, radio reception circuit has received from the air
After the carrier signal, then advanced row digital-to-analogue conversion carries out subsequent processing to the data after conversion.Corresponding processing side
Formula has correspondence with cataloged procedure above-mentioned certainly, following to disclose corresponding step for those skilled in the art referring to understanding:
Following detailed step is taken in order to realize the purpose firstly the need of synchronous alignment decoding data head:
Step A1 saves continuous 3 frame audio.Data head is two 16 system numbers.
Step A2 calculates the frequency that intermediate frame includes.
Step A3 calculates the corresponding number of frequency.
Step A4 judges whether number is data head, if it is, entering step 405.
3 frame audio molecule frames are calculated the corresponding number of each subframe by step A5.
Step A6, if the corresponding number of at least continuous 4 subframes is equal to data head.
Step A7, decoding data head.
Step A8, copy remaining data are used for decoding data head, and remaining data have synchronized alignment.
In one embodiment, the audio frame for obtaining load change data detects each audio using goertzel algorithm
Multiple frequencies that frame includes, and save loudness of a sound energy corresponding with multiple frequencies;It can be obtained using Goertzel rudimentary algorithm
Frequency real and imaginary parts identical with conventional discrete Fou-rier transformation (DFT) or FFT.According to loudness of a sound energy from high to low suitable
Sequence calculates the data that each frequency includes in multiple frequencies and carries out RS decoding, and is converted back according to interleaving rule when encoding
Original sequence;When judging that error-detecging code is correct, then it is judged as transmission data.
Secondly, needing decoded version number and data length.Specifically include following sub-step:
Step B1 obtains the audio frame for being loaded with version number and data length.
Step B2 detects the frequency that every frame includes using goertzel algorithm.
Step B3 calculates the corresponding data of each frequency.
Step B4 carries out rs decoding when data are 6 full.The algorithm that data number and the RS coding that this step obtains use
Correlation, such as RS (7,3) etc..
Step B5, error-detecging code create-rule when according to coding calculate error-detecging code.
Step B6, B7 judges whether version number matches and whether the error-detecging code received is correct, if it is, into
Step B8: data length successfully decoded starts decoding data.
Finally, decoding includes the data of ciphertext.It sees below:
Step C1 obtains the audio frame of transmission data.
Step C2 detects the frequency that every frame most probable includes using goertzel algorithm, while saving next may include
Frequency, and save the ratio of corresponding energy.
Step C3 calculates the data that most probable includes and the data that next may include according to frequency.
Step C4, interleaving rule when according to coding transform the data into back correct sequence.
Step C5, each section is all first done rs decoding with the data that most probable includes.
Step C6 judges whether every section of error-detecging code is correct, if yes then enter step C8, judges that last error-detecging code is
It is no correct.If it is not, then entering step C7, most probable on corresponding position is successively replaced according to the sequence of energy ratio from big to small
The data for including are the data that next may include, and make RS decoding.
Step C9 successively judges whether every section of error-detecging code is correct after replacement, if yes then enter step C8, if otherwise
It enters step C11: realigning and find data head.
By executing above-mentioned step, corresponding transmission data can be finally obtained, also can be obtained described contain
The ciphertext of configuration information.
According to the above-mentioned announcement to two embodiments for obtaining the ciphertext comprising configuration information, could be aware that, intelligent terminal
Obtain that mobile phone sends contains the ciphertext of configuration information, therefore, can use for other units.
The decryption unit 22 is decrypted the ciphertext for reading pre-stored private key, and acquisition wherein includes
Configuration information.
As previously mentioned, the password of intelligent terminal to be it is just generated when leaving the factory, in its production process, password centering
Private key be written into corresponding chip, therefore, intelligent terminal can read this pre-stored own private key, and use
The ciphertext obtained is decrypted in corresponding asymmetric encryption techniques algorithm, and decrypting resulting data is to be used to access mesh
Mark the configuration information of network.It should be noted that between algorithm used in algorithm used in mobile phone terminal and intelligent terminal
It is inevitable consistent.Due to the data using private key decryption public key encryption, or otherwise utilize the data of public key decryptions private key encryption
Technology is well known to those skilled in the art, therefore without repeating.
In variants of the invention, to determine improper communication convenient for user, when using the private key to the ciphertext progress
After decryption failure, the components such as driving sound, light are issued the first warning information by intelligent terminal, and user thus can be true from intelligent terminal
Know that the held public key of mobile phone terminal is illegal.It on the other hand, can also be with this case where private key for attempting Brute Force intelligent terminal
Kind mode is identified.
