CN104703176B - Configuration method of wireless network, intelligent terminal and wireless network equipment - Google Patents

Configuration method of wireless network, intelligent terminal and wireless network equipment Download PDF

Info

Publication number
CN104703176B
CN104703176B CN201510118753.7A CN201510118753A CN104703176B CN 104703176 B CN104703176 B CN 104703176B CN 201510118753 A CN201510118753 A CN 201510118753A CN 104703176 B CN104703176 B CN 104703176B
Authority
CN
China
Prior art keywords
wireless network
data
probe request
configuration information
data packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510118753.7A
Other languages
Chinese (zh)
Other versions
CN104703176A (en
Inventor
梅张雄
王敏
王海芳
崔艳昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Winner Microeletronics Co ltd
Original Assignee
Beijing Winner Microeletronics Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Winner Microeletronics Co ltd filed Critical Beijing Winner Microeletronics Co ltd
Priority to CN201510118753.7A priority Critical patent/CN104703176B/en
Publication of CN104703176A publication Critical patent/CN104703176A/en
Application granted granted Critical
Publication of CN104703176B publication Critical patent/CN104703176B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition

Abstract

The invention relates to a configuration method of a wireless network, an intelligent terminal and wireless network equipment, which comprises the steps of encoding and encrypting configuration information of the wireless network; writing the configuration information of the wireless network after coding and encryption into effective data of a data packet according to a mode that 1 byte corresponds to 1 byte, and writing the data packet into a service set identification SSID field in a Probe Request frame; a Probe Request is sent to the wireless network, the Probe Request comprising the Probe Request frame. The configuration information of the wireless network is sent by the intelligent terminal through the Probe Request frame, the problem that the wireless network equipment cannot acquire the configuration information of the wireless network in an independent state can be solved, the step that network configuration can be carried out only through wired connection is saved, and automatic and efficient wireless network configuration is realized.

