CN105848145A - WIFI intelligent configuration method and device - Google Patents

WIFI intelligent configuration method and device Download PDF

Info

Publication number
CN105848145A
CN105848145A CN201610325564.1A CN201610325564A CN105848145A CN 105848145 A CN105848145 A CN 105848145A CN 201610325564 A CN201610325564 A CN 201610325564A CN 105848145 A CN105848145 A CN 105848145A
Authority
CN
China
Prior art keywords
message
probe requests
unit
confidential information
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610325564.1A
Other languages
Chinese (zh)
Inventor
刘大伟
王萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fuzhou Rockchip Electronics Co Ltd
Original Assignee
Fuzhou Rockchip Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fuzhou Rockchip Electronics Co Ltd filed Critical Fuzhou Rockchip Electronics Co Ltd
Priority to CN201610325564.1A priority Critical patent/CN105848145A/en
Publication of CN105848145A publication Critical patent/CN105848145A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a WiFi intelligent configuration method and device. The device comprises a sending end and a receiving end. The method comprises the steps that the sending end sets configuration information and encrypts the configuration information; the encrypted information is stored in the SSID field of a detection request message and is sent to the receiving end; the receiving end extracts the encrypted information in the SSID field of the detection request message and decrypts the information to acquire the configuration information; and according to the configuration information, a wireless router is connected. Due to the fact that the encrypted information is transmitted through the detection request message in a management frame, the device is compatible with the demand of equipment using 802.11b only, 802.11b/g, 802.11b/g/n and other standard protocols. By multiplexing the SSID field in the detection request message, the encrypted information is transmitted. The sending end is not connected with AP, and the configuration information is directly sent to the receiving end. Configuration steps are simplified. The configuration efficiency is improved.

