CN113747430B - Network access method, terminal equipment and AP - Google Patents

Network access method, terminal equipment and AP Download PDF

Info

Publication number
CN113747430B
CN113747430B CN202111015973.9A CN202111015973A CN113747430B CN 113747430 B CN113747430 B CN 113747430B CN 202111015973 A CN202111015973 A CN 202111015973A CN 113747430 B CN113747430 B CN 113747430B
Authority
CN
China
Prior art keywords
encryption algorithm
key information
beacon frame
carries
terminal equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111015973.9A
Other languages
Chinese (zh)
Other versions
CN113747430A (en
Inventor
黄翔
单丽娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Technologies Co Ltd Chengdu Branch
Original Assignee
New H3C Technologies Co Ltd Chengdu Branch
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Technologies Co Ltd Chengdu Branch filed Critical New H3C Technologies Co Ltd Chengdu Branch
Priority to CN202111015973.9A priority Critical patent/CN113747430B/en
Publication of CN113747430A publication Critical patent/CN113747430A/en
Application granted granted Critical
Publication of CN113747430B publication Critical patent/CN113747430B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Abstract

The specification provides a method for accessing a network, a terminal device and an AP, wherein the method comprises the following steps: and receiving a Beacon frame sent by the AP, judging whether the Beacon frame carries a preset identifier and an encryption algorithm capability set, if so, sending a detection message to the AP sending the Beacon frame, wherein the detection message carries a first encryption algorithm selected from the encryption algorithm capability set, receiving a response message sent by the AP, and the response message carries first key information determined by the AP according to the first encryption algorithm in the detection message, and accessing the AP according to the first key information and an SSID corresponding to the Beacon frame. The method can realize the automatic access of the terminal equipment to the AP.