In another variants, it is unsuccessfully derived from data transmission quality bad the case where causing in order to exclude private key decryption, intelligence
Terminal will utilize one result information of its private key encryption, and by the result information with control frame or data frame even acoustic signals it
The form of class feeds back to mobile phone terminal and does corresponding identification, if mobile phone terminal can utilize the public key decryptions result information, two-phase
In conjunction with that can know that communication quality is bad, if mobile phone terminal is also warned, in conjunction with warning for intelligent terminal, then mobile phone end can determine
Held public key and the held private key of intelligent terminal is held to mismatch.
Corresponding to the variants that mobile phone terminal is realized, when also accompanying includes voluntarily to be generated by mobile phone terminal in the ciphertext
Public key when, the present invention will also read the public key, after subsequent intelligent terminal access target network, will pass through a transmission unit benefit
The outside public key encryption data are used to be transferred to the mobile phone terminal as public key provider, and whole using the public key decryptions mobile phone
The data that end transmission comes.Due to the variable-key that mobile phone terminal voluntarily generates, it has been cured different from the key of intelligent terminal, institute
With being communicated using new public key and private key will become safer.
The access unit 23, for configuring itself using the configuration information and accessing the target network.
After intelligent terminal obtains the configuration information of decryption in the manner previously described, corresponding SSID, password can be obtained very
To its cipher mode, then ensuring itself to be under workstation mode, accessed using the WiFi of these information configurations itself
Setting starts linker, final to establish the connection for arriving the target network.
In conjunction with the situation of change of previously described embodiments, intelligent terminal should be equipped with a switch unit, outside reception
Before wireless signal, the service node module itself being under WiFi Direct standard criterion is received external equipment by default
Itself is accessed to receive the ciphertext.And behind, then itself is switched in WiFi using configuration information configuration
Workstation mode under Direct standard criterion accesses the purpose of the target network so that the access unit 23 can be realized.
In the case of certain, in order to realize more preferably human-computer interaction, refering to described previously, whether intelligent terminal can will succeed
The consequential signal of the access target network, with WiFi signal (network frames of 802.11 agreements), Bluetooth signal, acoustic signals
Forms such as (similarly with guidance methods of the invention) are back to the source for sending configuration information.A more easy implementation
It is that the alarm signal of light and/or sound is carried out by the LED light or the Alarm Unit of buzzer etc that are mounted on this intelligent terminal
Confirmation forms the second warning information.Wherein, this notice is realized by Alarm Unit, primarily to human perception is looked after,
And by sending consequential signal, then the communication of intelligent terminal and mobile phone terminal can be achieved, understood and carried out such as by mobile phone terminal
The preceding utilization, without repeating.It still needs to emphasize, the delivering path of consequential signal is varied, but has succeeded for characterization
It accesses for the consequential signal of target network, is suitable for broadcasting the data packets of several UDP formats to notify mobile phone terminal, so as to hand
Machine terminal handles subsequent matters as previously described accordingly.And after logging in target network failure with the configuration information, such as
Preceding described, intelligent terminal can be used as consequential signal by 802.11 agreements in data link layer or the broadcast table in the form of acoustic signals
Sign logs in the network frame of the target network failure.
It needs to be illustrated, the public key of the intelligent terminal when leaving the factory, can be attached directly to the shell of intelligent terminal
On one Visualization region of body defined, it is especially on the Visualization region with text or recognizable figure
Two dimensional code expresses the public key, subject to machine recognition.Currently, the packaging dispatched from the factory together with intelligent terminal can also be printed on
On box or gummed paper, carrier of the gummed paper as two dimensional code, also be may be affixed on the shell of intelligent terminal when necessary.
In addition, corresponding to a variants of aforementioned announcement, with quick response code form come when expressing public key, due to the number of two dimensional code
It is larger according to amount of storage, therefore, log-on message when intelligent terminal being under the service node mode of WiFi Direct standard,
It can also be contained in together in content expressed by the two dimensional code, so that mobile phone terminal need to only scan the two dimensional code, can obtain simultaneously
The public key and log-on message for obtaining intelligent terminal make mobile phone terminal be successfully accessed intelligent end with the log-on message configurating mobile terminal
End.
It could be aware that intelligent terminal of the present invention only needs by the various embodiments for being implemented in intelligent terminal disclosed above
Reception includes that a series of processing can be completed in the wireless signal for the ciphertext of configuration information for accessing target network, it is not necessary to artificial
Intervene, moreover, the communication technology based on safety and extraneous progress data interchange, whole process are apparently more safe and simple, high
Effect.
In conclusion present invention utilizes public key cryptographies to ensure that the intelligence guiding of mobile phone terminal and intelligent terminal connects
Enter the technology of target network, communication process is safer, and can play identify intelligent terminal whether the expectation through artificially distorting
Less than technical effect.
The above is only some embodiments of the invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered
It is considered as protection scope of the present invention.