Description

Configuration method of wireless network, intelligent terminal and wireless network equipment
Technical Field
The invention relates to the field of internet of things, in particular to a configuration method of a wireless network, and an intelligent terminal and wireless network equipment applying the method.
Background
The internet of things is an extension of wireless network applications, and includes a technology of connecting network devices in a wireless network environment with the internet according to a agreed protocol to exchange and communicate information so as to realize intelligent identification, positioning, tracking, monitoring and management.
Currently, the intelligent terminal is generally connected with the router through a wireless local area network WLAN by using an IEEE802.11 protocol, which may specifically include: and acquiring the information of the router by intercepting the Beacon frame of the router or transmitting the Probe request frame to acquire the Probe response frame of the router, and inputting the password required by the router for networking.
However, for other network devices that do not have an input function, network connection may not be possible because the password of the router cannot be input.
Disclosure of Invention
Technical problem
In view of the above, the present invention is to provide an automatic and efficient wireless network configuration method for connecting a wireless network device to a wireless network.
Solution scheme
In order to solve the above technical problem, according to an embodiment of the present invention, in a first aspect, there is provided a configuration method of a wireless network, encoding and encrypting configuration information of the wireless network;
writing the configuration information of the wireless network after coding and encryption into effective data of a data packet in a mode of 1 byte corresponding to 1 byte, and writing the data packet into a service set identifier SSID field in a Probe Request frame;
and sending a Probe Request to the wireless network, wherein the Probe Request comprises the Probe Request frame.
In one possible implementation, the configuration information of the wireless network includes a password of the wireless network, and the password is encoded and encrypted in such a way that the number of bits of the password is kept unchanged.
In one possible implementation, the configuration information of the wireless network includes a service set identifier SSID and/or a basic service set identifier BSSID of the wireless network, and the encoding and encrypting the configuration information of the wireless network includes:
dividing the service set identification SSID and/or the basic service set identification BSSID into one or more data sets according to a first preset bit number, complementing 8 bits of each data set to form an ASCII code, and performing first exchange processing on a second preset bit in the ASCII code; and
and encrypting the ASCII codes after the first pair of modulation processing according to a first preset formula.
In one possible implementation, the number of bytes of the cipher is divided by the number of bytes of valid data in one of the data packets to obtain a quotient, and the quotient is rounded to obtain the number of Probe Request frames in the Probe Request.
In order to solve the above technical problem, according to an embodiment of the present invention, there is provided a configuration method of a wireless network, including:
entering a monitoring mode, wherein the monitoring mode allows a probe request sent by an intelligent terminal to be received;
receiving the Probe Request, wherein the Probe Request comprises a Probe Request frame, and acquiring a data packet in a Service Set Identification (SSID) field in the Probe Request frame;
organizing the data packets according to the total packet number and the packet sequence number in the data packets;
decrypting and decoding the data packet to obtain configuration information of the wireless network;
and connecting the wireless network according to the configuration information of the wireless network.
In one possible implementation, the data packet includes a password of the wireless network, and the data packet is decrypted and decoded in a manner that keeps the number of password bits unchanged.
In one possible implementation, the data packet includes a service set identification SSID and/or a basic service set identification BSSID of the wireless network, and the decrypting and decoding the data packet includes: decrypting the data packet according to a second formula, acquiring a first specific bit in the decrypted data to form an ASCII code, and performing exchange processing on a second specific bit in the ASCII code.
To solve the above technical problem, according to an embodiment of the present invention, in a third aspect, there is provided an intelligent terminal for configuring a wireless network, including:
the coding encryption module is used for coding and encrypting configuration information of the wireless network;
the packet grouping module is used for writing the configuration information of the wireless network after coding and encryption into the effective data of the data packet in a mode of 1 byte corresponding to 1 byte, and writing the data packet into a service set identifier SSID field in a Probe Request frame;
and the sending module is used for sending a Probe Request to the wireless network, wherein the Probe Request comprises the Probe Request frame.
In one possible implementation, the encoding and encrypting module is configured to encode and encrypt the password in a manner that a number of bits of the password is kept unchanged when the configuration information of the wireless network includes the password of the wireless network.
In one possible implementation manner, the encoding encryption module is configured to divide, when configuration information of the wireless network includes a service set identifier SSID and/or a basic service set identifier BSSID of the wireless network, the service set identifier SSID and/or the basic service set identifier BSSID into one or more data sets according to a first predetermined number of bits, complement 8 bits of each data set to form an ASCII code, and perform a first exchange process on a second predetermined bit in the ASCII code; and
and encrypting the ASCII codes after the first pair of modulation processing according to a first preset formula.