Description

Network access method, terminal equipment and AP
Technical Field
The present disclosure relates to the field of wireless communications, and in particular, to a method for accessing a network, a terminal device, and an AP.
Background
When the terminal equipment is accessed to the wireless network, a user is required to manually configure an accessed password, such as a PSK password, and for certain scenes, such as a printer, a camera, an Internet of things device and the like, the one-to-one configuration of the PSK password is not as convenient as the configuration of a mobile phone or a PC, so that the complexity of accessing the terminal equipment to the wireless network is increased.
Disclosure of Invention
The embodiment of the disclosure provides a network access method, terminal equipment and an AP.
The embodiment of the disclosure provides a method for accessing a network, which is applied to terminal equipment to be added into the network, and comprises the following steps:
receiving a Beacon frame sent by an AP, and judging whether the Beacon frame carries a preset identifier and an encryption algorithm capability set or not;
if the preset identifier is carried, sending a detection message to an AP (access point) sending the Beacon frame, wherein the detection message carries a first encryption algorithm selected from an encryption algorithm capability set;
receiving a response message sent by the AP, wherein the response message carries first key information determined by the AP according to a first encryption algorithm in a detection message;
and accessing the AP according to the first key information and the SSID corresponding to the Beacon frame.
Optionally, the encryption algorithm capability set includes: AES symmetric encryption algorithm, DES symmetric encryption algorithm, or 3DES symmetric encryption algorithm.
Specifically, the detection message sent to the AP sending the Beacon frame also carries a security identifier;
the first key information is determined by the AP according to a first encryption algorithm and a security identifier carried in the detection message.
Specifically, the first key information is determined by the AP according to a first encryption algorithm and a security identifier carried in a probe packet, and specifically includes:
and the AP carries out security authentication on the security identifier, and after the authentication is passed, the AP determines first key information according to a first encryption algorithm.
Specifically, the first key information is encrypted key information;
the accessing the AP according to the first key information and the SSID corresponding to the Beacon frame includes:
decrypting the first key information, and accessing the AP by using the decrypted first key information and the SSID corresponding to the Beacon frame.
The embodiment of the disclosure also provides a method for accessing the network, which is applied to the AP and comprises the following steps:
transmitting a Beacon frame, wherein the Beacon frame carries a preset identifier and an encryption algorithm capability set for indicating the access of terminal equipment;
receiving a detection message sent by a terminal device, wherein the detection message carries a first encryption algorithm selected from an encryption algorithm capability set of a Beacon frame by the terminal device;
and determining first key information according to the first encryption algorithm, carrying the first key information in a response message, and sending the response message to the terminal equipment so that the terminal equipment accesses the AP according to the first key information.
Optionally, the encryption algorithm capability set includes: AES symmetric encryption algorithm, DES symmetric encryption algorithm, or 3DES symmetric encryption algorithm.
Specifically, when the detection message also carries a security identifier, the AP performs security authentication on the security identifier, and determines first key information according to a first encryption algorithm after the authentication is passed.
Specifically, the step of sending the first key information carried in the response message to the terminal device includes:
the AP encrypts the first key information, and sends the encrypted first key information carried in a response message to the terminal equipment.
By the method, the terminal equipment can negotiate an encryption algorithm with the AP, acquire a key corresponding to the negotiated encryption algorithm from the AP, and access the network according to the key. Therefore, the terminal equipment can be automatically accessed to the network, and the need of manual network configuration of the terminal equipment by a user is avoided.
The embodiment of the disclosure also provides a terminal device, which comprises:
the receiving module is used for receiving the Beacon frame sent by the AP and judging whether the Beacon frame carries a preset identifier and an encryption algorithm capability set or not;
the transmitting module is used for transmitting a detection message to an AP (access point) for transmitting the Beacon frame after determining that the Beacon frame carries a preset identifier, wherein the detection message carries a first encryption algorithm selected from an encryption algorithm capability set;
the receiving module is further configured to receive a response message sent by the AP, where the response message carries first key information determined by the AP according to a first encryption algorithm in the probe message;
and the processing module is used for accessing the AP according to the first key information and the SSID corresponding to the Beacon frame.
The embodiment of the disclosure also provides an AP, which includes:
the transmitting module is used for transmitting a Beacon frame, wherein the Beacon frame carries a preset identifier and an encryption algorithm capability set for indicating the access of the terminal equipment;
the receiving module is used for receiving a detection message sent by the terminal equipment, wherein the detection message carries a first encryption algorithm selected from the encryption algorithm capability set of the Beacon frame by the terminal equipment;