Description

A kind of WIFI intelligent configuration method and device
Technical field
The present invention relates to computer realm, particularly to a kind of WIFI intelligent configuration method and device.
Background technology
Current WIFI chip (such as Broadcom/Ti/Mtk etc.) is all to use broadcast/group broadcast packet Mode, it is achieved configure transmitting terminal (such as mobile phone/flat board etc.) to WIFI receiving terminal (as Internet of Things/IOT sets Standby) intelligence configuration.Intelligence configuration refers to WIFI transmitting terminal, and without output input device, (outut device is such as Screen etc., input equipment such as button etc.), directly WIFI is set by the APP of WIFI transmitting terminal and receives The AP route-map that end end is to be connected, and make WIFI receiving terminal connect the AP specified intelligently Process.The message transmitting party formula using broadcast data packet requires configuration transmitting terminal (such as mobile phone/flat board etc.) After needing first to connect AP (wireless router), just WIFI receiving terminal can be carried out intelligence configuration, Configuration process steps is loaded down with trivial details.
Further, since the data message that configuration transmitting terminal (such as mobile phone/flat board etc.) is sent to AP depends on The coded system that configuration transmitting terminal self is used, main employing 802.11n mode sends, though can be with existing There is most of WIFI hardware compatibility, but cannot compatible 802.11b only and 802.11b/g etc. not support The equipment of 802.11n.
Summary of the invention
For this reason, it may be necessary to provide the technical scheme that a kind of WIFI intelligence configures, send out in order to solve existing WIFI Sending end, when carrying out intelligence configuration, needs to connect AP and just can complete to cause operation complexity, complex steps, with And owing to the restriction of configuration transmitting terminal coded system cannot the equipment such as compatible 802.11b only and 802.11b/g Problem.
For achieving the above object, inventor providing a kind of WIFI Intelligent configuration device, described device includes Transmitting terminal and receiving terminal, described transmitting terminal includes that configuration information arranges unit, ciphering unit, bag structure list Unit and transmitting element;Described receiving terminal includes receiving unit, Packet analyzing unit, decryption unit and connection control Unit processed;
Described configuration information arranges unit for arranging configuration information, and described configuration information includes wireless routing The SSID of device and password;
Described ciphering unit, for being encrypted configuration information, obtains adding confidential information;
Described bag structural unit is for being stored in adding confidential information in the ssid field of probe requests thereby message;
Described transmitting element is for sending probe requests thereby message to receiving terminal;
Described reception unit is used for receiving probe requests thereby message;
Described Packet analyzing unit adds confidential information for extract ssid field in probe requests thereby message;
Described decryption unit is used for using decipherment algorithm to be decrypted adding confidential information, obtains configuration information, The decipherment algorithm that AES that described decipherment algorithm is used by ciphering unit is corresponding;
Described connection control unit, for according to configuration information, controls receiving terminal and sets up even with wireless router Connect.
Further, described bag structural unit includes that burst module, described Packet analyzing unit include mould of recombinating Block;
Described burst module is for according to adding confidential information size, being stored respectively in many after adding confidential information burst In the ssid field of individual probe requests thereby message, and the restructuring sequence number that labelling each probe requests thereby message is corresponding;
Described recombination module for extracting the confidential information that adds of ssid field in each probe requests thereby message, and According to the restructuring sequence number that each probe requests thereby message is corresponding, to ssid field in each probe requests thereby message Add confidential information to recombinate.
Further, described transmitting element is used for repeating to send repeatedly probe requests thereby message to receiving terminal.
Further, described " transmitting element is used for repeating to send repeatedly probe requests thereby message to receiving terminal " Including: transmitting element is for repeating to send repeatedly probe requests thereby message on all channels of WIFI.
Further, described Packet analyzing unit also include encrypt information checking module, described in add confidential information school Test in module ssid field in the probe requests thereby message that received of verification to add confidential information the completeest Whole, send to decryption unit if confidential information then will be added, the most will not add confidential information and send to decryption unit.
It is further, described that " encryption information checking module is in the probe requests thereby message that verification is received Ssid field in add confidential information the most complete " specifically include: encryption information checking module is used for judging In ssid field in current probe requests thereby message add confidential information be whether transmission correct add confidential information, If then by the encryption information cache in the ssid field in current probe requests thereby message in buffer unit; Otherwise abandon and the ssid field in current probe requests thereby message adds confidential information;Correct the adding of described transmission Confidential information is to add confidential information in the ssid field in the probe requests thereby message not received;
Described recombination module is in the probe requests thereby message being cached with all restructuring sequence numbers in buffer unit Ssid field in add confidential information after, according to the restructuring sequence number that each probe requests thereby message is corresponding, to respectively In individual probe requests thereby message, the confidential information that adds of ssid field is recombinated.
Further, described transmitting terminal and receiving terminal are also respectively provided with CRC check unit;Described CRC Verification unit is for carrying out CRC check to adding confidential information, it is ensured that add the integrity of confidential information.
Inventor additionally provides a kind of WIFI intelligent configuration method, and described method is applied to WIFI intelligence and joins Putting, described device includes that transmitting terminal and receiving terminal, described transmitting terminal include that configuration information arranges unit, adds Close unit, bag structural unit and transmitting element;Described receiving terminal include receive unit, Packet analyzing unit, Decryption unit and connection control unit;Said method comprising the steps of:
Configuration information arranges unit and arranges configuration information, and described configuration information includes the SSID of wireless router And password;
Configuration information is encrypted by ciphering unit, obtains adding confidential information;
Bag structural unit is stored in adding confidential information in the ssid field of probe requests thereby message;
Probe requests thereby message is sent to receiving terminal by transmitting element;
Receive unit and receive probe requests thereby message;
What Packet analyzing unit extracted ssid field in probe requests thereby message adds confidential information;
Decryption unit uses decipherment algorithm to be decrypted adding confidential information, obtains configuration information, described deciphering The decipherment algorithm that AES that algorithm is used by ciphering unit is corresponding;
Connect control unit to be connected with wireless router foundation according to configuration information, control receiving terminal.
Further, described bag structural unit includes that burst module, described Packet analyzing unit include mould of recombinating Block;Described method includes:
Collapsible mould tuber is according to adding confidential information size, and being stored respectively in multiple detection after adding confidential information burst please Ask in the ssid field of message, and the restructuring sequence number that labelling each probe requests thereby message is corresponding;
What recombination module extracted ssid field in each probe requests thereby message adds confidential information, and according to each The restructuring sequence number that probe requests thereby message is corresponding, adds confidential information to ssid field in each probe requests thereby message Recombinate.
Further, described " transmitting element by probe requests thereby message send to receiving terminal " including:
Transmitting element repeats to send repeatedly probe requests thereby message to receiving terminal.
Further, described " transmitting element repeats to send repeatedly probe requests thereby message and sends to receiving terminal " Including: transmitting element repeats to send repeatedly probe requests thereby message on all channels of WIFI.
Further, described Packet analyzing unit also includes encrypting information checking module, and described method includes:
The encryption in ssid field in the probe requests thereby message that encryption information checking module verification is received Information is the most complete, sends to decryption unit if then will add confidential information, the most will not add confidential information and send To decryption unit.
Further, the described " SSID in the probe requests thereby message that encryption information checking module verification is received In field to add confidential information the most complete " specifically include: encryption information checking module judges that current detection please Ask in the ssid field in message add confidential information be whether transmission correct add confidential information, if then ought The encryption information cache in ssid field in front probe requests thereby message is in buffer unit;Otherwise abandon and work as Ssid field in front probe requests thereby message adds confidential information;What described transmission was correct adds confidential information for not Ssid field in the probe requests thereby message received adds confidential information;
Recombination module is cached with the SSID in the probe requests thereby message of all restructuring sequence numbers in buffer unit In field add confidential information after, according to the restructuring sequence number that each probe requests thereby message is corresponding, each is detected In request message, the confidential information that adds of ssid field is recombinated.
Further, described transmitting terminal and receiving terminal are also respectively provided with CRC check unit;Described method Including:
WIFI intelligent configuration method described in technique scheme and device, described method is applied to WIFI Intelligence configuration, described device includes that transmitting terminal and receiving terminal, described transmitting terminal include that configuration information arranges list Unit, ciphering unit, bag structural unit and transmitting element;Described receiving terminal includes receiving unit, Packet analyzing Unit, decryption unit and connection control unit;Said method comprising the steps of: first configuration information sets Putting unit and arrange configuration information, described configuration information includes SSID and the password of wireless router;Then add Configuration information is encrypted by close unit, obtains adding confidential information;Then bag structural unit will add confidential information and deposit It is stored in the ssid field of probe requests thereby message;Then probe requests thereby message is sent to receiving by transmitting element End;Then receive unit and receive probe requests thereby message;Then Packet analyzing unit extracts probe requests thereby message Middle ssid field add confidential information;Then decryption unit uses decipherment algorithm to be decrypted adding confidential information, Obtain configuration information, the decipherment algorithm that AES that described decipherment algorithm is used by ciphering unit is corresponding; Then connect control unit to be connected with wireless router foundation according to configuration information, control receiving terminal.
The probe requests thereby message in management frame is used to be transmitted owing to adding confidential information, probe requests thereby message Transfer rate is 1Mbps, compatible can use 802.11b only, 802.11b/g and 802.11b/g/n etc. The demand of the equipment of standard agreement.Meanwhile, the ssid field in multiplexed probe request message is to adding secret letter Breath is transmitted so that WIFI configuration information transmitting terminal is when carrying out intelligence configuration, it is not necessary to set up with AP Connect, can directly configuration information be sent to receiving terminal, simplify configuration step, improve configuration effect Rate, save hardware cost.
Accompanying drawing explanation
Fig. 1 is the schematic diagram of the WIFI Intelligent configuration device that an embodiment of the present invention relates to;
Fig. 2 is the flow chart of the WIFI intelligent configuration method that an embodiment of the present invention relates to;
Fig. 3 is the flow chart of the WIFI intelligent configuration method that another embodiment of the present invention relates to.
Description of reference numerals:
101, transmitting terminal;
102, receiving terminal;
103, configuration information arranges unit;
104, ciphering unit;
105, bag structural unit;121, burst module;
106, transmitting element;
107, unit is received;
108, Packet analyzing unit;122, recombination module;123, encryption information checking module;
109, decryption unit;
110, control unit is connected;
111, CRC check unit.
Detailed description of the invention
By describing the technology contents of technical scheme, structural feature in detail, being realized purpose and effect, below In conjunction with specific embodiments and coordinate accompanying drawing to be explained in detail.
Refer to Fig. 1, the schematic diagram of the WIFI Intelligent configuration device that an embodiment of the present invention relates to.Institute Stating device and include transmitting terminal 101 and receiving terminal 102, transmitting terminal is the transmitting terminal of intelligence configuration information, permissible For mobile phone, flat board etc.;Receiving terminal is the receiving terminal of intelligence configuration information, i.e. needs to build with wireless router The vertical equipment connected, can be internet of things equipment, IOT equipment etc..Described transmitting terminal includes configuration information Unit 103, ciphering unit 104, bag structural unit 105 and transmitting element 106 are set;Described receiving terminal Including receiving unit 107, Packet analyzing unit 108, decryption unit 109 and connecting control unit 110;
Described configuration information arranges unit 103 for arranging configuration information, and described configuration information includes wireless The SSID of router and password;
Described ciphering unit 104, for being encrypted configuration information, obtains adding confidential information;
Described bag structural unit 105 is for being stored in adding confidential information in the ssid field of probe requests thereby message;
Described transmitting element 106 is for sending probe requests thereby message to receiving terminal;
Described reception unit 107 is used for receiving probe requests thereby message;
Described Packet analyzing unit 108 adds confidential information for extract ssid field in probe requests thereby message;
Described decryption unit 109 is used for using decipherment algorithm to be decrypted adding confidential information, obtains configuration letter Breath, the decipherment algorithm that AES that described decipherment algorithm is used by ciphering unit is corresponding;
Described connection control unit 110, for according to configuration information, controls receiving terminal and builds with wireless router Vertical connection.
When using WIFI Intelligent configuration device, first configuration information arranges unit and arranges configuration information.Institute State configuration information and include SSID and the password of wireless router.In application process, receiving terminal is in monitoring Pattern, after receiving the SSID of wireless router of transmitting terminal transmission and password, can be according to without circuit By SSID and the password of device, set up with corresponding wireless router and connect, thus complete transmitting terminal to reception The intelligent configuration process of end.In other embodiments, described configuration information can also include except wireless Other information beyond the SSID of router and password, such as the information such as encryption type of router.
Then configuration information is encrypted by ciphering unit, obtains adding confidential information.SSID to wireless router It is encrypted with password, is conducive to improving the safety in configuration information transmitting procedure.AES includes Des encryption algorithm, AES encryption algorithm, md5 encryption algorithm etc..
Then bag structural unit is stored in adding confidential information in the ssid field of probe requests thereby message.WIFI Message is divided into management frame, Frame and control frame three kinds.Probe requests thereby message (Probe Request frame) Being the one in management frame, speed of its transmission is 1Mbps, can compatible use 802.11b only, The demand of the equipment of the standard agreements such as 80211b/g and 802.11b/g/n.By multiplexed probe request message Ssid field storage adds confidential information, and configuration information is received using probe requests thereby message as carrier receiving end, Transmitting terminal is connected without setting up with wireless router when carrying out intelligence configuration, thus simplifies configuration Step.
In the present embodiment, described bag structural unit includes burst module 121.Described burst module is used for According to adding confidential information size, after confidential information burst being added, it is stored respectively in the SSID of multiple probe requests thereby message In field, and the restructuring sequence number that labelling each probe requests thereby message is corresponding.Due to each probe requests thereby message Ssid field can to write the size of data be 32 bytes, and add confidential information may include tens or Up to a hundred bytes, so that carry out burst process to adding confidential information, in order to it can be asked with multiple detections The form seeking message sends to receiving terminal.The size such as adding confidential information is 100 bytes, then can will add Confidential information burst is stored in the ssid field of 4 probe requests thereby messages, and these 4 detections of labelling respectively The restructuring sequence number (such as 0,1,2,3) that request message is corresponding, in order to receiving terminal can according to restructuring sequence number, The confidential information that adds in the ssid field of each probe requests thereby message is recombinated, obtains complete adding secret letter Breath.
Then probe requests thereby message is sent to receiving terminal by transmitting element, and the reception unit of receiving terminal receives to be visited Survey request message.What Packet analyzing unit extracted ssid field in probe requests thereby message adds confidential information.At this In embodiment, described Packet analyzing unit includes that recombination module 122, described recombination module 122 are used for extracting Go out the confidential information that adds of ssid field in each probe requests thereby message, and corresponding according to each probe requests thereby message Restructuring sequence number, ssid field in each probe requests thereby message is added confidential information and recombinates.Equally with Size be 100 bytes add confidential information as a example by, the burst module of transmitting terminal will add confidential information burst and be stored in 4 In the ssid field of individual probe requests thereby message, and the restructuring that this 4 probe requests thereby messages of labelling are corresponding respectively Sequence number (such as 0,1,2,3), restructuring sequence number also can be stored in ssid field and send to receiving terminal. Packet analyzing unit extract in the ssid field of these 4 probe requests thereby messages add confidential information after, according to often The restructuring numeric order that individual probe requests thereby message is corresponding, in the ssid field to these 4 probe requests thereby messages The confidential information that adds recombinate, and then obtain complete adding confidential information.
Then decryption unit uses decipherment algorithm to be decrypted adding confidential information, obtains configuration information.Described The decipherment algorithm that AES that decipherment algorithm is used by ciphering unit is corresponding.Such as to configuration information The AES used when being encrypted is md5 encryption algorithm, then ciphering unit can use MD5 The decipherment algorithm that AES is corresponding is decrypted adding confidential information, obtains configuration information (i.e. wireless routing The SSID of device and password).
Then connect control unit to be connected with wireless router foundation according to configuration information, control receiving terminal. Preferably, the WIFI chip in receiving terminal can be arranged to monitoring pattern, after receiving configuration information, Connect control unit according to the SSID of the wireless router in configuration information and password, control receiving terminal with should Wireless router corresponding for SSID is set up and is connected, thus completes intelligence configuration process.Receiving terminal is sent out in reception During the probe requests thereby message that sending end sends, channel may be interfered and cause probe requests thereby message dropping, Thus cause that receiving terminal received to add confidential information imperfect, thus in the present embodiment, described transmission Unit is used for repeating to send repeatedly probe requests thereby message to receiving terminal.Preferably, user can be by advance Arrange or control two ways in real time and control number of times and the total duration that probe requests thereby message sends, such as, use It is 10 times that family can pre-set the group number of transmission probe requests thereby message, and the burst module of transmitting terminal will encryption Information burst is stored in the ssid field of 4 probe requests thereby messages, and labelling these 4 detection please respectively (i.e. 4 detections of restructuring sequence number 0,1,2,3 please to seek the restructuring serial number 0,1,2,3 that message is corresponding Seeking message is one group), transmitting element can repeat to send 10 groups of probe requests thereby messages (restructuring serial number 0,1, 2,3 cycle through 10 times, 40 probe requests thereby messages altogether) to receiving terminal;User is permissible for another example The time pre-setting transmission probe requests thereby message is 1min, then in 1min, transmitting element can circulate repeatedly Ground send restructuring serial number 0,1,2,3 to receiving terminal, until time cut-off;Of coursing, user also may be used To control transmitting element stopping in real time, to suspend or continue to send probe requests thereby message.By transmitting element weight Recurrence send repeatedly probe requests thereby message to receiving terminal, it is ensured that receiving terminal can be completely received and comprise institute Have restructuring sequence number adds confidential information, and then carries out recombinating and obtain complete adding confidential information.
It is in the present embodiment, described that " transmitting element is used for repeating to send repeatedly probe requests thereby message and sends To receiving terminal " including: transmitting element is for repeating to send repeatedly probe requests thereby report on all channels of WIFI Literary composition.A total of 13 of such as WIFI channel, the burst module of transmitting terminal will add confidential information burst and be stored in In the ssid field of 4 probe requests thereby messages, and the weight that this 4 probe requests thereby messages of labelling are corresponding respectively Group serial number 0,1,2,3 (i.e. 4 probe requests thereby messages of restructuring sequence number 0,1,2,3 are one group), The group number of the transmission probe requests thereby message of user preset is 10 times, then transmitting element will transmitting terminal with connect Send respectively in 13 channels that receiving end connects 10 groups of probe requests thereby messages (restructuring serial number 0,1,2, 3 cycle through 10 times, 40 probe requests thereby messages altogether) to receiving terminal, receiving terminal only need to select 13 Arbitrary channel in individual WIFI channel carries out monitoring the probe requests thereby message that can receive transmitting terminal transmission, phase Compared with prior art only by the way of some WIFI channel sends probe requests thereby message, eliminate reception End needs to carry out channel switching one by one just can listen to the tedious steps of probe requests thereby message, improves report Literary composition receiving efficiency.
In the present embodiment, described Packet analyzing unit 108 also includes encrypting information checking module 123, institute State in the encryption information checking module 123 ssid field in the probe requests thereby message that verification is received Add confidential information the most complete, send to decryption unit if confidential information then will be added, the most will not add confidential information Send to decryption unit.It is preferably, described that " encryption information checking module verifies the probe requests thereby received In ssid field in message to add confidential information the most complete " specifically include: encryption information checking module is sentenced In ssid field in disconnected current probe requests thereby message add confidential information be whether transmission correct add secret letter Breath, if then by the encryption information cache in the ssid field in current probe requests thereby message in buffer unit In;Otherwise abandon and the ssid field in current probe requests thereby message adds confidential information;Described transmission is correct The confidential information that adds be that the ssid field in the probe requests thereby message not received adds confidential information.
It is stored in the restructuring SSID word that is respectively in the probe requests thereby message of 1,2,3 of sequence number adding confidential information As a example by Duan, cause the probe requests thereby message dropping of restructuring serial number 2 owing to channel is interfered.Work as reception When termination receives the probe requests thereby message of restructuring serial number 1, encryption information checking module judges current detection In ssid field in request message add confidential information be whether transmission correct add confidential information, if receiving Before the probe requests thereby message of this restructuring serial number 1, do not receive restructuring sequence number and be similarly the detection of 1 Request message, then can will add secret letter in the ssid field in the probe requests thereby message of this restructuring serial number 1 Breath caches to buffer unit.In like manner, also can be by the SSID in the probe requests thereby message of restructuring serial number 3 Encryption information cache in field is in buffer unit.Owing to the probe requests thereby message of restructuring serial number 2 is lost Lose, thus can only wait when transmitting terminal sends again receive, transmitting element again send restructuring serial number 1, 2, when the probe requests thereby message of 3 is to receiving terminal, owing to buffer unit receiving restructuring sequence number the most in advance It is the probe requests thereby message of 1 and 3, thus can be to the SSID in the probe requests thereby message of the two restructuring sequence number The confidential information that adds in field is abandoned.And for the probe requests thereby message of restructuring serial number 2, by Do not received in advance, illustrate recombinate serial number 2 probe requests thereby message ssid field in encryption Information is that transmission is correct adds confidential information, thus this can be added confidential information and cache.When in buffer unit Be cached with in the ssid field in the probe requests thereby message of all restructuring sequence numbers add confidential information after, mould of recombinating Block is for the restructuring sequence number corresponding according to each probe requests thereby message, to SSID in each probe requests thereby message The confidential information that adds of field is recombinated.
In the present embodiment, the SSID of each probe requests thereby message is additionally provided with burst and terminates identification information, Described burst terminates identification information and adds whether confidential information attaches most importance to for identify the SSID of probe requests thereby message What group sequence number was last adds confidential information.When buffer unit is cached with restructuring sequence number last add confidential information, with And when the adding confidential information of all restructuring sequence numbers added before confidential information that restructuring sequence number is last, then caching is described Unit contains the ssid field in the probe requests thereby message of whole recombination signal added confidential information.
In the present embodiment, described transmitting terminal and receiving terminal are also respectively provided with CRC check unit 111; Described CRC check unit 111 is for carrying out CRC check to adding confidential information, it is ensured that add the complete of confidential information Whole property.Cyclic redundancy check (CRC) (Cyclic Redundancy Check, CRC) be a kind of according to network packet or The data such as computer document produce a kind of hash function of brief fixing figure place check code, be mainly used to detection or The mistake being likely to occur after verification data transmission or preservation, it is that the principle utilizing division and remainder is made Error detection.Pass through CRC check, it is ensured that add the integrity of confidential information.
And inventor provide a kind of WIFI intelligent configuration method.Refer to Fig. 2, real for the present invention one The flow chart of the WIFI intelligent configuration method that the mode of executing relates to.Transmitting terminal is the transmitting terminal of intelligence configuration information, Can be mobile phone, flat board etc.;Receiving terminal end is the receiving terminal of intelligence configuration information, i.e. needs and without circuit Set up the equipment connected by device, can be internet of things equipment etc..Described method is applied to the configuration of WIFI intelligence, Described device includes that transmitting terminal and receiving terminal, described transmitting terminal include that configuration information arranges unit, encryption list Unit, bag structural unit and transmitting element;Described receiving terminal includes receiving unit, Packet analyzing unit, deciphering Unit and connection control unit;Said method comprising the steps of:
Initially enter step S201 configuration information to arrange unit and arrange configuration information.Described configuration information includes The SSID of wireless router and password.In application process, receiving terminal is in monitoring pattern, when receiving After the SSID of wireless router that transmitting terminal sends and password, can according to the SSID of wireless router and Password, sets up with corresponding wireless router and connects, thus completes the transmitting terminal intelligence configuration to receiving terminal Process.
Then enter step S202 ciphering unit configuration information is encrypted, obtain adding confidential information.To nothing SSID and the password of line router are encrypted, and are conducive to improving the safety in configuration information transmitting procedure. AES includes des encryption algorithm, AES encryption algorithm, md5 encryption algorithm etc..
Then enter step S203 bag structural unit and will add confidential information and be stored in the SSID of probe requests thereby message In field.WIFI message is divided into management frame, Frame and control frame three kinds.Probe requests thereby message (Probe Request frame) it is the one in management frame, the speed of its transmission is 1Mbps, can compatible use The demand of the equipment of the standard agreements such as 802.11b only, 802.11b/g and 802.11b/g/n.Pass through multiplexing The ssid field storage of probe requests thereby message adds confidential information, and configuration information is using probe requests thereby message as carrier Receiving end is received so that transmitting terminal is connected without setting up with wireless router when carrying out intelligence configuration, Thus simplify configuration step.
In the present embodiment, described bag structural unit includes that burst module, described Packet analyzing unit include Recombination module;Described method includes: collapsible mould tuber is according to adding confidential information size, after adding confidential information burst It is stored respectively in the ssid field of multiple probe requests thereby message, and labelling each probe requests thereby message is corresponding Restructuring sequence number.It is 32 owing to the ssid field of each probe requests thereby message can write the size of data Byte, and add confidential information and may include tens or up to a hundred bytes, so that carry out adding confidential information Burst processes, in order to it can send to receiving terminal with the form of multiple probe requests thereby messages.Such as encrypt The size of information is 100 bytes, then can be stored in 4 probe requests thereby messages by adding confidential information burst In ssid field, and restructuring sequence number that respectively these 4 probe requests thereby messages of labelling are corresponding (such as 0,1,2, 3), in order to receiving terminal can be according to restructuring sequence number, in the ssid field to each probe requests thereby message Add confidential information to recombinate, obtain complete adding confidential information.
Then enter step S204 transmitting element to send probe requests thereby message to receiving terminal.Then enter step Rapid S205 receives unit and receives probe requests thereby message, then enters step S206 Packet analyzing unit and extracts In probe requests thereby message, ssid field adds confidential information.In the present embodiment, described Packet analyzing unit bag Including recombination module 122, described recombination module 122 is used for extracting SSID word in each probe requests thereby message Section add confidential information, and according to restructuring sequence number corresponding to each probe requests thereby message, to each probe requests thereby In message, the confidential information that adds of ssid field is recombinated.With the confidential information that adds that size is 100 bytes it is equally Example, then can be stored in adding confidential information burst in the ssid field of 4 probe requests thereby messages, and respectively The restructuring sequence number (such as 0,1,2,3) that these 4 probe requests thereby messages of labelling are corresponding, restructuring sequence number also can It is stored in ssid field and sends to receiving terminal.Packet analyzing unit extracts these 4 probe requests thereby messages In ssid field add confidential information after, according to the restructuring numeric order that each probe requests thereby message is corresponding, right The confidential information that adds in the ssid field of these 4 probe requests thereby messages is recombinated, and then obtains complete adding Confidential information.
Then entering step S207 decryption unit uses decipherment algorithm to be decrypted adding confidential information, is joined Confidence ceases.The decipherment algorithm that AES that described decipherment algorithm is used by ciphering unit is corresponding.Such as The AES used when being encrypted configuration information is md5 encryption algorithm, then ciphering unit can To use the decipherment algorithm that md5 encryption algorithm is corresponding to be decrypted adding confidential information, obtain configuration information (i.e. The SSID of wireless router and password).
Then enter step S208 and connect control unit according to configuration information, control receiving terminal and wireless routing Device is set up and is connected.Preferably, the WIFI chip in receiving terminal can be arranged to monitoring pattern, work as reception After configuration information, connect control unit according to the SSID of the wireless router in configuration information and password, Control the receiving terminal wireless router corresponding with this SSID and set up connection, thus complete intelligence configuration process.
Receiving terminal is when the probe requests thereby message that receiving end/sending end sends, and channel may be interfered and cause Probe requests thereby message dropping, thus cause that receiving terminal received to add confidential information imperfect, thus in this reality Executing in mode, described " probe requests thereby message is sent to receiving terminal by transmitting element " including: transmitting element Repeat to send repeatedly probe requests thereby message to receiving terminal.Preferably, user can be by pre-setting or real Time control two ways control probe requests thereby message send number of times and total duration, such as user can be pre- The group number first arranging transmission probe requests thereby message is 10 times, and the burst module of transmitting terminal will add confidential information burst It is stored in the ssid field of 4 probe requests thereby messages, and these 4 probe requests thereby messages pair of labelling respectively (i.e. 4 probe requests thereby messages of restructuring sequence number 0,1,2,3 are the restructuring serial number 0,1,2,3 answered One group), transmitting element can repeat to send 10 groups of probe requests thereby messages (restructuring serial number 0,1,2,3 Cycle through 10 times, 40 probe requests thereby messages altogether) to receiving terminal;User can be in advance for another example Arranging and sending time of probe requests thereby message is 1min, then in 1min, transmitting element can circulate and sends out repeatedly Send restructuring serial number 0,1,2,3 to receiving terminal, until time cut-off;Of coursing, user can also be real Time control transmitting element stop, suspending or continues transmission probe requests thereby message.Repeat to send out by transmitting element Send repeatedly probe requests thereby message to receiving terminal, it is ensured that receiving terminal can be completely received comprise all heavy Group sequence number add confidential information, and then carry out recombinating and obtain complete adding confidential information.
It is in the present embodiment, described that " transmitting element repeats to send repeatedly probe requests thereby message and sends to connecing Receiving end " including: transmitting element repeats to send repeatedly probe requests thereby message on all channels of WIFI.
A total of 13 of such as WIFI channel, the burst module of transmitting terminal will add confidential information burst and be stored in In the ssid field of 4 probe requests thereby messages, and the weight that this 4 probe requests thereby messages of labelling are corresponding respectively Group serial number 0,1,2,3 (i.e. 4 probe requests thereby messages of restructuring sequence number 0,1,2,3 are one group), The group number of the transmission probe requests thereby message of user preset is 10 times, then transmitting element will transmitting terminal with connect Send respectively in 13 channels that receiving end connects 10 groups of probe requests thereby messages (restructuring serial number 0,1,2, 3 cycle through 10 times, 40 probe requests thereby messages altogether) to receiving terminal, receiving terminal only need to select 13 Arbitrary channel in individual WIFI channel carries out monitoring the probe requests thereby message that can receive transmitting terminal transmission, phase Compared with prior art only by the way of some WIFI channel sends probe requests thereby message, eliminate reception End needs to carry out channel switching one by one just can listen to the tedious steps of probe requests thereby message, improves report Literary composition receiving efficiency.
In the present embodiment, described Packet analyzing unit also includes encrypting information checking module, described method Including: the encryption in ssid field in the probe requests thereby message that encryption information checking module verification is received Information is the most complete, sends to decryption unit if then will add confidential information, the most will not add confidential information and send To decryption unit.As it is shown on figure 3, described, " encryption information checking module verifies the probe requests thereby received In ssid field in message to add confidential information the most complete " specifically include: initially enter step S301 Encryption information checking module judges whether add confidential information in the ssid field in current probe requests thereby message Confidential information is added, if then entering step S303 by the SSID in current probe requests thereby message for transmission is correct Encryption information cache in field is in buffer unit;Otherwise enter step S302 and abandon current probe requests thereby Ssid field in message adds confidential information;What described transmission was correct adds confidential information is do not received Ssid field in probe requests thereby message adds confidential information.
It is stored in the restructuring SSID word that is respectively in the probe requests thereby message of 1,2,3 of sequence number adding confidential information As a example by Duan, cause the probe requests thereby message dropping of restructuring serial number 2 owing to channel is interfered.Work as reception When termination receives the probe requests thereby message of restructuring serial number 1, encryption information checking module judges current detection In ssid field in request message add confidential information be whether transmission correct add confidential information, if receiving Before the probe requests thereby message of this restructuring serial number 1, do not receive restructuring sequence number and be similarly the detection of 1 Request message, then can will add secret letter in the ssid field in the probe requests thereby message of this restructuring serial number 1 Breath caches to buffer unit.In like manner, also can be by the SSID in the probe requests thereby message of restructuring serial number 3 Encryption information cache in field is in buffer unit.Owing to the probe requests thereby message of restructuring serial number 2 is lost Lose, thus can only wait when transmitting terminal sends again receive, transmitting element again send restructuring serial number 1, 2, when the probe requests thereby message of 3 is to receiving terminal, owing to buffer unit receiving restructuring sequence number the most in advance It is the probe requests thereby message of 1 and 3, thus can be to the SSID in the probe requests thereby message of the two restructuring sequence number The confidential information that adds in field is abandoned.And for the probe requests thereby message of restructuring serial number 2, by Do not received in advance, illustrate recombinate serial number 2 probe requests thereby message ssid field in encryption Information is that transmission is correct adds confidential information, thus this can be added confidential information and cache.
Then enter step S304 recombination module in buffer unit, be cached with the detection of all restructuring sequence numbers please Ask in the ssid field in message add confidential information after, according to the restructuring sequence that each probe requests thereby message is corresponding Number, ssid field in each probe requests thereby message is added confidential information and recombinates.In the present embodiment, The SSID of each probe requests thereby message is additionally provided with burst and terminates identification information, and described burst terminates mark letter Breath for identify the SSID of probe requests thereby message add confidential information be whether restructuring sequence number last add secret letter Breath.When buffer unit is cached with restructuring sequence number last add confidential information, and restructuring last the adding of sequence number When adding confidential information of all restructuring sequence numbers before confidential information, then explanation buffer unit contains all Ssid field in the probe requests thereby message of recombination signal adds confidential information.
In the present embodiment, described transmitting terminal and receiving terminal are also respectively provided with CRC check unit 111; Described CRC check unit 111 is for carrying out CRC check to adding confidential information, it is ensured that add the complete of confidential information Whole property.Cyclic redundancy check (CRC) (Cyclic Redundancy Check, CRC) be a kind of according to network packet or The data such as computer document produce a kind of hash function of brief fixing figure place check code, be mainly used to detection or The mistake being likely to occur after verification data transmission or preservation, it is that the principle utilizing division and remainder is made Error detection.Pass through CRC check, it is ensured that add the integrity of confidential information.
WIFI intelligent configuration method described in technique scheme and device, described method is applied to WIFI Intelligence configuration, described device includes that transmitting terminal and receiving terminal, described transmitting terminal include that configuration information arranges list Unit, ciphering unit, bag structural unit and transmitting element;Described receiving terminal includes receiving unit, Packet analyzing Unit, decryption unit and connection control unit;Said method comprising the steps of: first configuration information sets Putting unit and arrange configuration information, described configuration information includes SSID and the password of wireless router;Then add Configuration information is encrypted by close unit, obtains adding confidential information;Then bag structural unit will add confidential information and deposit It is stored in the ssid field of probe requests thereby message;Then probe requests thereby message is sent to receiving by transmitting element End;Then receive unit and receive probe requests thereby message;Then Packet analyzing unit extracts probe requests thereby message Middle ssid field add confidential information;Then decryption unit uses decipherment algorithm to be decrypted adding confidential information, Obtain configuration information, the decipherment algorithm that AES that described decipherment algorithm is used by ciphering unit is corresponding; Then connect control unit to be connected with wireless router foundation according to configuration information, control receiving terminal.
The probe requests thereby message in management frame is used to be transmitted owing to adding confidential information, probe requests thereby message Transfer rate is 1Mbps, compatible can use 802.11b only, 802.11b/g and 802.11b/g/n etc. The demand of the equipment of standard agreement.Meanwhile, the ssid field in multiplexed probe request message is to adding secret letter Breath is transmitted so that WIFI configuration information transmitting terminal is when carrying out intelligence configuration, it is not necessary to set up with AP Connect, can directly configuration information be sent to receiving terminal, simplify configuration step, improve configuration effect Rate, save hardware cost.
It should be noted that in this article, the relational terms of such as first and second or the like is used merely to One entity or operation are separated with another entity or operating space, and not necessarily requires or imply Relation or the order of any this reality is there is between these entities or operation.And, term " includes ", " comprise " or its any other variant is intended to comprising of nonexcludability, so that include that one is The process of row key element, method, article or terminal unit not only include those key elements, but also include not There are other key elements being expressly recited, or also include setting for this process, method, article or terminal Standby intrinsic key element.In the case of there is no more restriction, by statement " including ... " or " comprising ... " The key element limited, it is not excluded that in including the process of described key element, method, article or terminal unit There is also other key element.Additionally, in this article, the reason such as " being more than ", " being less than ", " exceeding " Solve as not include this number;More than " ", " below ", " within " etc. be interpreted as including this number.
Those skilled in the art are it should be appreciated that the various embodiments described above can be provided as method, device or meter Calculation machine program product.These embodiments can use complete hardware embodiment, complete software implementation or knot The form of the embodiment in terms of conjunction software and hardware.Whole or portion in the method that the various embodiments described above relate to Can instruct relevant hardware by program step by step to complete, described program can be stored in calculating In the storage medium that machine equipment can read, all or part of for perform described in the various embodiments described above method Step.Described computer equipment, includes but not limited to: personal computer, server, general purpose computer, Special-purpose computer, the network equipment, embedded device, programmable device, intelligent mobile terminal, intelligence man Occupy equipment, wearable intelligent equipment, vehicle intelligent equipment etc.;Described storage medium, including but do not limit In: RAM, ROM, magnetic disc, tape, CD, flash memory, USB flash disk, portable hard drive, storage card, note Recall rod, webserver storage, network cloud storage etc..
The various embodiments described above are with reference to according to the method described in embodiment, equipment (system) and computer program The flow chart of product and/or block diagram describe.It should be understood that flow process can be realized by computer program instructions Stream in each flow process in figure and/or block diagram and/or square frame and flow chart and/or block diagram Journey and/or the combination of square frame.Can provide these computer program instructions to computer equipment processor with Produce a machine so that the instruction performed by the processor of computer equipment is produced for realizing at stream The function specified in one flow process of journey figure or multiple flow process and/or one square frame of block diagram or multiple square frame Device.
These computer program instructions may be alternatively stored in the meter that computer equipment can be guided to work in a specific way Calculate in machine equipment readable memory so that the instruction being stored in this computer equipment readable memory produces Including the manufacture of command device, this command device realize one flow process of flow chart or multiple flow process and/ Or the function specified in one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded on computer equipment so that holds on a computing device Row sequence of operations step is to produce computer implemented process, thus the finger performed on a computing device Order provides for realizing at one flow process of flow chart or multiple flow process and/or one square frame or multiple of block diagram The step of the function specified in square frame.
Although being described the various embodiments described above, but those skilled in the art once learn Basic creative concept, then can make other change and amendment to these embodiments, so above institute Stating only embodiments of the invention, not thereby limit the scope of patent protection of the present invention, every utilization is originally Equivalent structure or equivalence flow process that description of the invention and accompanying drawing content are made convert, or directly or indirectly use In the technical field that other are relevant, within being the most in like manner included in the scope of patent protection of the present invention.

Claims (14)

1. a WIFI Intelligent configuration device, it is characterised in that described device includes transmitting terminal and reception End, described transmitting terminal includes that configuration information arranges unit, ciphering unit, bag structural unit and transmitting element; Described receiving terminal includes receiving unit, Packet analyzing unit, decryption unit and connection control unit;
Described configuration information arranges unit for arranging configuration information, and described configuration information includes wireless routing The SSID of device and password;
Described ciphering unit, for being encrypted configuration information, obtains adding confidential information;
Described bag structural unit is for being stored in adding confidential information in the ssid field of probe requests thereby message;
Described transmitting element is for sending probe requests thereby message to receiving terminal;
Described reception unit is used for receiving probe requests thereby message;
Described Packet analyzing unit adds confidential information for extract ssid field in probe requests thereby message;
Described decryption unit is used for using decipherment algorithm to be decrypted adding confidential information, obtains configuration information, The decipherment algorithm that AES that described decipherment algorithm is used by ciphering unit is corresponding;
Described connection control unit, for according to configuration information, controls receiving terminal and sets up even with wireless router Connect.
2. WIFI Intelligent configuration device as claimed in claim 1, it is characterised in that described bag constructs Unit includes that burst module, described Packet analyzing unit include recombination module;
Described burst module is for according to adding confidential information size, being stored respectively in many after adding confidential information burst In the ssid field of individual probe requests thereby message, and the restructuring sequence number that labelling each probe requests thereby message is corresponding;
Described recombination module for extracting the confidential information that adds of ssid field in each probe requests thereby message, and According to the restructuring sequence number that each probe requests thereby message is corresponding, to ssid field in each probe requests thereby message Add confidential information to recombinate.
3. WIFI Intelligent configuration device as claimed in claim 2, it is characterised in that described transmission list Unit is used for repeating to send repeatedly probe requests thereby message to receiving terminal.
4. WIFI Intelligent configuration device as claimed in claim 3, it is characterised in that described " transmission Unit is used for repeating to send repeatedly probe requests thereby message to receiving terminal " including: transmitting element is at WIFI Repeat to send repeatedly probe requests thereby message on all channels.
5. WIFI Intelligent configuration device as claimed in claim 3, it is characterised in that described Packet analyzing Unit also includes encrypting information checking module, the spy that described encryption information checking module is received for verification Survey in the ssid field in request message to add confidential information the most complete, if then will add confidential information transmission extremely Decryption unit, the most will not add confidential information and send to decryption unit.
6. WIFI Intelligent configuration device as claimed in claim 5, it is characterised in that described " encryption What information checking module was used in the ssid field in the probe requests thereby message that verification is received adds confidential information The most complete " specifically include: encryption information checking module is for the SSID judging in current probe requests thereby message In field add confidential information be whether transmission correct add confidential information, if then by current probe requests thereby message In ssid field in encryption information cache in buffer unit;Otherwise abandon current probe requests thereby message In ssid field in add confidential information;What described transmission was correct adds confidential information is the detection not received Ssid field in request message adds confidential information;
Described recombination module is in the probe requests thereby message being cached with all restructuring sequence numbers in buffer unit Ssid field in add confidential information after, according to the restructuring sequence number that each probe requests thereby message is corresponding, to respectively In individual probe requests thereby message, the confidential information that adds of ssid field is recombinated.
7. WIFI Intelligent configuration device as claimed in claim 1, it is characterised in that described transmitting terminal It is also respectively provided with CRC check unit with receiving terminal;Described CRC check unit is for adding confidential information Carry out CRC check, it is ensured that add the integrity of confidential information.
8. a WIFI intelligent configuration method, it is characterised in that described method is applied to WIFI intelligence and joins Putting, described device includes that transmitting terminal and receiving terminal, described transmitting terminal include that configuration information arranges unit, adds Close unit, bag structural unit and transmitting element;Described receiving terminal include receive unit, Packet analyzing unit, Decryption unit and connection control unit;Said method comprising the steps of:
Configuration information arranges unit and arranges configuration information, and described configuration information includes the SSID of wireless router And password;
Configuration information is encrypted by ciphering unit, obtains adding confidential information;
Bag structural unit is stored in adding confidential information in the ssid field of probe requests thereby message;
Probe requests thereby message is sent to receiving terminal by transmitting element;
Receive unit and receive probe requests thereby message;
What Packet analyzing unit extracted ssid field in probe requests thereby message adds confidential information;
Decryption unit uses decipherment algorithm to be decrypted adding confidential information, obtains configuration information, described deciphering The decipherment algorithm that AES that algorithm is used by ciphering unit is corresponding;
Connect control unit to be connected with wireless router foundation according to configuration information, control receiving terminal.
9. WIFI intelligent configuration method as claimed in claim 8, it is characterised in that described bag constructs Unit includes that burst module, described Packet analyzing unit include recombination module;Described method includes:
Collapsible mould tuber is according to adding confidential information size, and being stored respectively in multiple detection after adding confidential information burst please Ask in the ssid field of message, and the restructuring sequence number that labelling each probe requests thereby message is corresponding;
What recombination module extracted ssid field in each probe requests thereby message adds confidential information, and according to each The restructuring sequence number that probe requests thereby message is corresponding, adds confidential information to ssid field in each probe requests thereby message Recombinate.
10. WIFI intelligent configuration method as claimed in claim 9, it is characterised in that described " transmission Probe requests thereby message is sent to receiving terminal by unit " including:
Transmitting element repeats to send repeatedly probe requests thereby message to receiving terminal.
11. WIFI intelligent configuration methods as claimed in claim 10, it is characterised in that described " Send unit to repeat to send repeatedly probe requests thereby message to send to receiving terminal " including:
Transmitting element repeats to send repeatedly probe requests thereby message on all channels of WIFI.
12. WIFI intelligent configuration methods as claimed in claim 10, it is characterised in that described bag solution Analysis unit also includes encrypting information checking module, and described method includes:
The encryption in ssid field in the probe requests thereby message that encryption information checking module verification is received Information is the most complete, sends to decryption unit if then will add confidential information, the most will not add confidential information and send To decryption unit.
13. WIFI intelligent configuration methods as claimed in claim 12, it is characterised in that described " add The confidential information that adds in ssid field in the probe requests thereby message that the verification of confidential information correction verification module is received is No complete " specifically include: encryption information checking module judges the ssid field in current probe requests thereby message In add confidential information be whether transmission correct add confidential information, if then by current probe requests thereby message Encryption information cache in ssid field is in buffer unit;Otherwise abandon in current probe requests thereby message Ssid field adds confidential information;What described transmission was correct adds confidential information is the probe requests thereby not received Ssid field in message adds confidential information;
Recombination module is cached with the SSID in the probe requests thereby message of all restructuring sequence numbers in buffer unit In field add confidential information after, according to the restructuring sequence number that each probe requests thereby message is corresponding, each is detected In request message, the confidential information that adds of ssid field is recombinated.
14. WIFI intelligent configuration methods as claimed in claim 8, it is characterised in that described transmitting terminal It is also respectively provided with CRC check unit with receiving terminal;Described method includes:
CRC check unit carries out CRC check to adding confidential information, it is ensured that add the integrity of confidential information.
CN201610325564.1A 2016-05-16 2016-05-16 WIFI intelligent configuration method and device Pending CN105848145A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610325564.1A CN105848145A (en) 2016-05-16 2016-05-16 WIFI intelligent configuration method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610325564.1A CN105848145A (en) 2016-05-16 2016-05-16 WIFI intelligent configuration method and device

Publications (1)

Publication Number Publication Date
CN105848145A true CN105848145A (en) 2016-08-10

Family

ID=56593394

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610325564.1A Pending CN105848145A (en) 2016-05-16 2016-05-16 WIFI intelligent configuration method and device

Country Status (1)

Country Link
CN (1) CN105848145A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106507394A (en) * 2016-11-15 2017-03-15 杭州华三通信技术有限公司 Data transmission method for uplink, data receiver method and electronic equipment, access point
CN106792670A (en) * 2016-12-28 2017-05-31 深圳市北海轨道交通技术有限公司 Unconnected wireless communications method and device
CN109041033A (en) * 2018-09-14 2018-12-18 杭州若奇技术有限公司 Smart machine distribution method and system based on RFID
CN109756505A (en) * 2019-01-16 2019-05-14 北京左江科技股份有限公司 The transparent TCP/IP network transmission message recombining method of a kind of pair of terminal device
CN112261707A (en) * 2020-10-20 2021-01-22 四川天邑康和通信股份有限公司 Method for realizing automatic network distribution between intelligent equipment and WIFI6 router
CN113473573A (en) * 2021-06-08 2021-10-01 北京小米移动软件有限公司 Information processing method and device, wireless access equipment and intelligent household equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103607751A (en) * 2013-11-18 2014-02-26 深圳市通力科技开发有限公司 Wireless device configuration method and system
CN103841658A (en) * 2014-02-24 2014-06-04 北京新岸线移动多媒体技术有限公司 Method and device for transmitting and receiving information
CN104703176A (en) * 2015-03-18 2015-06-10 北京联盛德微电子有限责任公司 Configuration method of wireless network, intelligent terminal and wireless network equipment
CN104837132A (en) * 2015-04-17 2015-08-12 北京奇艺世纪科技有限公司 Wi-Fi (Wireless-Fidelity) network sharing method and device
CN105050083A (en) * 2015-05-25 2015-11-11 深圳创维数字技术有限公司 Network configuration method and system for intelligent equipment
CN105049416A (en) * 2015-06-15 2015-11-11 小米科技有限责任公司 Method and apparatus for accessing to wifi network

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103607751A (en) * 2013-11-18 2014-02-26 深圳市通力科技开发有限公司 Wireless device configuration method and system
CN103841658A (en) * 2014-02-24 2014-06-04 北京新岸线移动多媒体技术有限公司 Method and device for transmitting and receiving information
CN104703176A (en) * 2015-03-18 2015-06-10 北京联盛德微电子有限责任公司 Configuration method of wireless network, intelligent terminal and wireless network equipment
CN104837132A (en) * 2015-04-17 2015-08-12 北京奇艺世纪科技有限公司 Wi-Fi (Wireless-Fidelity) network sharing method and device
CN105050083A (en) * 2015-05-25 2015-11-11 深圳创维数字技术有限公司 Network configuration method and system for intelligent equipment
CN105049416A (en) * 2015-06-15 2015-11-11 小米科技有限责任公司 Method and apparatus for accessing to wifi network

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106507394A (en) * 2016-11-15 2017-03-15 杭州华三通信技术有限公司 Data transmission method for uplink, data receiver method and electronic equipment, access point
CN106507394B (en) * 2016-11-15 2021-04-09 新华三技术有限公司 Data sending method, data receiving method, electronic equipment and access point
CN106792670A (en) * 2016-12-28 2017-05-31 深圳市北海轨道交通技术有限公司 Unconnected wireless communications method and device
CN106792670B (en) * 2016-12-28 2020-04-14 深圳市北海轨道交通技术有限公司 Disconnected wireless communication method and device
CN109041033A (en) * 2018-09-14 2018-12-18 杭州若奇技术有限公司 Smart machine distribution method and system based on RFID
CN109756505A (en) * 2019-01-16 2019-05-14 北京左江科技股份有限公司 The transparent TCP/IP network transmission message recombining method of a kind of pair of terminal device
CN112261707A (en) * 2020-10-20 2021-01-22 四川天邑康和通信股份有限公司 Method for realizing automatic network distribution between intelligent equipment and WIFI6 router
CN113473573A (en) * 2021-06-08 2021-10-01 北京小米移动软件有限公司 Information processing method and device, wireless access equipment and intelligent household equipment
CN113473573B (en) * 2021-06-08 2024-03-12 北京小米移动软件有限公司 Information processing method and device, wireless access equipment and intelligent household equipment

Similar Documents

Publication Publication Date Title
CN105848145A (en) WIFI intelligent configuration method and device
CN101873587B (en) Wireless communication device and method for realizing service security thereof
CN107786331B (en) Data processing method, device, system and computer readable storage medium
CN103546289B (en) USB (universal serial bus) Key based secure data transmission method and system
US10341305B2 (en) Encrypted communications method and communications terminal, and computer storage medium
EP3337088B1 (en) Data encryption method, decryption method, apparatus, and system
CN104602364A (en) Method for connecting wireless device to wireless access point and wireless device, intelligent terminal
US11310727B2 (en) Methods, devices and media for obtaining and for providing access information of wireless access points
CN103345453B (en) Based on supporting the method that the fixed disk data enciphering card of SATA interface is encrypted
CN104244245A (en) Wireless access authentication method, wireless router device and wireless terminal
WO2015003503A1 (en) Network device, terminal device and information security improving method
WO2015117351A1 (en) Wifi connection method, device and system, and computer storage medium
CN102970676B (en) A kind of method handled initial data, Internet of things system and terminal
CN105376059A (en) Method and system for performing application signature based on electronic key
CN102057615A (en) A system and method of reducing encryption overhead by concatenating multiple connection packets associated with a security association
CN104935435A (en) Login methods, terminal and application server
CN109831775B (en) Processor, baseband chip and SIM card information transmission method
CN105208028A (en) Data transmission method and related device and equipment
CN106599698A (en) Method and device for picture encryption, and method and device for picture decryption
CN103701586A (en) Method and device for acquiring secret key
CN105471876A (en) Encryption communication method and device
CN103458401B (en) A kind of voice encryption communication system and communication means
CN113038463B (en) Communication encryption authentication experimental device
CN103873245B (en) Dummy machine system data ciphering method and equipment
KR101329789B1 (en) Encryption Method of Database of Mobile Communication Device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160810