In one possible implementation, the number of Probe Request frames is equal to the number obtained by dividing the number of bytes of the password by the number of bytes of valid data in one of the data packets to obtain a quotient, and rounding the quotient.
In order to solve the above technical problem, according to an embodiment of the present invention, in a fourth aspect, there is provided a wireless network device, including:
the monitoring module is used for enabling the wireless equipment to enter a monitoring mode, and the monitoring mode allows a probe request sent by the intelligent terminal to be received;
a receiving module, configured to receive the Probe Request, where the Probe Request includes a Probe Request frame, and obtain a data packet in a service set identifier SSID field in the Probe Request frame;
the unpacking module is used for organizing the data packets according to the total packet number and the packet sequence number in the data packets;
the decryption decoding module is used for decrypting and decoding the data packet to obtain the configuration information of the wireless network;
and the connection module is used for connecting the wireless network according to the configuration information of the wireless network.
In one possible implementation, the decryption decoding module is configured to decrypt and decode the data packet in a manner that the number of cipher bits is kept unchanged when the data packet includes the cipher of the wireless network.
In one possible implementation manner, the decryption decoding module is configured to decrypt the data packet according to a second formula when the data packet includes a service set identifier SSID and/or a basic service set identifier BSSID of the wireless network, obtain a first specific bit in the decrypted data to form an ASCII code, and perform an exchange process on a second specific bit in the ASCII code.
In order to solve the above technical problem, according to an embodiment of the present invention, in a fifth aspect, there is provided a wireless network configuration system in a wireless network environment, including: the intelligent terminal of any one of claims 8 to 11 and the wireless network device of any one of claims 12 to 15.
Advantageous effects
The configuration information of the wireless network is sent by the intelligent terminal, and the configuration method of the wireless network can solve the problem that the wireless network equipment cannot acquire the configuration information of the wireless network in an independent state, save the step that network configuration can be carried out only by wired connection, and realize automatic and efficient wireless network configuration.
In addition, the method for configuring the wireless network can realize the minimization of the byte number required for transmitting the wireless network configuration information by encoding and encrypting the password in a mode of keeping the number of the password bits unchanged (one byte corresponds to one byte) and encoding and decrypting the service set identifier SSID and/or the basic service set identifier BSSID and/or other data of the wireless network in a mode of corresponding 8 bits every 6 bits, and can reduce the number of data packets required for transmitting the wireless network configuration information by writing the wireless network configuration information into the effective data of the protocol data packet and forming a probe request.
Other features and aspects of the present invention will become apparent from the following detailed description of exemplary embodiments, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate exemplary embodiments, features and aspects of the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 shows a typical application scenario of a configuration method of a wireless network, to which the embodiment of the present invention is applied;
fig. 2 shows a flow chart of a method of configuring a wireless network according to an embodiment of the invention;
fig. 3 schematically shows a process of data encryption according to formula (1);
FIG. 4 shows the organization of data packets in an embodiment of the invention;
fig. 5 shows a flow chart of a method of configuring a wireless network according to another embodiment of the invention;
fig. 6 is a schematic diagram illustrating a configuration of an intelligent terminal 10 for configuring a wireless network according to still another embodiment of the present invention;
fig. 7 is a schematic structural diagram of a wireless network device according to still another embodiment of the present invention;
fig. 8 is a schematic structural diagram of a wireless network system according to still another embodiment of the present invention.
Detailed Description
Various exemplary embodiments, features and aspects of the invention will be described in detail below with reference to the drawings. In the drawings, like reference numbers indicate identical or functionally similar elements. Although various aspects of the embodiments are illustrated in the accompanying drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The word "exemplary" is used herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
In addition, numerous specific details are set forth in the following description in order to provide a better illustration of the invention. It will be understood by those skilled in the art that the present invention may be practiced without some of these specific details. In some instances, well known methods, procedures, and components have not been described in detail so as not to obscure the present invention.
Example 1
Fig. 1 shows a typical application scenario of a configuration method of a wireless network, where as shown in fig. 1, an intelligent terminal, such as a mobile phone 10, establishes a wireless network connection with a router 20 and obtains configuration information of the wireless network, such as a service set identifier SSID, a basic service set identifier BSSID, a password, etc. of the wireless network, and sends a probe request carrying the configuration information to the wireless network, and other wireless network devices 30 in the wireless network environment and in a listening state can obtain the configuration information of the wireless network by receiving the probe request and join the wireless network.
Therefore, the configuration information of the wireless network is sent by the intelligent terminal, the problem that the wireless network equipment cannot acquire or input the configuration information of the wireless network in an independent state can be solved, the step that network configuration can be performed only through wired connection is saved, and automatic and efficient wireless network configuration is realized.
Fig. 2 shows a flow chart of a method of configuring a wireless network according to one embodiment of the invention. As shown in fig. 2, the method mainly includes:
step S21, the mobile phone 10 encodes and encrypts the configuration information of the wireless network.
First, before performing step S21, the handset 10 needs to first establish a connection with the router 20 of the wireless network and acquire configuration information of the wireless network, including, but not limited to, a service set identifier SSID, a basic service set identifier BSSID, and a password of the wireless network.
In this step, the configuration information of the wireless network is encoded, and when the configuration information of the wireless network includes a password of the wireless network, the password may be encoded in a manner of keeping the number of bits of the password unchanged, for example, in a manner of keeping the original text of the password unchanged, or may be reorganized to encode on the premise of keeping the number of bits of the password unchanged. Generally, the number of bits of data is increased during encoding, but the present invention encodes in a manner that the number of cipher bits is kept unchanged, so that the number of data packets required to be transmitted in the subsequent steps can be reduced to the greatest extent, thereby improving efficiency.
When the configuration information of the wireless network includes a service set identifier SSID of the wireless network, the service set identifier SSID may be divided into one or more data sets according to a first predetermined number of bits, each data set is complemented with 8 bits to form an ASCII code of one byte, and a first pair of modulation is performed on a second predetermined bit in the ASCII code, so as to implement encoding of the service set identifier SSID.
For example, service set identification SSID data is arranged in binary, from high order to low order, every 6 bits are fetched as one data set, and 01 is appended to the highest two bits of each data set to form one byte ASCII code, and so on, SSID data of every 3 bytes (24 bits) is divided into 4 data sets, and is represented by 4 ASCII codes after 01 is appended to the high order. And when the last original data is less than 6 bits after being encoded, the high-order filling and the low-order zero filling close to 6 bits in the last encoded ASCII code data can be realized, and the encoded data are ASCII codes.
In addition, the encoding step may further include performing a swap process on the upper 4 bits of the adjacent two bytes, for example: assuming that the data to be processed is 0x12,0x34,0x45,0xab, the data after the exchange processing is 0x32,0x14,0xa5,0x4b.
In one possible implementation, there are two cases where special handling is required for this step: if the transmitted data is odd, the last byte is not exchanged; if any one of the data low 4 bits in a group that needs to be swapped is F, then the group does not make a swap.
In a possible implementation manner, the configuration information of the wireless network further includes a basic service set identifier BSSID or other data, and the basic service set identifier BSSID or other data may also be encoded according to the same rule as the service set identifier SSID, which is not described herein.
In this step, the configuration information of the wireless network is encrypted, and in one possible implementation, the configuration information subjected to the above encoding process may be encrypted by a first predetermined formula, for example, formula (1).
Fig. 3 schematically shows a process of encrypting data according to formula (1), where the original data is a and the encrypted data is A1 as shown in fig. 3.
If(A&0xF<=7)
A1=A+A&0xF
Else if(7<A&0Xf<=F)
A1=A-(F-A&0xF) (1)
And S22, writing the configuration information of the encoded and encrypted wireless network into the effective data of the data packet in a mode of 1 byte corresponding to 1 byte, and writing the data packet into a service set identification SSID field in a Probe Request frame.
In this step, the configuration information of the wireless network after encoding and encryption needs to be written into a data packet, and fig. 4 shows an organization form of the data packet in the embodiment of the present invention, and as shown in fig. 4, the data packet includes: the total packet number, the sequence number of the packet, the data type of the packet, the lengths 1-6, the effective data and the CRC check bit, and the data packet can also comprise a channel.
In one possible implementation, the channel may occupy 1 byte, with the upper two bits fixed to 01 and the lower 6 bits representing the WLAN channel in which the device is located. The total number of packets may occupy 1 byte, with the highest two bits of each byte fixed to 01 and the lower 6 bits indicating that the current communication needs to be completed by a data packet defined by a few packet book format. The number of the packet can occupy 1 byte, the highest 2 bits are fixed to be 01, the lower 6 is the number of the packet, the value range is 0-63, and the number of the packet in the total number of the current communication packets is indicated. The packet type may occupy 1 byte, the highest 2 bits are fixed to 01, the lower 6 bits represent the type of data contained in the packet, wherein 000001 represents a network password KEY, 000010 represents a BSSID, 000100 represents an SSID, 001000 ~ 100000 represents a Reserved type Reserved, and in addition, each packet may contain one or several data types. The length occupies 6 bytes at most, which means that each type of data contained in the packet corresponds to one byte in the length information, if only one type exists, the length only needs one byte, if two types exist, the length only needs two bytes, and the like, the highest two bits of each byte are fixed to be 01, the length byte order has a corresponding relation with the types, and the number of the length bytes corresponding to the low-order type can be the front. The effective data has uncertain length, and is segmented according to types and lengths, and each segment corresponds to each type of effective data. The CRC check bit occupies 2 bytes, CRC8 calculation mode is adopted to carry out CRC check on the content of the data packet (before the first byte of CRC), the same algorithm is used to calculate the content of the data packet (before the second byte of CRC) after the calculation is completed, and after the CRC of two bytes is calculated, the lower 6 bits are added with decimal 63, and the corresponding byte bits are filled.