and the processing module is used for determining first key information according to the first encryption algorithm, carrying the first key information in a response message and sending the response message to the terminal equipment so that the terminal equipment accesses the AP according to the first key information.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the specification and together with the description, serve to explain the principles of the specification.
Fig. 1 is a flowchart of a method for accessing a network according to an embodiment of the present disclosure.
Fig. 2 is a schematic diagram of a portion of a message according to an embodiment of the disclosure.
Fig. 3 is a flowchart of a method for accessing a network according to an embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present specification. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present description as detailed in the accompanying claims.
The terminology used in the description presented herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the description. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used in this specification to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, the first information may also be referred to as second information, and similarly, the second information may also be referred to as first information, without departing from the scope of the present description. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context.
The embodiment of the disclosure provides a method for accessing a network, which is applied to terminal equipment to be added into the network, wherein the terminal equipment is equipment with a wireless access module, such as a wireless printer, a wireless network television, an intelligent camera sleeve, an intelligent door lock, a computer, a mobile phone and the like. As shown in fig. 1, the method includes:
s101, receiving a Beacon frame sent by an AP, and judging whether the Beacon frame carries a preset identifier and an encryption algorithm capability set or not;
s102, if the preset identifier is carried, sending a detection message to an AP (access point) sending the Beacon frame, wherein the detection message carries a first encryption algorithm selected from an encryption algorithm capability set;
s103, receiving a response message sent by the AP, wherein the response message carries first key information determined by the AP according to a first encryption algorithm in a detection message;
s104, accessing the AP according to the first key information and the SSID corresponding to the Beacon frame.
In this embodiment, the AP may periodically send a Beacon frame, and may carry a preset identifier and an encryption algorithm capability set by using a specific location in the Beacon, as shown in fig. 2, fig. 2 illustrates a partial structure of the Beacon frame, where the encryption algorithm capability set may be represented by using one byte, and the preset identifier may be represented by using an OUI.
In this embodiment, the preset identifier may be vendor information of the AP, for example, taking an AP of H3C as an example, the preset identifier carried in the Beacon frame sent by the AP is the OUI of H3C, that is, 00-0f-e2. In other embodiments, the preset identity may also include an identity indicating whether or not wireless automatic access is supported, such as the wireless automatic access capability (1 byte) in fig. 2 (i.e., in this embodiment, the preset identity includes both the OUI of H3C and the wireless automatic access capability).
In step S101, after the terminal device is powered on, the SSID may be scanned, that is, the Beacon frame sent by the AP may be received, and since the manner of the Beacon frame sent by the AP is similar to broadcast transmission, when all the terminal devices are within the coverage area of the AP, the Beacon frame may be received.
And the terminal equipment analyzes the Beacon frame to determine whether the Beacon frame carries a preset identifier and an encryption algorithm capability set.
In this embodiment, the encryption algorithm capability set may include a plurality of encryption algorithms for selection by the user, typically, symmetric encryption algorithms.
The symmetric encryption algorithm is also called a private key encryption algorithm, and the receiver and the sender use the same key, i.e. the encryption key and the decryption key are the same or equivalent. Symmetric encryption algorithms are used to encrypt information such as sensitive data.
The symmetric encryption algorithm mainly comprises: AES, DES, 3DES
DES (Data Encryption Standard): the data encryption standard has high speed and is suitable for occasions of encrypting a large amount of data.
3DES (Triple DES): based on DES, a piece of data is encrypted three times by three different keys, and the intensity is higher.
AES (Advanced Encryption Standard): the advanced encryption standard is the encryption algorithm standard of the next generation, and has high speed and high security level; AES is a block encryption algorithm using 128 as a block of blocks, which together with 128, 192 or 256 bit keys as inputs operate on a 4 x 4 array of bytes. AES is a very efficient algorithm, especially in 8-bit architecture, which results from its byte-oriented design. AES is suitable for 8-bit mini-singlechips or general 32-bit microprocessors and is suitable for implementation in dedicated hardware that enables its throughput (the number of encryption/decryption bits that can be reached per second) to be in the order of billions. Also, it is applicable to RFID systems.
In step S102, the terminal device selects one encryption algorithm from the encryption algorithm capability set as the first encryption algorithm, for example, the terminal device selects the AES algorithm from the encryption algorithm capability set as the first encryption algorithm.
The terminal equipment carries the selected first encryption algorithm in the detection message and sends the detection message to the AP, and because the Beacon frame sent by the AP carries the SSID, the terminal equipment can send the detection message to the AP according to the SSID.
After receiving the detection message sent by the terminal equipment, the AP can acquire a first encryption algorithm selected by the terminal equipment from the detection message, calculates a key according to the first encryption algorithm, takes the calculated key as first key information, and sends the first key information to the terminal equipment by utilizing a response message.
When the first key information is sent to the terminal device, the AP may choose to directly send the first key information to the terminal device, or may choose to encrypt the first key information, and send the encrypted first key information to the terminal device. For example, the AP side performs encryption processing by using AES, encapsulates the encrypted key in the response message, and then obtains the psk password by decrypting the encrypted key obtained from the response message by the terminal device.
After the terminal equipment acquires the first key information (including the decrypted first key information), the terminal equipment accesses the AP by using the first key information and the SSID, thereby completing network access work.
In another embodiment, in order to improve the security of the network, when the terminal device sends the probe packet to the AP, the probe packet may carry a security identifier, for example, the security identifier may be vendor information of the terminal device, where the vendor information may be represented by multiple bytes of OUI.
When the AP receives the probe packet carrying the security identifier and the first encryption algorithm, the AP may perform security authentication on the security identifier (vendor identifier), for example, when the security identifier is the vendor identifier, it may determine whether the vendor identifier is a legal vendor identifier (or a vendor identifier after negotiation), if so, generate the first key information and send the first key information to the terminal device, otherwise, do not perform subsequent processing.
According to the embodiment, through negotiation between the terminal equipment and the AP, the terminal equipment can acquire the secret key from the AP, and access the AP by using the secret key, so that the terminal equipment can automatically access the network, and the user is prevented from completing complicated network access steps.
The embodiment of the disclosure also provides a method for accessing a network, which is applied to an AP, as shown in fig. 3, and includes:
s301, a Beacon frame is sent, wherein the Beacon frame carries a preset identifier and an encryption algorithm capability set for indicating the access of terminal equipment;
s302, receiving a detection message sent by a terminal device, wherein the detection message carries a first encryption algorithm selected from an encryption algorithm capability set of a Beacon frame by the terminal device;
s303, determining first key information according to the first encryption algorithm, carrying the first key information in a response message, and sending the response message to the terminal equipment, so that the terminal equipment accesses the AP according to the first key information.
In step S301, the AP may periodically transmit a Beacon frame, a partial structure of which is shown in fig. 2.
The steps in steps S302 and S303 are described in the above embodiments, and are not described herein.
Based on the same ideas and ideas as the above method embodiments, the present disclosure embodiment further provides a terminal device, including:
the receiving module is used for receiving the Beacon frame sent by the AP and judging whether the Beacon frame carries a preset identifier and an encryption algorithm capability set or not;
the transmitting module is used for transmitting a detection message to an AP (access point) for transmitting the Beacon frame after determining that the Beacon frame carries a preset identifier, wherein the detection message carries a first encryption algorithm selected from an encryption algorithm capability set;
the receiving module is further configured to receive a response message sent by the AP, where the response message carries first key information determined by the AP according to a first encryption algorithm in the probe message;
and the processing module is used for accessing the AP according to the first key information and the SSID corresponding to the Beacon frame.
Based on the same ideas and ideas as the above method embodiments, the disclosure embodiment further provides an AP, which includes:
the transmitting module is used for transmitting a Beacon frame, wherein the Beacon frame carries a preset identifier and an encryption algorithm capability set for indicating the access of the terminal equipment;
the receiving module is used for receiving a detection message sent by the terminal equipment, wherein the detection message carries a first encryption algorithm selected from the encryption algorithm capability set of the Beacon frame by the terminal equipment;
the processing module is configured to determine first key information according to the first encryption algorithm, and send the first key information carried in a response message to the terminal device, so that the terminal device accesses the AP according to the first key information
The foregoing describes specific embodiments of the present disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
Other embodiments of the present description will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This specification is intended to cover any variations, uses, or adaptations of the specification following, in general, the principles of the specification and including such departures from the present disclosure as come within known or customary practice within the art to which the specification pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the specification being indicated by the following claims.
It is to be understood that the present description is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be made without departing from the scope thereof. The scope of the present description is limited only by the appended claims.
The foregoing description of the preferred embodiments is provided for the purpose of illustration only, and is not intended to limit the scope of the disclosure, since any modifications, equivalents, improvements, etc. that fall within the spirit and principles of the disclosure are intended to be included within the scope of the disclosure.

Claims (11)

1. A method of accessing a network, the method being applied to a terminal device to be joined to the network, the method comprising:
receiving a Beacon frame sent by an AP, and judging whether the Beacon frame carries a preset identifier and an encryption algorithm capability set or not;
if the preset identifier is carried, sending a detection message to an AP (access point) sending the Beacon frame, wherein the detection message carries a first encryption algorithm selected from an encryption algorithm capability set;
receiving a response message sent by the AP, wherein the response message carries first key information determined by the AP according to a first encryption algorithm in a detection message;
and accessing the AP according to the first key information and the SSID corresponding to the Beacon frame.
2. The method of claim 1, wherein the encryption algorithm capability set comprises: AES symmetric encryption algorithm, DES symmetric encryption algorithm, or 3DES symmetric encryption algorithm.
3. The method of claim 1, wherein the sending of the probe message to the AP sending the Beacon frame further carries a security identifier;
the first key information is determined by the AP according to a first encryption algorithm and a security identifier carried in the detection message.
4. The method of claim 3, wherein the first key information is determined by the AP according to a first encryption algorithm and a security identifier carried in a probe packet, and specifically includes:
and the AP carries out security authentication on the security identifier, and after the authentication is passed, the AP determines first key information according to a first encryption algorithm.
5. The method of claim 1, wherein the first key information is encrypted key information;
the accessing the AP according to the first key information and the SSID corresponding to the Beacon frame includes:
decrypting the first key information, and accessing the AP by using the decrypted first key information and the SSID corresponding to the Beacon frame.
6. A method of accessing a network, the method being applied to an AP, the method comprising:
transmitting a Beacon frame, wherein the Beacon frame carries a preset identifier and an encryption algorithm capability set for indicating the access of terminal equipment;
receiving a detection message sent by a terminal device, wherein the detection message carries a first encryption algorithm selected from an encryption algorithm capability set of a Beacon frame by the terminal device;
and determining first key information according to the first encryption algorithm, carrying the first key information in a response message, and sending the response message to the terminal equipment so that the terminal equipment accesses the AP according to the first key information.
7. The method of claim 6, wherein the encryption algorithm capability set comprises: AES symmetric encryption algorithm, DES symmetric encryption algorithm, or 3DES symmetric encryption algorithm.
8. The method of claim 6, wherein when the probe packet further carries a security identifier, the AP performs security authentication on the security identifier, and determines the first key information according to a first encryption algorithm after the authentication is passed.
9. The method according to claim 6, wherein the sending the first key information carried in the response message to the terminal device includes:
the AP encrypts the first key information, and sends the encrypted first key information carried in a response message to the terminal equipment.
10. A terminal device, characterized in that the terminal device comprises:
the receiving module is used for receiving the Beacon frame sent by the AP and judging whether the Beacon frame carries a preset identifier and an encryption algorithm capability set or not;
the transmitting module is used for transmitting a detection message to an AP (access point) for transmitting the Beacon frame after determining that the Beacon frame carries a preset identifier, wherein the detection message carries a first encryption algorithm selected from an encryption algorithm capability set;
the receiving module is further configured to receive a response message sent by the AP, where the response message carries first key information determined by the AP according to a first encryption algorithm in the probe message;
and the processing module is used for accessing the AP according to the first key information and the SSID corresponding to the Beacon frame.
11. An AP, the AP comprising:
the transmitting module is used for transmitting a Beacon frame, wherein the Beacon frame carries a preset identifier and an encryption algorithm capability set for indicating the access of the terminal equipment;
the receiving module is used for receiving a detection message sent by the terminal equipment, wherein the detection message carries a first encryption algorithm selected from the encryption algorithm capability set of the Beacon frame by the terminal equipment;
and the processing module is used for determining first key information according to the first encryption algorithm, carrying the first key information in a response message and sending the response message to the terminal equipment so that the terminal equipment accesses the AP according to the first key information.
CN202111015973.9A 2021-08-31 2021-08-31 Network access method, terminal equipment and AP Active CN113747430B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111015973.9A CN113747430B (en) 2021-08-31 2021-08-31 Network access method, terminal equipment and AP

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111015973.9A CN113747430B (en) 2021-08-31 2021-08-31 Network access method, terminal equipment and AP

Publications (2)

Publication Number Publication Date
CN113747430A CN113747430A (en) 2021-12-03
CN113747430B true CN113747430B (en) 2023-11-07

Family

ID=78734471

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111015973.9A Active CN113747430B (en) 2021-08-31 2021-08-31 Network access method, terminal equipment and AP

Country Status (1)

Country Link
CN (1) CN113747430B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114339750A (en) * 2021-12-30 2022-04-12 展讯通信(天津)有限公司 Automatic association method, device and equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104540237A (en) * 2014-11-28 2015-04-22 普联技术有限公司 Method and system for connecting intelligent device to network
KR20160111033A (en) * 2014-03-24 2016-09-23 인텔 아이피 코포레이션 Apparatus, system and method of securing communications of a user equipment (ue) in a wireless local area network
CN106060809A (en) * 2016-05-30 2016-10-26 上海斐讯数据通信技术有限公司 Method for rapidly access wireless network, wireless route device and smart device
CN109219042A (en) * 2018-10-31 2019-01-15 全讯汇聚网络科技(北京)有限公司 Wireless network automatically accesses method and system
CN110312253A (en) * 2018-03-20 2019-10-08 杭州海康威视数字技术股份有限公司 A kind of method for network access, apparatus and system
CN110912920A (en) * 2019-12-03 2020-03-24 望海康信(北京)科技股份公司 Data processing method, apparatus and medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20160111033A (en) * 2014-03-24 2016-09-23 인텔 아이피 코포레이션 Apparatus, system and method of securing communications of a user equipment (ue) in a wireless local area network
CN104540237A (en) * 2014-11-28 2015-04-22 普联技术有限公司 Method and system for connecting intelligent device to network
CN106060809A (en) * 2016-05-30 2016-10-26 上海斐讯数据通信技术有限公司 Method for rapidly access wireless network, wireless route device and smart device
CN110312253A (en) * 2018-03-20 2019-10-08 杭州海康威视数字技术股份有限公司 A kind of method for network access, apparatus and system
CN109219042A (en) * 2018-10-31 2019-01-15 全讯汇聚网络科技(北京)有限公司 Wireless network automatically accesses method and system
CN110912920A (en) * 2019-12-03 2020-03-24 望海康信(北京)科技股份公司 Data processing method, apparatus and medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
WiFi动态密码的研究与实现;邢毓华;2016智能城市与信息化建设国际学术交流研讨会论文集II;全文 *

Also Published As

Publication number Publication date
CN113747430A (en) 2021-12-03

Similar Documents

Publication Publication Date Title
CN101084687B (en) Systems and methods for the connection and remote configuration of wireless clients
US20060251255A1 (en) System and method for utilizing a wireless communication protocol in a communications network
US7877805B1 (en) Apparatus, method and computer program product for detection of a security breach in a network
CN105764058B (en) Method, device and system for accessing network
CN1614920A (en) System, access point and method for setting of encryption key and authentication code
WO2018137351A1 (en) Method, relevant device and system for processing network key
US7653036B2 (en) Method and system for automatic registration security
EP1643714A1 (en) Access point that provides a symmetric encryption key to an authenticated wireless station
CN1514570A (en) Encrypted key setting system and method, place in point and identifying code setting system
JP4405309B2 (en) Access point, wireless LAN connection method, medium recording wireless LAN connection program, and wireless LAN system
US20050063542A1 (en) Method of generating an encryption key without use of an input device, and apparatus therefor
CN100566337C (en) Strengthen the method for wireless LAN safety
JP2007088727A (en) Device, wireless lan setting system, and wireless lan setting method
KR100796525B1 (en) System for sharing Subscriber Indentification Module information of mobile communication terminal and control method thereof
US20080137553A1 (en) Method of automatic certification and secure configuration of a wlan system and transmission device thereof
CN113747430B (en) Network access method, terminal equipment and AP
KR100779800B1 (en) Method for Providing Authentication Service in the Wireless LAN
EP1411674B1 (en) Encryption key setting system and method, access point, and authentication code setting system
US20070116290A1 (en) Method of detecting incorrect IEEE 802.11 WEP key information entered in a wireless station
US20110314136A1 (en) Method and System for Improved Communication Network Setup
US7784086B2 (en) Method for secure packet identification
US8880896B1 (en) Systems and methods for medium access control with key agreement
US8122243B1 (en) Shielding in wireless networks
CN111465007B (en) Authentication method, device and system
CN111182532B (en) Wireless local area network connection method, device, system, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant