CN105848145A - WIFI intelligent configuration method and device - Google Patents
WIFI intelligent configuration method and device Download PDFInfo
- Publication number
- CN105848145A CN105848145A CN201610325564.1A CN201610325564A CN105848145A CN 105848145 A CN105848145 A CN 105848145A CN 201610325564 A CN201610325564 A CN 201610325564A CN 105848145 A CN105848145 A CN 105848145A
- Authority
- CN
- China
- Prior art keywords
- message
- probe requests
- unit
- confidential information
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a WiFi intelligent configuration method and device. The device comprises a sending end and a receiving end. The method comprises the steps that the sending end sets configuration information and encrypts the configuration information; the encrypted information is stored in the SSID field of a detection request message and is sent to the receiving end; the receiving end extracts the encrypted information in the SSID field of the detection request message and decrypts the information to acquire the configuration information; and according to the configuration information, a wireless router is connected. Due to the fact that the encrypted information is transmitted through the detection request message in a management frame, the device is compatible with the demand of equipment using 802.11b only, 802.11b/g, 802.11b/g/n and other standard protocols. By multiplexing the SSID field in the detection request message, the encrypted information is transmitted. The sending end is not connected with AP, and the configuration information is directly sent to the receiving end. Configuration steps are simplified. The configuration efficiency is improved.
Description
Technical field
The present invention relates to computer realm, particularly to a kind of WIFI intelligent configuration method and device.
Background technology
Current WIFI chip (such as Broadcom/Ti/Mtk etc.) is all to use broadcast/group broadcast packet
Mode, it is achieved configure transmitting terminal (such as mobile phone/flat board etc.) to WIFI receiving terminal (as Internet of Things/IOT sets
Standby) intelligence configuration.Intelligence configuration refers to WIFI transmitting terminal, and without output input device, (outut device is such as
Screen etc., input equipment such as button etc.), directly WIFI is set by the APP of WIFI transmitting terminal and receives
The AP route-map that end end is to be connected, and make WIFI receiving terminal connect the AP specified intelligently
Process.The message transmitting party formula using broadcast data packet requires configuration transmitting terminal (such as mobile phone/flat board etc.)
After needing first to connect AP (wireless router), just WIFI receiving terminal can be carried out intelligence configuration,
Configuration process steps is loaded down with trivial details.
Further, since the data message that configuration transmitting terminal (such as mobile phone/flat board etc.) is sent to AP depends on
The coded system that configuration transmitting terminal self is used, main employing 802.11n mode sends, though can be with existing
There is most of WIFI hardware compatibility, but cannot compatible 802.11b only and 802.11b/g etc. not support
The equipment of 802.11n.
Summary of the invention
For this reason, it may be necessary to provide the technical scheme that a kind of WIFI intelligence configures, send out in order to solve existing WIFI
Sending end, when carrying out intelligence configuration, needs to connect AP and just can complete to cause operation complexity, complex steps, with
And owing to the restriction of configuration transmitting terminal coded system cannot the equipment such as compatible 802.11b only and 802.11b/g
Problem.
For achieving the above object, inventor providing a kind of WIFI Intelligent configuration device, described device includes
Transmitting terminal and receiving terminal, described transmitting terminal includes that configuration information arranges unit, ciphering unit, bag structure list
Unit and transmitting element;Described receiving terminal includes receiving unit, Packet analyzing unit, decryption unit and connection control
Unit processed;
Described configuration information arranges unit for arranging configuration information, and described configuration information includes wireless routing
The SSID of device and password;
Described ciphering unit, for being encrypted configuration information, obtains adding confidential information;
Described bag structural unit is for being stored in adding confidential information in the ssid field of probe requests thereby message;
Described transmitting element is for sending probe requests thereby message to receiving terminal;
Described reception unit is used for receiving probe requests thereby message;
Described Packet analyzing unit adds confidential information for extract ssid field in probe requests thereby message;
Described decryption unit is used for using decipherment algorithm to be decrypted adding confidential information, obtains configuration information,
The decipherment algorithm that AES that described decipherment algorithm is used by ciphering unit is corresponding;
Described connection control unit, for according to configuration information, controls receiving terminal and sets up even with wireless router
Connect.
Further, described bag structural unit includes that burst module, described Packet analyzing unit include mould of recombinating
Block;
Described burst module is for according to adding confidential information size, being stored respectively in many after adding confidential information burst
In the ssid field of individual probe requests thereby message, and the restructuring sequence number that labelling each probe requests thereby message is corresponding;
Described recombination module for extracting the confidential information that adds of ssid field in each probe requests thereby message, and
According to the restructuring sequence number that each probe requests thereby message is corresponding, to ssid field in each probe requests thereby message
Add confidential information to recombinate.
Further, described transmitting element is used for repeating to send repeatedly probe requests thereby message to receiving terminal.
Further, described " transmitting element is used for repeating to send repeatedly probe requests thereby message to receiving terminal "
Including: transmitting element is for repeating to send repeatedly probe requests thereby message on all channels of WIFI.
Further, described Packet analyzing unit also include encrypt information checking module, described in add confidential information school
Test in module ssid field in the probe requests thereby message that received of verification to add confidential information the completeest
Whole, send to decryption unit if confidential information then will be added, the most will not add confidential information and send to decryption unit.
It is further, described that " encryption information checking module is in the probe requests thereby message that verification is received
Ssid field in add confidential information the most complete " specifically include: encryption information checking module is used for judging
In ssid field in current probe requests thereby message add confidential information be whether transmission correct add confidential information,
If then by the encryption information cache in the ssid field in current probe requests thereby message in buffer unit;
Otherwise abandon and the ssid field in current probe requests thereby message adds confidential information;Correct the adding of described transmission
Confidential information is to add confidential information in the ssid field in the probe requests thereby message not received;
Described recombination module is in the probe requests thereby message being cached with all restructuring sequence numbers in buffer unit
Ssid field in add confidential information after, according to the restructuring sequence number that each probe requests thereby message is corresponding, to respectively
In individual probe requests thereby message, the confidential information that adds of ssid field is recombinated.
Further, described transmitting terminal and receiving terminal are also respectively provided with CRC check unit;Described CRC
Verification unit is for carrying out CRC check to adding confidential information, it is ensured that add the integrity of confidential information.
Inventor additionally provides a kind of WIFI intelligent configuration method, and described method is applied to WIFI intelligence and joins
Putting, described device includes that transmitting terminal and receiving terminal, described transmitting terminal include that configuration information arranges unit, adds
Close unit, bag structural unit and transmitting element;Described receiving terminal include receive unit, Packet analyzing unit,
Decryption unit and connection control unit;Said method comprising the steps of:
Configuration information arranges unit and arranges configuration information, and described configuration information includes the SSID of wireless router
And password;
Configuration information is encrypted by ciphering unit, obtains adding confidential information;
Bag structural unit is stored in adding confidential information in the ssid field of probe requests thereby message;
Probe requests thereby message is sent to receiving terminal by transmitting element;
Receive unit and receive probe requests thereby message;
What Packet analyzing unit extracted ssid field in probe requests thereby message adds confidential information;
Decryption unit uses decipherment algorithm to be decrypted adding confidential information, obtains configuration information, described deciphering
The decipherment algorithm that AES that algorithm is used by ciphering unit is corresponding;
Connect control unit to be connected with wireless router foundation according to configuration information, control receiving terminal.
Further, described bag structural unit includes that burst module, described Packet analyzing unit include mould of recombinating
Block;Described method includes:
Collapsible mould tuber is according to adding confidential information size, and being stored respectively in multiple detection after adding confidential information burst please
Ask in the ssid field of message, and the restructuring sequence number that labelling each probe requests thereby message is corresponding;
What recombination module extracted ssid field in each probe requests thereby message adds confidential information, and according to each
The restructuring sequence number that probe requests thereby message is corresponding, adds confidential information to ssid field in each probe requests thereby message
Recombinate.
Further, described " transmitting element by probe requests thereby message send to receiving terminal " including:
Transmitting element repeats to send repeatedly probe requests thereby message to receiving terminal.
Further, described " transmitting element repeats to send repeatedly probe requests thereby message and sends to receiving terminal "
Including: transmitting element repeats to send repeatedly probe requests thereby message on all channels of WIFI.
Further, described Packet analyzing unit also includes encrypting information checking module, and described method includes:
The encryption in ssid field in the probe requests thereby message that encryption information checking module verification is received
Information is the most complete, sends to decryption unit if then will add confidential information, the most will not add confidential information and send
To decryption unit.
Further, the described " SSID in the probe requests thereby message that encryption information checking module verification is received
In field to add confidential information the most complete " specifically include: encryption information checking module judges that current detection please
Ask in the ssid field in message add confidential information be whether transmission correct add confidential information, if then ought
The encryption information cache in ssid field in front probe requests thereby message is in buffer unit;Otherwise abandon and work as
Ssid field in front probe requests thereby message adds confidential information;What described transmission was correct adds confidential information for not
Ssid field in the probe requests thereby message received adds confidential information;
Recombination module is cached with the SSID in the probe requests thereby message of all restructuring sequence numbers in buffer unit
In field add confidential information after, according to the restructuring sequence number that each probe requests thereby message is corresponding, each is detected
In request message, the confidential information that adds of ssid field is recombinated.
Further, described transmitting terminal and receiving terminal are also respectively provided with CRC check unit;Described method
Including:
WIFI intelligent configuration method described in technique scheme and device, described method is applied to WIFI
Intelligence configuration, described device includes that transmitting terminal and receiving terminal, described transmitting terminal include that configuration information arranges list
Unit, ciphering unit, bag structural unit and transmitting element;Described receiving terminal includes receiving unit, Packet analyzing
Unit, decryption unit and connection control unit;Said method comprising the steps of: first configuration information sets
Putting unit and arrange configuration information, described configuration information includes SSID and the password of wireless router;Then add
Configuration information is encrypted by close unit, obtains adding confidential information;Then bag structural unit will add confidential information and deposit
It is stored in the ssid field of probe requests thereby message;Then probe requests thereby message is sent to receiving by transmitting element
End;Then receive unit and receive probe requests thereby message;Then Packet analyzing unit extracts probe requests thereby message
Middle ssid field add confidential information;Then decryption unit uses decipherment algorithm to be decrypted adding confidential information,
Obtain configuration information, the decipherment algorithm that AES that described decipherment algorithm is used by ciphering unit is corresponding;
Then connect control unit to be connected with wireless router foundation according to configuration information, control receiving terminal.
The probe requests thereby message in management frame is used to be transmitted owing to adding confidential information, probe requests thereby message
Transfer rate is 1Mbps, compatible can use 802.11b only, 802.11b/g and 802.11b/g/n etc.
The demand of the equipment of standard agreement.Meanwhile, the ssid field in multiplexed probe request message is to adding secret letter
Breath is transmitted so that WIFI configuration information transmitting terminal is when carrying out intelligence configuration, it is not necessary to set up with AP
Connect, can directly configuration information be sent to receiving terminal, simplify configuration step, improve configuration effect
Rate, save hardware cost.
Accompanying drawing explanation
Fig. 1 is the schematic diagram of the WIFI Intelligent configuration device that an embodiment of the present invention relates to;
Fig. 2 is the flow chart of the WIFI intelligent configuration method that an embodiment of the present invention relates to;
Fig. 3 is the flow chart of the WIFI intelligent configuration method that another embodiment of the present invention relates to.
Description of reference numerals:
101, transmitting terminal;
102, receiving terminal;
103, configuration information arranges unit;
104, ciphering unit;
105, bag structural unit;121, burst module;
106, transmitting element;
107, unit is received;
108, Packet analyzing unit;122, recombination module;123, encryption information checking module;
109, decryption unit;
110, control unit is connected;
111, CRC check unit.
Detailed description of the invention
By describing the technology contents of technical scheme, structural feature in detail, being realized purpose and effect, below
In conjunction with specific embodiments and coordinate accompanying drawing to be explained in detail.
Refer to Fig. 1, the schematic diagram of the WIFI Intelligent configuration device that an embodiment of the present invention relates to.Institute
Stating device and include transmitting terminal 101 and receiving terminal 102, transmitting terminal is the transmitting terminal of intelligence configuration information, permissible
For mobile phone, flat board etc.;Receiving terminal is the receiving terminal of intelligence configuration information, i.e. needs to build with wireless router
The vertical equipment connected, can be internet of things equipment, IOT equipment etc..Described transmitting terminal includes configuration information
Unit 103, ciphering unit 104, bag structural unit 105 and transmitting element 106 are set;Described receiving terminal
Including receiving unit 107, Packet analyzing unit 108, decryption unit 109 and connecting control unit 110;
Described configuration information arranges unit 103 for arranging configuration information, and described configuration information includes wireless
The SSID of router and password;
Described ciphering unit 104, for being encrypted configuration information, obtains adding confidential information;
Described bag structural unit 105 is for being stored in adding confidential information in the ssid field of probe requests thereby message;
Described transmitting element 106 is for sending probe requests thereby message to receiving terminal;
Described reception unit 107 is used for receiving probe requests thereby message;
Described Packet analyzing unit 108 adds confidential information for extract ssid field in probe requests thereby message;
Described decryption unit 109 is used for using decipherment algorithm to be decrypted adding confidential information, obtains configuration letter
Breath, the decipherment algorithm that AES that described decipherment algorithm is used by ciphering unit is corresponding;
Described connection control unit 110, for according to configuration information, controls receiving terminal and builds with wireless router
Vertical connection.
When using WIFI Intelligent configuration device, first configuration information arranges unit and arranges configuration information.Institute
State configuration information and include SSID and the password of wireless router.In application process, receiving terminal is in monitoring
Pattern, after receiving the SSID of wireless router of transmitting terminal transmission and password, can be according to without circuit
By SSID and the password of device, set up with corresponding wireless router and connect, thus complete transmitting terminal to reception
The intelligent configuration process of end.In other embodiments, described configuration information can also include except wireless
Other information beyond the SSID of router and password, such as the information such as encryption type of router.
Then configuration information is encrypted by ciphering unit, obtains adding confidential information.SSID to wireless router
It is encrypted with password, is conducive to improving the safety in configuration information transmitting procedure.AES includes
Des encryption algorithm, AES encryption algorithm, md5 encryption algorithm etc..
Then bag structural unit is stored in adding confidential information in the ssid field of probe requests thereby message.WIFI
Message is divided into management frame, Frame and control frame three kinds.Probe requests thereby message (Probe Request frame)
Being the one in management frame, speed of its transmission is 1Mbps, can compatible use 802.11b only,
The demand of the equipment of the standard agreements such as 80211b/g and 802.11b/g/n.By multiplexed probe request message
Ssid field storage adds confidential information, and configuration information is received using probe requests thereby message as carrier receiving end,
Transmitting terminal is connected without setting up with wireless router when carrying out intelligence configuration, thus simplifies configuration
Step.
In the present embodiment, described bag structural unit includes burst module 121.Described burst module is used for
According to adding confidential information size, after confidential information burst being added, it is stored respectively in the SSID of multiple probe requests thereby message
In field, and the restructuring sequence number that labelling each probe requests thereby message is corresponding.Due to each probe requests thereby message
Ssid field can to write the size of data be 32 bytes, and add confidential information may include tens or
Up to a hundred bytes, so that carry out burst process to adding confidential information, in order to it can be asked with multiple detections
The form seeking message sends to receiving terminal.The size such as adding confidential information is 100 bytes, then can will add
Confidential information burst is stored in the ssid field of 4 probe requests thereby messages, and these 4 detections of labelling respectively
The restructuring sequence number (such as 0,1,2,3) that request message is corresponding, in order to receiving terminal can according to restructuring sequence number,
The confidential information that adds in the ssid field of each probe requests thereby message is recombinated, obtains complete adding secret letter
Breath.
Then probe requests thereby message is sent to receiving terminal by transmitting element, and the reception unit of receiving terminal receives to be visited
Survey request message.What Packet analyzing unit extracted ssid field in probe requests thereby message adds confidential information.At this
In embodiment, described Packet analyzing unit includes that recombination module 122, described recombination module 122 are used for extracting
Go out the confidential information that adds of ssid field in each probe requests thereby message, and corresponding according to each probe requests thereby message
Restructuring sequence number, ssid field in each probe requests thereby message is added confidential information and recombinates.Equally with
Size be 100 bytes add confidential information as a example by, the burst module of transmitting terminal will add confidential information burst and be stored in 4
In the ssid field of individual probe requests thereby message, and the restructuring that this 4 probe requests thereby messages of labelling are corresponding respectively
Sequence number (such as 0,1,2,3), restructuring sequence number also can be stored in ssid field and send to receiving terminal.
Packet analyzing unit extract in the ssid field of these 4 probe requests thereby messages add confidential information after, according to often
The restructuring numeric order that individual probe requests thereby message is corresponding, in the ssid field to these 4 probe requests thereby messages
The confidential information that adds recombinate, and then obtain complete adding confidential information.
Then decryption unit uses decipherment algorithm to be decrypted adding confidential information, obtains configuration information.Described
The decipherment algorithm that AES that decipherment algorithm is used by ciphering unit is corresponding.Such as to configuration information
The AES used when being encrypted is md5 encryption algorithm, then ciphering unit can use MD5
The decipherment algorithm that AES is corresponding is decrypted adding confidential information, obtains configuration information (i.e. wireless routing
The SSID of device and password).
Then connect control unit to be connected with wireless router foundation according to configuration information, control receiving terminal.
Preferably, the WIFI chip in receiving terminal can be arranged to monitoring pattern, after receiving configuration information,
Connect control unit according to the SSID of the wireless router in configuration information and password, control receiving terminal with should
Wireless router corresponding for SSID is set up and is connected, thus completes intelligence configuration process.Receiving terminal is sent out in reception
During the probe requests thereby message that sending end sends, channel may be interfered and cause probe requests thereby message dropping,
Thus cause that receiving terminal received to add confidential information imperfect, thus in the present embodiment, described transmission
Unit is used for repeating to send repeatedly probe requests thereby message to receiving terminal.Preferably, user can be by advance
Arrange or control two ways in real time and control number of times and the total duration that probe requests thereby message sends, such as, use
It is 10 times that family can pre-set the group number of transmission probe requests thereby message, and the burst module of transmitting terminal will encryption
Information burst is stored in the ssid field of 4 probe requests thereby messages, and labelling these 4 detection please respectively
(i.e. 4 detections of restructuring sequence number 0,1,2,3 please to seek the restructuring serial number 0,1,2,3 that message is corresponding
Seeking message is one group), transmitting element can repeat to send 10 groups of probe requests thereby messages (restructuring serial number 0,1,
2,3 cycle through 10 times, 40 probe requests thereby messages altogether) to receiving terminal;User is permissible for another example
The time pre-setting transmission probe requests thereby message is 1min, then in 1min, transmitting element can circulate repeatedly
Ground send restructuring serial number 0,1,2,3 to receiving terminal, until time cut-off;Of coursing, user also may be used
To control transmitting element stopping in real time, to suspend or continue to send probe requests thereby message.By transmitting element weight
Recurrence send repeatedly probe requests thereby message to receiving terminal, it is ensured that receiving terminal can be completely received and comprise institute
Have restructuring sequence number adds confidential information, and then carries out recombinating and obtain complete adding confidential information.
It is in the present embodiment, described that " transmitting element is used for repeating to send repeatedly probe requests thereby message and sends
To receiving terminal " including: transmitting element is for repeating to send repeatedly probe requests thereby report on all channels of WIFI
Literary composition.A total of 13 of such as WIFI channel, the burst module of transmitting terminal will add confidential information burst and be stored in
In the ssid field of 4 probe requests thereby messages, and the weight that this 4 probe requests thereby messages of labelling are corresponding respectively
Group serial number 0,1,2,3 (i.e. 4 probe requests thereby messages of restructuring sequence number 0,1,2,3 are one group),
The group number of the transmission probe requests thereby message of user preset is 10 times, then transmitting element will transmitting terminal with connect
Send respectively in 13 channels that receiving end connects 10 groups of probe requests thereby messages (restructuring serial number 0,1,2,
3 cycle through 10 times, 40 probe requests thereby messages altogether) to receiving terminal, receiving terminal only need to select 13
Arbitrary channel in individual WIFI channel carries out monitoring the probe requests thereby message that can receive transmitting terminal transmission, phase
Compared with prior art only by the way of some WIFI channel sends probe requests thereby message, eliminate reception
End needs to carry out channel switching one by one just can listen to the tedious steps of probe requests thereby message, improves report
Literary composition receiving efficiency.
In the present embodiment, described Packet analyzing unit 108 also includes encrypting information checking module 123, institute
State in the encryption information checking module 123 ssid field in the probe requests thereby message that verification is received
Add confidential information the most complete, send to decryption unit if confidential information then will be added, the most will not add confidential information
Send to decryption unit.It is preferably, described that " encryption information checking module verifies the probe requests thereby received
In ssid field in message to add confidential information the most complete " specifically include: encryption information checking module is sentenced
In ssid field in disconnected current probe requests thereby message add confidential information be whether transmission correct add secret letter
Breath, if then by the encryption information cache in the ssid field in current probe requests thereby message in buffer unit
In;Otherwise abandon and the ssid field in current probe requests thereby message adds confidential information;Described transmission is correct
The confidential information that adds be that the ssid field in the probe requests thereby message not received adds confidential information.
It is stored in the restructuring SSID word that is respectively in the probe requests thereby message of 1,2,3 of sequence number adding confidential information
As a example by Duan, cause the probe requests thereby message dropping of restructuring serial number 2 owing to channel is interfered.Work as reception
When termination receives the probe requests thereby message of restructuring serial number 1, encryption information checking module judges current detection
In ssid field in request message add confidential information be whether transmission correct add confidential information, if receiving
Before the probe requests thereby message of this restructuring serial number 1, do not receive restructuring sequence number and be similarly the detection of 1
Request message, then can will add secret letter in the ssid field in the probe requests thereby message of this restructuring serial number 1
Breath caches to buffer unit.In like manner, also can be by the SSID in the probe requests thereby message of restructuring serial number 3
Encryption information cache in field is in buffer unit.Owing to the probe requests thereby message of restructuring serial number 2 is lost
Lose, thus can only wait when transmitting terminal sends again receive, transmitting element again send restructuring serial number 1,
2, when the probe requests thereby message of 3 is to receiving terminal, owing to buffer unit receiving restructuring sequence number the most in advance
It is the probe requests thereby message of 1 and 3, thus can be to the SSID in the probe requests thereby message of the two restructuring sequence number
The confidential information that adds in field is abandoned.And for the probe requests thereby message of restructuring serial number 2, by
Do not received in advance, illustrate recombinate serial number 2 probe requests thereby message ssid field in encryption
Information is that transmission is correct adds confidential information, thus this can be added confidential information and cache.When in buffer unit
Be cached with in the ssid field in the probe requests thereby message of all restructuring sequence numbers add confidential information after, mould of recombinating
Block is for the restructuring sequence number corresponding according to each probe requests thereby message, to SSID in each probe requests thereby message
The confidential information that adds of field is recombinated.
In the present embodiment, the SSID of each probe requests thereby message is additionally provided with burst and terminates identification information,
Described burst terminates identification information and adds whether confidential information attaches most importance to for identify the SSID of probe requests thereby message
What group sequence number was last adds confidential information.When buffer unit is cached with restructuring sequence number last add confidential information, with
And when the adding confidential information of all restructuring sequence numbers added before confidential information that restructuring sequence number is last, then caching is described
Unit contains the ssid field in the probe requests thereby message of whole recombination signal added confidential information.
In the present embodiment, described transmitting terminal and receiving terminal are also respectively provided with CRC check unit 111;
Described CRC check unit 111 is for carrying out CRC check to adding confidential information, it is ensured that add the complete of confidential information
Whole property.Cyclic redundancy check (CRC) (Cyclic Redundancy Check, CRC) be a kind of according to network packet or
The data such as computer document produce a kind of hash function of brief fixing figure place check code, be mainly used to detection or
The mistake being likely to occur after verification data transmission or preservation, it is that the principle utilizing division and remainder is made
Error detection.Pass through CRC check, it is ensured that add the integrity of confidential information.
And inventor provide a kind of WIFI intelligent configuration method.Refer to Fig. 2, real for the present invention one
The flow chart of the WIFI intelligent configuration method that the mode of executing relates to.Transmitting terminal is the transmitting terminal of intelligence configuration information,
Can be mobile phone, flat board etc.;Receiving terminal end is the receiving terminal of intelligence configuration information, i.e. needs and without circuit
Set up the equipment connected by device, can be internet of things equipment etc..Described method is applied to the configuration of WIFI intelligence,
Described device includes that transmitting terminal and receiving terminal, described transmitting terminal include that configuration information arranges unit, encryption list
Unit, bag structural unit and transmitting element;Described receiving terminal includes receiving unit, Packet analyzing unit, deciphering
Unit and connection control unit;Said method comprising the steps of:
Initially enter step S201 configuration information to arrange unit and arrange configuration information.Described configuration information includes
The SSID of wireless router and password.In application process, receiving terminal is in monitoring pattern, when receiving
After the SSID of wireless router that transmitting terminal sends and password, can according to the SSID of wireless router and
Password, sets up with corresponding wireless router and connects, thus completes the transmitting terminal intelligence configuration to receiving terminal
Process.
Then enter step S202 ciphering unit configuration information is encrypted, obtain adding confidential information.To nothing
SSID and the password of line router are encrypted, and are conducive to improving the safety in configuration information transmitting procedure.
AES includes des encryption algorithm, AES encryption algorithm, md5 encryption algorithm etc..
Then enter step S203 bag structural unit and will add confidential information and be stored in the SSID of probe requests thereby message
In field.WIFI message is divided into management frame, Frame and control frame three kinds.Probe requests thereby message (Probe
Request frame) it is the one in management frame, the speed of its transmission is 1Mbps, can compatible use
The demand of the equipment of the standard agreements such as 802.11b only, 802.11b/g and 802.11b/g/n.Pass through multiplexing
The ssid field storage of probe requests thereby message adds confidential information, and configuration information is using probe requests thereby message as carrier
Receiving end is received so that transmitting terminal is connected without setting up with wireless router when carrying out intelligence configuration,
Thus simplify configuration step.
In the present embodiment, described bag structural unit includes that burst module, described Packet analyzing unit include
Recombination module;Described method includes: collapsible mould tuber is according to adding confidential information size, after adding confidential information burst
It is stored respectively in the ssid field of multiple probe requests thereby message, and labelling each probe requests thereby message is corresponding
Restructuring sequence number.It is 32 owing to the ssid field of each probe requests thereby message can write the size of data
Byte, and add confidential information and may include tens or up to a hundred bytes, so that carry out adding confidential information
Burst processes, in order to it can send to receiving terminal with the form of multiple probe requests thereby messages.Such as encrypt
The size of information is 100 bytes, then can be stored in 4 probe requests thereby messages by adding confidential information burst
In ssid field, and restructuring sequence number that respectively these 4 probe requests thereby messages of labelling are corresponding (such as 0,1,2,
3), in order to receiving terminal can be according to restructuring sequence number, in the ssid field to each probe requests thereby message
Add confidential information to recombinate, obtain complete adding confidential information.
Then enter step S204 transmitting element to send probe requests thereby message to receiving terminal.Then enter step
Rapid S205 receives unit and receives probe requests thereby message, then enters step S206 Packet analyzing unit and extracts
In probe requests thereby message, ssid field adds confidential information.In the present embodiment, described Packet analyzing unit bag
Including recombination module 122, described recombination module 122 is used for extracting SSID word in each probe requests thereby message
Section add confidential information, and according to restructuring sequence number corresponding to each probe requests thereby message, to each probe requests thereby
In message, the confidential information that adds of ssid field is recombinated.With the confidential information that adds that size is 100 bytes it is equally
Example, then can be stored in adding confidential information burst in the ssid field of 4 probe requests thereby messages, and respectively
The restructuring sequence number (such as 0,1,2,3) that these 4 probe requests thereby messages of labelling are corresponding, restructuring sequence number also can
It is stored in ssid field and sends to receiving terminal.Packet analyzing unit extracts these 4 probe requests thereby messages
In ssid field add confidential information after, according to the restructuring numeric order that each probe requests thereby message is corresponding, right
The confidential information that adds in the ssid field of these 4 probe requests thereby messages is recombinated, and then obtains complete adding
Confidential information.
Then entering step S207 decryption unit uses decipherment algorithm to be decrypted adding confidential information, is joined
Confidence ceases.The decipherment algorithm that AES that described decipherment algorithm is used by ciphering unit is corresponding.Such as
The AES used when being encrypted configuration information is md5 encryption algorithm, then ciphering unit can
To use the decipherment algorithm that md5 encryption algorithm is corresponding to be decrypted adding confidential information, obtain configuration information (i.e.
The SSID of wireless router and password).
Then enter step S208 and connect control unit according to configuration information, control receiving terminal and wireless routing
Device is set up and is connected.Preferably, the WIFI chip in receiving terminal can be arranged to monitoring pattern, work as reception
After configuration information, connect control unit according to the SSID of the wireless router in configuration information and password,
Control the receiving terminal wireless router corresponding with this SSID and set up connection, thus complete intelligence configuration process.
Receiving terminal is when the probe requests thereby message that receiving end/sending end sends, and channel may be interfered and cause
Probe requests thereby message dropping, thus cause that receiving terminal received to add confidential information imperfect, thus in this reality
Executing in mode, described " probe requests thereby message is sent to receiving terminal by transmitting element " including: transmitting element
Repeat to send repeatedly probe requests thereby message to receiving terminal.Preferably, user can be by pre-setting or real
Time control two ways control probe requests thereby message send number of times and total duration, such as user can be pre-
The group number first arranging transmission probe requests thereby message is 10 times, and the burst module of transmitting terminal will add confidential information burst
It is stored in the ssid field of 4 probe requests thereby messages, and these 4 probe requests thereby messages pair of labelling respectively
(i.e. 4 probe requests thereby messages of restructuring sequence number 0,1,2,3 are the restructuring serial number 0,1,2,3 answered
One group), transmitting element can repeat to send 10 groups of probe requests thereby messages (restructuring serial number 0,1,2,3
Cycle through 10 times, 40 probe requests thereby messages altogether) to receiving terminal;User can be in advance for another example
Arranging and sending time of probe requests thereby message is 1min, then in 1min, transmitting element can circulate and sends out repeatedly
Send restructuring serial number 0,1,2,3 to receiving terminal, until time cut-off;Of coursing, user can also be real
Time control transmitting element stop, suspending or continues transmission probe requests thereby message.Repeat to send out by transmitting element
Send repeatedly probe requests thereby message to receiving terminal, it is ensured that receiving terminal can be completely received comprise all heavy
Group sequence number add confidential information, and then carry out recombinating and obtain complete adding confidential information.
It is in the present embodiment, described that " transmitting element repeats to send repeatedly probe requests thereby message and sends to connecing
Receiving end " including: transmitting element repeats to send repeatedly probe requests thereby message on all channels of WIFI.
A total of 13 of such as WIFI channel, the burst module of transmitting terminal will add confidential information burst and be stored in
In the ssid field of 4 probe requests thereby messages, and the weight that this 4 probe requests thereby messages of labelling are corresponding respectively
Group serial number 0,1,2,3 (i.e. 4 probe requests thereby messages of restructuring sequence number 0,1,2,3 are one group),
The group number of the transmission probe requests thereby message of user preset is 10 times, then transmitting element will transmitting terminal with connect
Send respectively in 13 channels that receiving end connects 10 groups of probe requests thereby messages (restructuring serial number 0,1,2,
3 cycle through 10 times, 40 probe requests thereby messages altogether) to receiving terminal, receiving terminal only need to select 13
Arbitrary channel in individual WIFI channel carries out monitoring the probe requests thereby message that can receive transmitting terminal transmission, phase
Compared with prior art only by the way of some WIFI channel sends probe requests thereby message, eliminate reception
End needs to carry out channel switching one by one just can listen to the tedious steps of probe requests thereby message, improves report
Literary composition receiving efficiency.
In the present embodiment, described Packet analyzing unit also includes encrypting information checking module, described method
Including: the encryption in ssid field in the probe requests thereby message that encryption information checking module verification is received
Information is the most complete, sends to decryption unit if then will add confidential information, the most will not add confidential information and send
To decryption unit.As it is shown on figure 3, described, " encryption information checking module verifies the probe requests thereby received
In ssid field in message to add confidential information the most complete " specifically include: initially enter step S301
Encryption information checking module judges whether add confidential information in the ssid field in current probe requests thereby message
Confidential information is added, if then entering step S303 by the SSID in current probe requests thereby message for transmission is correct
Encryption information cache in field is in buffer unit;Otherwise enter step S302 and abandon current probe requests thereby
Ssid field in message adds confidential information;What described transmission was correct adds confidential information is do not received
Ssid field in probe requests thereby message adds confidential information.
It is stored in the restructuring SSID word that is respectively in the probe requests thereby message of 1,2,3 of sequence number adding confidential information
As a example by Duan, cause the probe requests thereby message dropping of restructuring serial number 2 owing to channel is interfered.Work as reception
When termination receives the probe requests thereby message of restructuring serial number 1, encryption information checking module judges current detection
In ssid field in request message add confidential information be whether transmission correct add confidential information, if receiving
Before the probe requests thereby message of this restructuring serial number 1, do not receive restructuring sequence number and be similarly the detection of 1
Request message, then can will add secret letter in the ssid field in the probe requests thereby message of this restructuring serial number 1
Breath caches to buffer unit.In like manner, also can be by the SSID in the probe requests thereby message of restructuring serial number 3
Encryption information cache in field is in buffer unit.Owing to the probe requests thereby message of restructuring serial number 2 is lost
Lose, thus can only wait when transmitting terminal sends again receive, transmitting element again send restructuring serial number 1,
2, when the probe requests thereby message of 3 is to receiving terminal, owing to buffer unit receiving restructuring sequence number the most in advance
It is the probe requests thereby message of 1 and 3, thus can be to the SSID in the probe requests thereby message of the two restructuring sequence number
The confidential information that adds in field is abandoned.And for the probe requests thereby message of restructuring serial number 2, by
Do not received in advance, illustrate recombinate serial number 2 probe requests thereby message ssid field in encryption
Information is that transmission is correct adds confidential information, thus this can be added confidential information and cache.
Then enter step S304 recombination module in buffer unit, be cached with the detection of all restructuring sequence numbers please
Ask in the ssid field in message add confidential information after, according to the restructuring sequence that each probe requests thereby message is corresponding
Number, ssid field in each probe requests thereby message is added confidential information and recombinates.In the present embodiment,
The SSID of each probe requests thereby message is additionally provided with burst and terminates identification information, and described burst terminates mark letter
Breath for identify the SSID of probe requests thereby message add confidential information be whether restructuring sequence number last add secret letter
Breath.When buffer unit is cached with restructuring sequence number last add confidential information, and restructuring last the adding of sequence number
When adding confidential information of all restructuring sequence numbers before confidential information, then explanation buffer unit contains all
Ssid field in the probe requests thereby message of recombination signal adds confidential information.
In the present embodiment, described transmitting terminal and receiving terminal are also respectively provided with CRC check unit 111;
Described CRC check unit 111 is for carrying out CRC check to adding confidential information, it is ensured that add the complete of confidential information
Whole property.Cyclic redundancy check (CRC) (Cyclic Redundancy Check, CRC) be a kind of according to network packet or
The data such as computer document produce a kind of hash function of brief fixing figure place check code, be mainly used to detection or
The mistake being likely to occur after verification data transmission or preservation, it is that the principle utilizing division and remainder is made
Error detection.Pass through CRC check, it is ensured that add the integrity of confidential information.
WIFI intelligent configuration method described in technique scheme and device, described method is applied to WIFI
Intelligence configuration, described device includes that transmitting terminal and receiving terminal, described transmitting terminal include that configuration information arranges list
Unit, ciphering unit, bag structural unit and transmitting element;Described receiving terminal includes receiving unit, Packet analyzing
Unit, decryption unit and connection control unit;Said method comprising the steps of: first configuration information sets
Putting unit and arrange configuration information, described configuration information includes SSID and the password of wireless router;Then add
Configuration information is encrypted by close unit, obtains adding confidential information;Then bag structural unit will add confidential information and deposit
It is stored in the ssid field of probe requests thereby message;Then probe requests thereby message is sent to receiving by transmitting element
End;Then receive unit and receive probe requests thereby message;Then Packet analyzing unit extracts probe requests thereby message
Middle ssid field add confidential information;Then decryption unit uses decipherment algorithm to be decrypted adding confidential information,
Obtain configuration information, the decipherment algorithm that AES that described decipherment algorithm is used by ciphering unit is corresponding;
Then connect control unit to be connected with wireless router foundation according to configuration information, control receiving terminal.
The probe requests thereby message in management frame is used to be transmitted owing to adding confidential information, probe requests thereby message
Transfer rate is 1Mbps, compatible can use 802.11b only, 802.11b/g and 802.11b/g/n etc.
The demand of the equipment of standard agreement.Meanwhile, the ssid field in multiplexed probe request message is to adding secret letter
Breath is transmitted so that WIFI configuration information transmitting terminal is when carrying out intelligence configuration, it is not necessary to set up with AP
Connect, can directly configuration information be sent to receiving terminal, simplify configuration step, improve configuration effect
Rate, save hardware cost.
It should be noted that in this article, the relational terms of such as first and second or the like is used merely to
One entity or operation are separated with another entity or operating space, and not necessarily requires or imply
Relation or the order of any this reality is there is between these entities or operation.And, term " includes ",
" comprise " or its any other variant is intended to comprising of nonexcludability, so that include that one is
The process of row key element, method, article or terminal unit not only include those key elements, but also include not
There are other key elements being expressly recited, or also include setting for this process, method, article or terminal
Standby intrinsic key element.In the case of there is no more restriction, by statement " including ... " or " comprising ... "
The key element limited, it is not excluded that in including the process of described key element, method, article or terminal unit
There is also other key element.Additionally, in this article, the reason such as " being more than ", " being less than ", " exceeding "
Solve as not include this number;More than " ", " below ", " within " etc. be interpreted as including this number.
Those skilled in the art are it should be appreciated that the various embodiments described above can be provided as method, device or meter
Calculation machine program product.These embodiments can use complete hardware embodiment, complete software implementation or knot
The form of the embodiment in terms of conjunction software and hardware.Whole or portion in the method that the various embodiments described above relate to
Can instruct relevant hardware by program step by step to complete, described program can be stored in calculating
In the storage medium that machine equipment can read, all or part of for perform described in the various embodiments described above method
Step.Described computer equipment, includes but not limited to: personal computer, server, general purpose computer,
Special-purpose computer, the network equipment, embedded device, programmable device, intelligent mobile terminal, intelligence man
Occupy equipment, wearable intelligent equipment, vehicle intelligent equipment etc.;Described storage medium, including but do not limit
In: RAM, ROM, magnetic disc, tape, CD, flash memory, USB flash disk, portable hard drive, storage card, note
Recall rod, webserver storage, network cloud storage etc..
The various embodiments described above are with reference to according to the method described in embodiment, equipment (system) and computer program
The flow chart of product and/or block diagram describe.It should be understood that flow process can be realized by computer program instructions
Stream in each flow process in figure and/or block diagram and/or square frame and flow chart and/or block diagram
Journey and/or the combination of square frame.Can provide these computer program instructions to computer equipment processor with
Produce a machine so that the instruction performed by the processor of computer equipment is produced for realizing at stream
The function specified in one flow process of journey figure or multiple flow process and/or one square frame of block diagram or multiple square frame
Device.
These computer program instructions may be alternatively stored in the meter that computer equipment can be guided to work in a specific way
Calculate in machine equipment readable memory so that the instruction being stored in this computer equipment readable memory produces
Including the manufacture of command device, this command device realize one flow process of flow chart or multiple flow process and/
Or the function specified in one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded on computer equipment so that holds on a computing device
Row sequence of operations step is to produce computer implemented process, thus the finger performed on a computing device
Order provides for realizing at one flow process of flow chart or multiple flow process and/or one square frame or multiple of block diagram
The step of the function specified in square frame.
Although being described the various embodiments described above, but those skilled in the art once learn
Basic creative concept, then can make other change and amendment to these embodiments, so above institute
Stating only embodiments of the invention, not thereby limit the scope of patent protection of the present invention, every utilization is originally
Equivalent structure or equivalence flow process that description of the invention and accompanying drawing content are made convert, or directly or indirectly use
In the technical field that other are relevant, within being the most in like manner included in the scope of patent protection of the present invention.
Claims (14)
1. a WIFI Intelligent configuration device, it is characterised in that described device includes transmitting terminal and reception
End, described transmitting terminal includes that configuration information arranges unit, ciphering unit, bag structural unit and transmitting element;
Described receiving terminal includes receiving unit, Packet analyzing unit, decryption unit and connection control unit;
Described configuration information arranges unit for arranging configuration information, and described configuration information includes wireless routing
The SSID of device and password;
Described ciphering unit, for being encrypted configuration information, obtains adding confidential information;
Described bag structural unit is for being stored in adding confidential information in the ssid field of probe requests thereby message;
Described transmitting element is for sending probe requests thereby message to receiving terminal;
Described reception unit is used for receiving probe requests thereby message;
Described Packet analyzing unit adds confidential information for extract ssid field in probe requests thereby message;
Described decryption unit is used for using decipherment algorithm to be decrypted adding confidential information, obtains configuration information,
The decipherment algorithm that AES that described decipherment algorithm is used by ciphering unit is corresponding;
Described connection control unit, for according to configuration information, controls receiving terminal and sets up even with wireless router
Connect.
2. WIFI Intelligent configuration device as claimed in claim 1, it is characterised in that described bag constructs
Unit includes that burst module, described Packet analyzing unit include recombination module;
Described burst module is for according to adding confidential information size, being stored respectively in many after adding confidential information burst
In the ssid field of individual probe requests thereby message, and the restructuring sequence number that labelling each probe requests thereby message is corresponding;
Described recombination module for extracting the confidential information that adds of ssid field in each probe requests thereby message, and
According to the restructuring sequence number that each probe requests thereby message is corresponding, to ssid field in each probe requests thereby message
Add confidential information to recombinate.
3. WIFI Intelligent configuration device as claimed in claim 2, it is characterised in that described transmission list
Unit is used for repeating to send repeatedly probe requests thereby message to receiving terminal.
4. WIFI Intelligent configuration device as claimed in claim 3, it is characterised in that described " transmission
Unit is used for repeating to send repeatedly probe requests thereby message to receiving terminal " including: transmitting element is at WIFI
Repeat to send repeatedly probe requests thereby message on all channels.
5. WIFI Intelligent configuration device as claimed in claim 3, it is characterised in that described Packet analyzing
Unit also includes encrypting information checking module, the spy that described encryption information checking module is received for verification
Survey in the ssid field in request message to add confidential information the most complete, if then will add confidential information transmission extremely
Decryption unit, the most will not add confidential information and send to decryption unit.
6. WIFI Intelligent configuration device as claimed in claim 5, it is characterised in that described " encryption
What information checking module was used in the ssid field in the probe requests thereby message that verification is received adds confidential information
The most complete " specifically include: encryption information checking module is for the SSID judging in current probe requests thereby message
In field add confidential information be whether transmission correct add confidential information, if then by current probe requests thereby message
In ssid field in encryption information cache in buffer unit;Otherwise abandon current probe requests thereby message
In ssid field in add confidential information;What described transmission was correct adds confidential information is the detection not received
Ssid field in request message adds confidential information;
Described recombination module is in the probe requests thereby message being cached with all restructuring sequence numbers in buffer unit
Ssid field in add confidential information after, according to the restructuring sequence number that each probe requests thereby message is corresponding, to respectively
In individual probe requests thereby message, the confidential information that adds of ssid field is recombinated.
7. WIFI Intelligent configuration device as claimed in claim 1, it is characterised in that described transmitting terminal
It is also respectively provided with CRC check unit with receiving terminal;Described CRC check unit is for adding confidential information
Carry out CRC check, it is ensured that add the integrity of confidential information.
8. a WIFI intelligent configuration method, it is characterised in that described method is applied to WIFI intelligence and joins
Putting, described device includes that transmitting terminal and receiving terminal, described transmitting terminal include that configuration information arranges unit, adds
Close unit, bag structural unit and transmitting element;Described receiving terminal include receive unit, Packet analyzing unit,
Decryption unit and connection control unit;Said method comprising the steps of:
Configuration information arranges unit and arranges configuration information, and described configuration information includes the SSID of wireless router
And password;
Configuration information is encrypted by ciphering unit, obtains adding confidential information;
Bag structural unit is stored in adding confidential information in the ssid field of probe requests thereby message;
Probe requests thereby message is sent to receiving terminal by transmitting element;
Receive unit and receive probe requests thereby message;
What Packet analyzing unit extracted ssid field in probe requests thereby message adds confidential information;
Decryption unit uses decipherment algorithm to be decrypted adding confidential information, obtains configuration information, described deciphering
The decipherment algorithm that AES that algorithm is used by ciphering unit is corresponding;
Connect control unit to be connected with wireless router foundation according to configuration information, control receiving terminal.
9. WIFI intelligent configuration method as claimed in claim 8, it is characterised in that described bag constructs
Unit includes that burst module, described Packet analyzing unit include recombination module;Described method includes:
Collapsible mould tuber is according to adding confidential information size, and being stored respectively in multiple detection after adding confidential information burst please
Ask in the ssid field of message, and the restructuring sequence number that labelling each probe requests thereby message is corresponding;
What recombination module extracted ssid field in each probe requests thereby message adds confidential information, and according to each
The restructuring sequence number that probe requests thereby message is corresponding, adds confidential information to ssid field in each probe requests thereby message
Recombinate.
10. WIFI intelligent configuration method as claimed in claim 9, it is characterised in that described " transmission
Probe requests thereby message is sent to receiving terminal by unit " including:
Transmitting element repeats to send repeatedly probe requests thereby message to receiving terminal.
11. WIFI intelligent configuration methods as claimed in claim 10, it is characterised in that described "
Send unit to repeat to send repeatedly probe requests thereby message to send to receiving terminal " including:
Transmitting element repeats to send repeatedly probe requests thereby message on all channels of WIFI.
12. WIFI intelligent configuration methods as claimed in claim 10, it is characterised in that described bag solution
Analysis unit also includes encrypting information checking module, and described method includes:
The encryption in ssid field in the probe requests thereby message that encryption information checking module verification is received
Information is the most complete, sends to decryption unit if then will add confidential information, the most will not add confidential information and send
To decryption unit.
13. WIFI intelligent configuration methods as claimed in claim 12, it is characterised in that described " add
The confidential information that adds in ssid field in the probe requests thereby message that the verification of confidential information correction verification module is received is
No complete " specifically include: encryption information checking module judges the ssid field in current probe requests thereby message
In add confidential information be whether transmission correct add confidential information, if then by current probe requests thereby message
Encryption information cache in ssid field is in buffer unit;Otherwise abandon in current probe requests thereby message
Ssid field adds confidential information;What described transmission was correct adds confidential information is the probe requests thereby not received
Ssid field in message adds confidential information;
Recombination module is cached with the SSID in the probe requests thereby message of all restructuring sequence numbers in buffer unit
In field add confidential information after, according to the restructuring sequence number that each probe requests thereby message is corresponding, each is detected
In request message, the confidential information that adds of ssid field is recombinated.
14. WIFI intelligent configuration methods as claimed in claim 8, it is characterised in that described transmitting terminal
It is also respectively provided with CRC check unit with receiving terminal;Described method includes:
CRC check unit carries out CRC check to adding confidential information, it is ensured that add the integrity of confidential information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610325564.1A CN105848145A (en) | 2016-05-16 | 2016-05-16 | WIFI intelligent configuration method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610325564.1A CN105848145A (en) | 2016-05-16 | 2016-05-16 | WIFI intelligent configuration method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105848145A true CN105848145A (en) | 2016-08-10 |
Family
ID=56593394
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610325564.1A Pending CN105848145A (en) | 2016-05-16 | 2016-05-16 | WIFI intelligent configuration method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105848145A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106507394A (en) * | 2016-11-15 | 2017-03-15 | 杭州华三通信技术有限公司 | Data transmission method for uplink, data receiver method and electronic equipment, access point |
CN106792670A (en) * | 2016-12-28 | 2017-05-31 | 深圳市北海轨道交通技术有限公司 | Unconnected wireless communications method and device |
CN109041033A (en) * | 2018-09-14 | 2018-12-18 | 杭州若奇技术有限公司 | Smart machine distribution method and system based on RFID |
CN109756505A (en) * | 2019-01-16 | 2019-05-14 | 北京左江科技股份有限公司 | The transparent TCP/IP network transmission message recombining method of a kind of pair of terminal device |
CN112261707A (en) * | 2020-10-20 | 2021-01-22 | 四川天邑康和通信股份有限公司 | Method for realizing automatic network distribution between intelligent equipment and WIFI6 router |
CN113473573A (en) * | 2021-06-08 | 2021-10-01 | 北京小米移动软件有限公司 | Information processing method and device, wireless access equipment and intelligent household equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103607751A (en) * | 2013-11-18 | 2014-02-26 | 深圳市通力科技开发有限公司 | Wireless device configuration method and system |
CN103841658A (en) * | 2014-02-24 | 2014-06-04 | 北京新岸线移动多媒体技术有限公司 | Method and device for transmitting and receiving information |
CN104703176A (en) * | 2015-03-18 | 2015-06-10 | 北京联盛德微电子有限责任公司 | Configuration method of wireless network, intelligent terminal and wireless network equipment |
CN104837132A (en) * | 2015-04-17 | 2015-08-12 | 北京奇艺世纪科技有限公司 | Wi-Fi (Wireless-Fidelity) network sharing method and device |
CN105050083A (en) * | 2015-05-25 | 2015-11-11 | 深圳创维数字技术有限公司 | Network configuration method and system for intelligent equipment |
CN105049416A (en) * | 2015-06-15 | 2015-11-11 | 小米科技有限责任公司 | Method and apparatus for accessing to wifi network |
-
2016
- 2016-05-16 CN CN201610325564.1A patent/CN105848145A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103607751A (en) * | 2013-11-18 | 2014-02-26 | 深圳市通力科技开发有限公司 | Wireless device configuration method and system |
CN103841658A (en) * | 2014-02-24 | 2014-06-04 | 北京新岸线移动多媒体技术有限公司 | Method and device for transmitting and receiving information |
CN104703176A (en) * | 2015-03-18 | 2015-06-10 | 北京联盛德微电子有限责任公司 | Configuration method of wireless network, intelligent terminal and wireless network equipment |
CN104837132A (en) * | 2015-04-17 | 2015-08-12 | 北京奇艺世纪科技有限公司 | Wi-Fi (Wireless-Fidelity) network sharing method and device |
CN105050083A (en) * | 2015-05-25 | 2015-11-11 | 深圳创维数字技术有限公司 | Network configuration method and system for intelligent equipment |
CN105049416A (en) * | 2015-06-15 | 2015-11-11 | 小米科技有限责任公司 | Method and apparatus for accessing to wifi network |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106507394A (en) * | 2016-11-15 | 2017-03-15 | 杭州华三通信技术有限公司 | Data transmission method for uplink, data receiver method and electronic equipment, access point |
CN106507394B (en) * | 2016-11-15 | 2021-04-09 | 新华三技术有限公司 | Data sending method, data receiving method, electronic equipment and access point |
CN106792670A (en) * | 2016-12-28 | 2017-05-31 | 深圳市北海轨道交通技术有限公司 | Unconnected wireless communications method and device |
CN106792670B (en) * | 2016-12-28 | 2020-04-14 | 深圳市北海轨道交通技术有限公司 | Disconnected wireless communication method and device |
CN109041033A (en) * | 2018-09-14 | 2018-12-18 | 杭州若奇技术有限公司 | Smart machine distribution method and system based on RFID |
CN109756505A (en) * | 2019-01-16 | 2019-05-14 | 北京左江科技股份有限公司 | The transparent TCP/IP network transmission message recombining method of a kind of pair of terminal device |
CN112261707A (en) * | 2020-10-20 | 2021-01-22 | 四川天邑康和通信股份有限公司 | Method for realizing automatic network distribution between intelligent equipment and WIFI6 router |
CN113473573A (en) * | 2021-06-08 | 2021-10-01 | 北京小米移动软件有限公司 | Information processing method and device, wireless access equipment and intelligent household equipment |
CN113473573B (en) * | 2021-06-08 | 2024-03-12 | 北京小米移动软件有限公司 | Information processing method and device, wireless access equipment and intelligent household equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105848145A (en) | WIFI intelligent configuration method and device | |
CN101873587B (en) | Wireless communication device and method for realizing service security thereof | |
CN107786331B (en) | Data processing method, device, system and computer readable storage medium | |
CN103546289B (en) | USB (universal serial bus) Key based secure data transmission method and system | |
US10341305B2 (en) | Encrypted communications method and communications terminal, and computer storage medium | |
EP3337088B1 (en) | Data encryption method, decryption method, apparatus, and system | |
CN104602364A (en) | Method for connecting wireless device to wireless access point and wireless device, intelligent terminal | |
US11310727B2 (en) | Methods, devices and media for obtaining and for providing access information of wireless access points | |
CN103345453B (en) | Based on supporting the method that the fixed disk data enciphering card of SATA interface is encrypted | |
CN104244245A (en) | Wireless access authentication method, wireless router device and wireless terminal | |
WO2015003503A1 (en) | Network device, terminal device and information security improving method | |
WO2015117351A1 (en) | Wifi connection method, device and system, and computer storage medium | |
CN102970676B (en) | A kind of method handled initial data, Internet of things system and terminal | |
CN105376059A (en) | Method and system for performing application signature based on electronic key | |
CN102057615A (en) | A system and method of reducing encryption overhead by concatenating multiple connection packets associated with a security association | |
CN104935435A (en) | Login methods, terminal and application server | |
CN109831775B (en) | Processor, baseband chip and SIM card information transmission method | |
CN105208028A (en) | Data transmission method and related device and equipment | |
CN106599698A (en) | Method and device for picture encryption, and method and device for picture decryption | |
CN103701586A (en) | Method and device for acquiring secret key | |
CN105471876A (en) | Encryption communication method and device | |
CN103458401B (en) | A kind of voice encryption communication system and communication means | |
CN113038463B (en) | Communication encryption authentication experimental device | |
CN103873245B (en) | Dummy machine system data ciphering method and equipment | |
KR101329789B1 (en) | Encryption Method of Database of Mobile Communication Device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160810 |