In this step, the encoded and encrypted wireless network configuration information is written into the effective data of the data packet in a manner of 1 byte to 1 byte, specifically, each byte of wireless network configuration information occupies one byte in the effective data when the effective data of the data packet is written, and compared with the common writing manner that 1 byte of data occupies multiple bytes of effective data, the embodiment of the invention can reduce the number of the data packets to the greatest extent so as to improve the efficiency of transmitting the data packet.
In addition, the embodiment of the invention uses the SSID field in the Probe request frame to transmit the data packet, and the SSID field in the Probe request frame is defined by three pieces of information in the IEEE802.11 protocol: SSID field, SSID length, and SSID content. Wherein the SSID field identifier is used for indicating that the field is an SSID; the SSID length is the length of a character string for identifying the SSID contained in the field, and the maximum value thereof is 32; SSID content is used to identify the name of the network, which is a maximum of 32 characters.
In this embodiment, the SSID field in the Probe request frame is modified to carry a data packet, where the SSID field identifier remains unchanged, the SSID length identifies the length of the SSID content, and 32 bytes of the SSID content are used to carry the data packet, so that one data packet is a maximum of 32 bytes, where the number of bytes remaining except for the overhead length of the data packet is a number of bytes of valid data, and is a maximum of 26 bytes, and the overhead length of the data packet=the number of channels+the number of packets+the sequence number+the type+the data length field+the CRC.
In one possible implementation, the sum of the SSID and the password of the wireless network may reach 96 bytes, and in the case that the valid data of one data packet is 26 bytes, the quotient obtained by dividing 96 bytes by 26 bytes may be rounded according to 3.69 carry, that is, the SSID and the password of the wireless network are divided into 4 data packets and stored in the SSID field in the Probe request frame, in other words, the Probe request includes 4 Probe request frames to carry network configuration information.
Step S23, a Probe Request is sent to the wireless network, wherein the Probe Request comprises the Probe Request frame.
The intelligent terminal sends a Probe Request to the wireless network, wherein the Probe Request comprises a Probe Request frame carrying wireless network configuration information.
Step S24, the wireless network equipment enters a monitoring mode, wherein the monitoring mode allows a probe request sent by the intelligent terminal to be received. This step is not limited to being performed after step S23, and the wireless network device may start the listening mode at any time period after being powered on.
Step S25, a Probe Request is received, wherein the Probe Request comprises a Probe Request frame, and a data packet in a Service Set Identification (SSID) field in the Probe Request frame is acquired. The wireless network device extracts the corresponding data length field according to the packet type field, calculates the total length of the data, compares the data length with the length of the SSID field in the Probe request frame after the overhead length of the data packet judged according to the type field is added, if the data length of the data packet is equal to the SSID field in the Probe request frame, the data length of the data packet is indicated to be the frame to be received, CRC (cyclic redundancy check) is carried out after the data frame is received, and if the data length of the data packet is correct, the data frame is reserved, otherwise, the data frame is discarded.
And step S26, organizing the data packet according to the total packet number and the packet sequence number in the data packet. The method comprises the steps of extracting effective data in a data packet, and organizing the extracted effective data together according to the total number of the data packet and the sequence number of the data packet.
And step S27, decrypting and decoding the data packet to obtain the configuration information of the wireless network.
The decryption process in this step is the inverse of the encryption process shown in fig. 3, and may be performed, for example, by using the inverse algorithm formula (2) of the above formula (1), assuming that the encrypted data is A1 and the decrypted data is a.
if((A1&0xF)%2==0)
A=(A1+(A1&0xF0))/2;
Else if(((A1&0xF)%2==1))
A= (a1+ (a1 &0xF 0) +0 xF)/2 formula (2)
The decoding in this step is the inverse of the encoding process in step S21, and in one possible implementation, the number of bits of the decoded data is kept unchanged for the network password in this embodiment. In another possible implementation manner, for SSID, BSSID and other data, a first specific bit in the decrypted data may be obtained to form an ASCII code, and a second specific bit in the ASCII code is subjected to a second exchange process, where the first specific bit corresponds to a first predetermined bit in the encoding process, and the second specific bit corresponds to a second predetermined bit in the encoding process, specifically, the method may include arranging the data in binary, from high order to low order, taking out the low 6 bits from each byte, if it is determined that the last original data is less than 6 bits after encoding, removing 0 complementary to the encoding process, and so on, and then starting from the highest order, forming one data every 8 bits, and so on. The second pair of pairs is the inverse of the first pair of pairs in the encoding step, e.g., the upper 4 pairs of adjacent 2 bytes, and if the decoded data is 0x32,0x14,0x a5,0x4b, the data is 0x12,0x34,0x45,0x ab after this step.
This step may also include two special handling cases: if the transmitted data is odd, the last byte is not exchanged; if any one of the data low 4 bits in a group that needs to be swapped is F, then the group is not swapped.
And step S28, connecting the wireless network according to the configuration information of the wireless network.
The wireless network device 30 connects to the wireless network according to the configuration information of the wireless network.
Therefore, the configuration information of the wireless network is sent by the intelligent terminal, the problem that the wireless network equipment cannot acquire the configuration information of the wireless network in an independent state can be solved, the step that network configuration can be performed only through wired connection is saved, and automatic and efficient wireless network configuration is realized.
In addition, the number of bytes required for transmitting the wireless network configuration information can be minimized by encoding and encrypting the password in a mode of keeping the number of the password bits unchanged, and the number of the data packets required for transmitting the wireless network configuration information can be reduced by writing the wireless network configuration information into the effective data of the data packets in a mode of 1 byte corresponding to 1 byte and forming a probe request.
Example 2
Fig. 5 shows a flowchart of a method of configuring a wireless network according to another embodiment of the present invention. The steps in fig. 5, which are numbered identically to fig. 2, have the same functions, and detailed descriptions of these steps are omitted for the sake of brevity.
As shown in fig. 5, the network device 30 in the wireless network environment may include a plurality of wireless network devices in the same wireless network environment, which can be automatically and efficiently configured by the configuration method of the wireless network provided by the embodiment of the present invention, so as to bring a good experience effect to the user.
Example 3
Fig. 6 is a schematic structural diagram of an intelligent terminal 10 for configuring a wireless network according to still another embodiment of the present invention, and as shown in fig. 6, the intelligent terminal 10 includes: an encoding encryption module 110, a packetizing module 120, and a transmitting module 130.
The encoding and encrypting module 110 is configured to encode and encrypt configuration information of a wireless network, and may specifically include: the encoding encryption module 110 is configured to encode and encrypt a password in a manner of keeping a bit number of the password unchanged when configuration information of the wireless network includes the password of the wireless network, and the encoding encryption module 110 is configured to divide the service set identification SSID and/or the basic service set identification BSSID into one or more data sets according to a first predetermined bit number when the configuration information of the wireless network includes the service set identification SSID and/or the basic service set identification BSSID of the wireless network, complement 8 bits for each data set to form an ASCII code, and perform a first exchange process on a second predetermined bit in the ASCII code; and encrypting the ASCII code after the first pair of modulation processing according to a first preset formula.
The packet module 120 is configured to write the encoded and encrypted configuration information of the wireless network into the valid data of the data packet according to a mode that 1 byte corresponds to 1 byte, specifically, the wireless network configuration information of each byte occupies one byte in the valid data when the valid data of the data packet is written, and writes the data packet into the service set identifier SSID field in the Probe Request frame.
The sending module 130 is configured to send a Probe Request to the wireless network, where the Probe Request includes the Probe Request frame, and the number of Probe Request frames is equal to a number obtained by dividing the number of bytes of the cipher by the number of bytes of valid data in one of the data packets to obtain a quotient, and rounding the quotient.
Example 4
Fig. 7 is a schematic structural diagram of a wireless network device 30 according to still another embodiment of the present invention, and as shown in fig. 7, the wireless network device 30 includes: a listening module 310, a receiving module 320, a unpacking module 330, a decryption decoding module 340, and a connection module 350.
The listening module 310 is configured to cause the wireless device 30 to enter a listening mode, where the listening mode allows for receiving probe requests sent by the intelligent terminal. The receiving module 320 is configured to receive the Probe Request, where the Probe Request includes a Probe Request frame, and obtain a data packet in a service set identifier SSID field in the Probe Request frame. The unpacking module 330 is configured to organize the data packet according to the total number of packets and the sequence number of the packet. For example, valid data in a data packet may be extracted, and the extracted valid data may be organized together according to the total number of packets and the packet sequence number in the data packet. The decryption decoding module 340 is configured to decrypt and decode the data packet to obtain configuration information of the wireless network, and specifically may be configured to decrypt and decode the data packet in a manner of keeping the number of the password bits unchanged when the data packet includes the password of the wireless network, decrypt the data packet according to a second formula when the data packet includes a service set identifier SSID and/or a basic service set identifier BSSID of the wireless network, and obtain a first specific bit in the decrypted data to form an ASCII code, and exchange a second specific bit in the ASCII code. The connection module 350 is configured to connect to the wireless network according to the configuration information of the wireless network.
Example 5
Fig. 8 is a schematic structural diagram of a wireless network configuration system 100 according to still another embodiment of the present invention, and as shown in fig. 8, the wireless network system 100 is in a wireless network environment and includes: the intelligent terminal 20 described in embodiment 3 and the wireless network device 30 described in embodiment 4.
The foregoing is merely illustrative of the present invention, and the present invention is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (5)

1. A method for configuring a wireless network, comprising:
encoding and encrypting configuration information of the wireless network;
writing the configuration information of the wireless network after coding and encryption into effective data of a data packet in a mode of 1 byte corresponding to 1 byte, and writing the data packet into a service set identifier SSID field in a Probe Request frame;
transmitting a Probe Request to the wireless network, wherein the Probe Request comprises a Probe Request frame;
the configuration information of the wireless network comprises a password of the wireless network, and the password is encoded and encrypted in a mode of keeping the bit number of the password unchanged;
the configuration information of the wireless network comprises a Service Set Identifier (SSID) and/or a Basic Service Set Identifier (BSSID) of the wireless network, and the encoding and encrypting the configuration information of the wireless network comprises the following steps: dividing the service set identification SSID and/or the basic service set identification BSSID into one or more data sets according to a first preset bit number, complementing 8 bits of each data set to form an ASCII code, and performing first exchange processing on a second preset bit in the ASCII code; encrypting the ASCII codes after the first pair of modulation processing according to a first preset formula;
the first predetermined formula is:
the original data is A, and the encrypted data is A1;
If(A&0xf <= 7);
A1 = A+A&0xf;
Else if(7 < A&0xf <= 0xf);
A1 = A-(0xf-A&0xf)。
2. a method for configuring a wireless network, comprising:
entering a monitoring mode, wherein the monitoring mode allows a probe request sent by an intelligent terminal to be received;
receiving the Probe Request, wherein the Probe Request comprises a Probe Request frame, and acquiring a data packet in a Service Set Identification (SSID) field in the Probe Request frame;
organizing the data packets according to the total packet number and the packet sequence number in the data packets;
decrypting and decoding the data packet to obtain configuration information of the wireless network;
connecting the wireless network according to the configuration information of the wireless network;
the data packet comprises a password of the wireless network, and the data packet is decrypted and decoded in a mode of keeping the password bit number unchanged;
the data packet includes a service set identification SSID and/or a basic service set identification BSSID of the wireless network, and the decrypting and decoding the data packet includes: decrypting the data packet according to a second formula, acquiring a first specific bit in decrypted data to form an ASCII code, and performing exchange processing on a second specific bit in the ASCII code;
the second formula is: assuming that the encrypted data is A1, and the decrypted data is A;
if((A1&0xf)% 2 == 0)
A = (A1+(A1&0xf0))/2;
Else if(((A1&0xf)% 2 == 1))
A = (A1+(A1&0xf0)+0xf)/2 ;
the first specific bit corresponds to a first predetermined bit at the time of the encoding process, and the second specific bit corresponds to a second predetermined bit at the time of the encoding process.
3. An intelligent terminal for configuring a wireless network, comprising:
the coding encryption module is used for coding and encrypting configuration information of the wireless network;
the packet grouping module is used for writing the configuration information of the wireless network after coding and encryption into the effective data of the data packet in a mode of 1 byte corresponding to 1 byte, and writing the data packet into a service set identifier SSID field in a Probe Request frame;
a sending module, configured to send a Probe Request to the wireless network, where the Probe Request includes the Probe Request frame;
the coding encryption module is used for coding and encrypting the password in a mode of keeping the bit number of the password unchanged when the configuration information of the wireless network comprises the password of the wireless network;
the encoding and encrypting module is used for dividing the service set identifier SSID and/or the basic service set identifier BSSID into one or more data groups according to a first preset bit number when the configuration information of the wireless network comprises the service set identifier SSID and/or the basic service set identifier BSSID of the wireless network, supplementing 8 bits to each data group to form ASCII codes, and carrying out first exchange processing on a second preset bit in the ASCII codes; encrypting the ASCII codes after the first pair of modulation processing according to a first preset formula;
the first predetermined formula is:
the original data is A, and the encrypted data is A1;
If(A&0xf <= 7);
A1 = A+A&0xf;
Else if(7 < A&0xf <= 0xf);
A1 = A-(0xf-A&0xf) (1)。
4. a wireless network device, comprising:
the monitoring module is used for enabling the wireless network equipment to enter a monitoring mode, and the monitoring mode allows a probe request sent by the intelligent terminal to be received;
a receiving module, configured to receive the Probe Request, where the Probe Request includes a Probe Request frame, and obtain a data packet in a service set identifier SSID field in the Probe Request frame;
the unpacking module is used for organizing the data packets according to the total packet number and the packet sequence number in the data packets;
the decryption decoding module is used for decrypting and decoding the data packet to obtain the configuration information of the wireless network;
the connection module is used for connecting the wireless network according to the configuration information of the wireless network;
the decryption decoding module is used for decrypting and decoding the data packet in a mode of keeping the number of the cipher bits unchanged when the data packet comprises the cipher of the wireless network;
the decryption decoding module is configured to decrypt the data packet according to a second formula when the data packet includes a service set identifier SSID and/or a basic service set identifier BSSID of the wireless network, obtain a first specific bit in decrypted data to form an ASCII code, and perform exchange processing on a second specific bit in the ASCII code;
the second formula is: assuming that the encrypted data is A1, and the decrypted data is A;
if((A1&0xf)% 2 == 0)
A = (A1+(A1&0xf0))/2;
Else if(((A1&0xf)% 2 == 1))
A = (A1+(A1&0xf0)+0xf)/2;
the first specific bit corresponds to a first predetermined bit at the time of the encoding process, and the second specific bit corresponds to a second predetermined bit at the time of the encoding process.
5. A wireless network system in a wireless network environment, the wireless network system comprising: the intelligent terminal of claim 3 and the wireless network device of claim 4.
CN201510118753.7A 2015-03-18 2015-03-18 Configuration method of wireless network, intelligent terminal and wireless network equipment Active CN104703176B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510118753.7A CN104703176B (en) 2015-03-18 2015-03-18 Configuration method of wireless network, intelligent terminal and wireless network equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510118753.7A CN104703176B (en) 2015-03-18 2015-03-18 Configuration method of wireless network, intelligent terminal and wireless network equipment

Publications (2)

Publication Number Publication Date
CN104703176A CN104703176A (en) 2015-06-10
CN104703176B true CN104703176B (en) 2023-11-10

Family

ID=53349859

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510118753.7A Active CN104703176B (en) 2015-03-18 2015-03-18 Configuration method of wireless network, intelligent terminal and wireless network equipment

Country Status (1)

Country Link
CN (1) CN104703176B (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106454819A (en) * 2015-08-11 2017-02-22 中兴通讯股份有限公司 WIFI access point accessing method and apparatus
CN105933899B (en) 2016-04-14 2019-07-09 北京小米移动软件有限公司 The cut-in method and device of wireless access point
CN105848145A (en) * 2016-05-16 2016-08-10 福州瑞芯微电子股份有限公司 WIFI intelligent configuration method and device
CN106452924B (en) * 2016-11-30 2019-11-15 北京小米移动软件有限公司 The method and apparatus of synchronous radio network configuration
CN106856609A (en) * 2017-02-28 2017-06-16 苏州福瑞思信息科技有限公司 A kind of network collocating method and device
EP3641366B1 (en) * 2017-05-25 2023-05-17 Huawei Technologies Co., Ltd. Wireless local area network configuration method and apparatus
CN107360027A (en) * 2017-07-10 2017-11-17 绵阳美菱软件技术有限公司 The distribution method, apparatus and intelligent appliance of a kind of intelligent appliance
CN107360566B (en) * 2017-07-25 2020-11-27 深圳市盛路物联通讯技术有限公司 Type-based uplink data encryption control method and device for Internet of things terminal
CN108200634A (en) * 2018-02-12 2018-06-22 天津天地伟业信息系统集成有限公司 A kind of wireless network adding method of embedded device
CN110582107A (en) * 2018-06-08 2019-12-17 阿里巴巴集团控股有限公司 method and device for accessing network to be configured to network hotspot equipment
CN110636588A (en) * 2018-06-25 2019-12-31 阿里巴巴集团控股有限公司 Data communication method and device
CN111866813B (en) * 2019-04-30 2024-04-19 瑞昱半导体股份有限公司 Wireless connection setting and transmitting method
CN110162347B (en) * 2019-05-15 2023-05-16 苏州达家迎信息技术有限公司 Application program starting method, device, equipment and storage medium
CN110149631B (en) * 2019-05-29 2023-06-13 飞天诚信科技股份有限公司 Method and system suitable for cloud loudspeaker box connection establishment
CN114980101A (en) * 2022-06-07 2022-08-30 中移(杭州)信息技术有限公司 Access method, device, equipment and storage medium of wireless network

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103957580A (en) * 2014-05-14 2014-07-30 俞芳 Rapid WIFI networking matching method and module for smart hardware
CN104066101A (en) * 2014-06-12 2014-09-24 北京联盛德微电子有限责任公司 Wireless local area network card equipment automatic configuration method based on wireless network
CN104270744A (en) * 2014-09-28 2015-01-07 杭州雄迈信息技术有限公司 Rapid configuration system and method for wireless network
CN104410970A (en) * 2014-12-23 2015-03-11 北京极科极客科技有限公司 Wireless intelligent accessing method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8078160B2 (en) * 2007-08-17 2011-12-13 Kenneth Ray Quinn Wireless network notification, messaging and access device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103957580A (en) * 2014-05-14 2014-07-30 俞芳 Rapid WIFI networking matching method and module for smart hardware
CN104066101A (en) * 2014-06-12 2014-09-24 北京联盛德微电子有限责任公司 Wireless local area network card equipment automatic configuration method based on wireless network
CN104270744A (en) * 2014-09-28 2015-01-07 杭州雄迈信息技术有限公司 Rapid configuration system and method for wireless network
CN104410970A (en) * 2014-12-23 2015-03-11 北京极科极客科技有限公司 Wireless intelligent accessing method

Also Published As

Publication number Publication date
CN104703176A (en) 2015-06-10

Similar Documents

Publication Publication Date Title
CN104703176B (en) Configuration method of wireless network, intelligent terminal and wireless network equipment
CN103945369B (en) A kind of length by checking WIFI packets realizes the Internet-surfing configuration method of WIFI equipment
CN105072665B (en) Networking control, cut-in method and corresponding terminal and equipment
CN105101102B (en) Multicast transmission method, information extracting method and corresponding terminal and equipment
CN110582107A (en) method and device for accessing network to be configured to network hotspot equipment
RU2683853C1 (en) Method for improving gprs key, sgsn device, user device, hlr / hss and gprs system
US10341305B2 (en) Encrypted communications method and communications terminal, and computer storage medium
CN103402198B (en) A kind of method that radio communication terminal encryption parameter transmits
CN103096302A (en) Encryption method, deciphering method and related device
WO2021244489A1 (en) Method and apparatus for transmitting encryption control overhead in optical transport network
CN105119900A (en) Information secure transmission method, network access method and corresponding terminals
CN108430092A (en) Obtain, provide method, equipment and the medium of wireless access point access information
CN111884802B (en) Media stream encryption transmission method, system, terminal and electronic equipment
JP4344750B2 (en) Method and apparatus for in-line encryption and decryption of radio station
US9179303B2 (en) Methods and apparatus for transmitting and receiving secure and non-secure data
CN105848145A (en) WIFI intelligent configuration method and device
US10419212B2 (en) Methods, systems, apparatuses, and devices for securing network communications using multiple security protocols
JP2014502461A5 (en) Method and apparatus for sending and receiving secure and non-secure data
CN111050321A (en) Data processing method, device and storage medium
CN105120454A (en) Information transmission method, network access method and corresponding terminals
CN105120012B (en) Smart machine and its networking cut-in method, message receiving method and device
CN105592030A (en) IP message processing method and device
US20230308259A1 (en) Data transmission method, communication apparatus, and communication system
WO2023236984A1 (en) Wireless network access method, apparatus and device, and storage medium
WO2018214070A1 (en) Decoding method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant