CN114189859A - Configuration information processing method and device, storage medium and electronic equipment - Google Patents

Configuration information processing method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN114189859A
CN114189859A CN202111543627.8A CN202111543627A CN114189859A CN 114189859 A CN114189859 A CN 114189859A CN 202111543627 A CN202111543627 A CN 202111543627A CN 114189859 A CN114189859 A CN 114189859A
Authority
CN
China
Prior art keywords
configuration information
access point
terminal
target
original
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111543627.8A
Other languages
Chinese (zh)
Inventor
潘毅明
黄国瑾
田盼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202111543627.8A priority Critical patent/CN114189859A/en
Publication of CN114189859A publication Critical patent/CN114189859A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/082Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/062Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The disclosure belongs to the technical field of wireless communication, and relates to a method and a device for processing configuration information, a storage medium and an electronic device. The method comprises the following steps: determining terminal equipment associated with a wireless access point, and acquiring original configuration information of the terminal equipment; when the target configuration information is acquired, starting a new access point at the wireless access point by using the target configuration information; and updating the original configuration information of the terminal equipment by using the target configuration information so as to enable the terminal equipment to be associated with the new access point. According to the method and the device, the original configuration information is uniformly and automatically updated by using the target configuration information, the complexity of changing the wireless access configuration information by the Internet of things equipment and other terminal equipment is reduced, the terminal access process in a household scene and other scenes is facilitated, the frequency of updating the configuration information by the wireless local area network is further improved, the safety of the wireless local area network is improved, and the reflux degree of a user is improved to a certain extent.

Description

Configuration information processing method and device, storage medium and electronic equipment
Technical Field
The present disclosure relates to the field of wireless communication technologies, and in particular, to a method and an apparatus for processing configuration information, a computer-readable storage medium, and an electronic device.
Background
Based on security considerations, a WLAN (Wireless Local Area Network) should periodically update Wireless information, such as replacing a password or using a new SSID (Service Set Identifier). In the IoT (Internet of Things) scenario using WLAN, too many WLAN terminals are associated to change the configuration. Generally, in an IoT scenario, there may be tens of WLAN terminals associated with access under the same WLAN SSID. When setting the WLAN access information for the IoT device, since the IoT device usually has no input/output device, and often needs to be modified by a corresponding APP (Application), the individual manufacturer may also need to reset the IoT device.
Currently, a WLAN password or SSID change requires reconfiguration at each terminal. These cumbersome steps may reduce the willingness of the user to update the WLAN wireless information periodically, reducing the security of the WLAN network.
In view of the above, there is a need in the art to develop a new method and apparatus for processing configuration information.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The present disclosure is directed to a method for processing configuration information, a device for processing configuration information, a computer-readable storage medium, and an electronic device, so as to overcome, at least to some extent, the technical problems of cumbersome configuration update and insufficient security due to the limitations of the related art.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows, or in part will be obvious from the description, or may be learned by practice of the disclosure.
According to a first aspect of the embodiments of the present invention, there is provided a method for processing configuration information, which is applied to a wireless access point, the method including:
determining terminal equipment associated with the wireless access point, and acquiring original configuration information of the terminal equipment;
when target configuration information is acquired, a new access point is started at the wireless access point by using the target configuration information;
and updating the original configuration information of the terminal equipment by using the target configuration information so as to enable the terminal equipment to be associated with the new access point.
In an exemplary embodiment of the invention, after the determining the terminal device associated with the wireless access point, the method further comprises:
when the terminal equipment associated with the wireless access point is in an online state, generating an online terminal list according to the terminal equipment;
and when the terminal equipment associated with the wireless access point is in an off-line state, generating an off-line terminal list according to the terminal equipment.
In one exemplary embodiment of the present invention, the original configuration information includes an original service set identification and an original password, the target configuration information includes a target service set identification and a target password,
when the target configuration information is obtained, starting a new access point at the wireless access point by using the target configuration information, including:
when the original password is modified by the target password, a new access point is opened at the wireless access point by the target configuration information;
and when the original service set identification and the original password are respectively modified by using the target service set identification and the target password, starting a new access point at the wireless access point by using the target configuration information.
In an exemplary embodiment of the present invention, the updating the original configuration information of the terminal device by using the target configuration information to enable the terminal device to associate with the new access point includes:
acquiring a random number corresponding to the wireless access point, and encrypting the target configuration information by using the original password and the random number to obtain encrypted configuration information;
and sending the encrypted configuration information and the random number to terminal equipment in the online terminal list so that the terminal equipment in the online terminal list is associated with the new access point according to the target configuration information after the encrypted configuration information is decrypted.
In an exemplary embodiment of the invention, the method further comprises:
and when the terminal equipment in the online terminal list is successfully associated with the new access point, removing the terminal equipment in the online terminal list from the online terminal list.
In an exemplary embodiment of the invention, the method further comprises:
and when the terminal equipment in the online terminal list fails to associate the new access point according to the target configuration information, the encryption configuration information is sent to the terminal equipment in the online terminal list again.
In an exemplary embodiment of the present invention, the updating the original configuration information of the terminal device by using the target configuration information to enable the terminal device to associate with the new access point includes:
acquiring an updating time limit corresponding to the terminal equipment in the offline terminal list;
when the terminal equipment in the offline terminal list is on-line in the updating time limit and the original configuration information is used for associating with the old access point corresponding to the new access point, acquiring the random number corresponding to the wireless access point;
and encrypting the target configuration information by using the original password and the random number to obtain encrypted configuration information, and sending the encrypted configuration information and the random number to terminal equipment in the offline terminal list, so that the terminal equipment in the offline terminal list is associated with the new access point according to the target configuration information after decrypting the encrypted configuration information.
According to a second aspect of the embodiments of the present invention, there is provided a device for processing configuration information, which is applied to a wireless access point, and includes:
a terminal determining module configured to determine a terminal device associated with the wireless access point and acquire original configuration information of the terminal device;
the configuration modification module is configured to utilize the target configuration information to start a new access point at the wireless access point when the target configuration information is acquired;
a configuration update module configured to update original configuration information of the terminal device with the target configuration information to associate the terminal device with the new access point.
According to a third aspect of embodiments of the present invention, there is provided an electronic apparatus including: a processor and a memory; wherein the memory has stored thereon computer readable instructions which, when executed by the processor, implement a method of processing configuration information in any of the above exemplary embodiments.
According to a fourth aspect of embodiments of the present invention, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a method of processing configuration information in any of the above-described exemplary embodiments.
As can be seen from the foregoing technical solutions, the method for processing configuration information, the apparatus for processing configuration information, the computer storage medium, and the electronic device in the exemplary embodiments of the present disclosure have at least the following advantages and positive effects:
in the method and the device provided by the exemplary embodiment of the disclosure, the original configuration information is uniformly and automatically updated by using the target configuration information, so that the complexity of changing the wireless access configuration information by the internet of things device and other terminal devices is reduced, the terminal access process in a household scene and other scenes is facilitated, the frequency of updating the configuration information by the wireless local area network is further improved, the safety of the wireless local area network is increased, and the reflux degree of a user is improved to a certain extent.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without the exercise of inventive faculty.
Fig. 1 schematically illustrates a flow chart of a method for processing configuration information in an exemplary embodiment of the present disclosure;
fig. 2 schematically illustrates a flow chart of a method of generating a terminal list in an exemplary embodiment of the present disclosure;
fig. 3 schematically shows a flow chart of two methods for opening a new access point in an exemplary embodiment of the disclosure;
fig. 4 is a flowchart schematically illustrating a method for updating configuration of a terminal device in an online terminal list according to an exemplary embodiment of the present disclosure;
fig. 5 is a flowchart schematically illustrating a method for updating configuration of a terminal device in an offline terminal list according to an exemplary embodiment of the present disclosure;
fig. 6 is a schematic flow chart illustrating a terminal maintenance flow in an application scenario in an exemplary embodiment of the present disclosure;
FIG. 7 is a flow chart schematically illustrating an overall flow of updating configuration in an application scenario in an exemplary embodiment of the present disclosure;
fig. 8 is a flowchart schematically illustrating a method for updating configuration of a terminal device in an online terminal list in an application scenario according to an exemplary embodiment of the present disclosure;
fig. 9 is a flowchart schematically illustrating a method for updating configuration of a terminal device in an offline terminal list in an application scenario in an exemplary embodiment of the present disclosure;
fig. 10 is a schematic structural diagram of a configuration information processing apparatus according to an exemplary embodiment of the present disclosure;
fig. 11 schematically illustrates an electronic device for implementing a processing method of configuration information in an exemplary embodiment of the present disclosure;
fig. 12 schematically illustrates a computer-readable storage medium for implementing a processing method of configuration information in an exemplary embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the subject matter of the present disclosure can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and the like. In other instances, well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the present disclosure.
The terms "a," "an," "the," and "said" are used in this specification to denote the presence of one or more elements/components/parts/etc.; the terms "comprising" and "having" are intended to be inclusive and mean that there may be additional elements/components/etc. other than the listed elements/components/etc.; the terms "first" and "second", etc. are used merely as labels, and are not limiting on the number of their objects.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repetitive description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities.
There are two methods for updating configuration information of a wireless local area network in the related art. One is to replace the terminal password by NFC (Near Field Communication) contact, and the other is to input the access hotspot without Configuration in WPS (Wi-Fi Protected Setup) and PBC (Push Button Configuration).
First, replacing the password of the terminal through the NFC contact mode may update the password in an offline mode, and the NFC card with new configuration information needs to be updated by contacting the terminal with the NFC function.
The second non-configuration input access hotspot using the WPS and PBC modes may acquire configuration in a WPS plus key mode.
In both of these two modes, after the wireless access point updates the access configuration information, the configuration update operation needs to be performed on the terminal device one by one.
However, the first method of replacing the terminal password by the NFC contact method is to wirelessly send an encrypted password message of an old password, and the response message is encrypted by a new password, which also requires modifying the flow of the 802.11 protocol (802.11 wireless network standard), and thus the security is not sufficient.
The method uses WPS and PBC mode to input Access hotspot without configuration, and transmits the encrypted WiFi password of the connection state terminal MAC (media Access Control Address) and the media Access Control Address, also called local area network Address, Ethernet Address (Ethernet Address) or physical Address, by broadcasting and multicasting modes, and the terminal uses the MAC to decrypt and replace the original WiFi password.
In the second method, since the MAC of the target STA is used for encryption, different data packets need to be sent for each terminal, which increases air interface overhead. And, because the target MAC encryption is adopted, but the transmitted protocol frame has the target MAC, the security is poor.
In order to solve the problems in the related art, the present disclosure provides a method for processing configuration information, which is applied to a wireless access point. Fig. 1 shows a flow chart of a method for processing configuration information, which, as shown in fig. 1, comprises at least the following steps:
step S110, determining the terminal equipment associated with the wireless access point, and acquiring the original configuration information of the terminal equipment.
And S120, when the target configuration information is acquired, starting a new access point at the wireless access point by using the target configuration information.
And S130, updating the original configuration information of the terminal equipment by using the target configuration information so as to enable the terminal equipment to be associated with the new access point.
In the exemplary embodiment of the disclosure, the original configuration information is uniformly and automatically updated by using the target configuration information, so that the complexity of changing the wireless access configuration information by the internet of things device and other terminal devices is reduced, the terminal access process in a household scene and other scenes is facilitated, the frequency of updating the configuration information by the wireless local area network is further improved, the security of the wireless local area network is increased, and the reflux degree of a user is improved to a certain extent.
The following describes each step of the configuration information processing method in detail.
In step S110, a terminal device associated with the wireless access point is determined, and original configuration information of the terminal device is acquired.
In an exemplary embodiment of the present disclosure, a Wireless Access Point (AP) is a typical application of a Wireless local area network. The wireless AP is a bridge for communication between a wireless network and a wired network, and is a core device for establishing a wireless local area network.
The wireless access point mainly provides mutual access between the wireless workstation and the wired local area network. Thus, wireless stations within the signal coverage of the AP can communicate with each other through it, and there is essentially no way for the AP to establish a WLAN that is truly Internet-accessible. The AP in the WLAN corresponds to the role of the transmitting base station in the mobile communication network.
In a wireless network, the AP acts as a hub for a wired network that can connect various wireless clients. The network card used by the wireless client is a wireless network card, and the transmission medium is air (electromagnetic wave).
Logically, the wireless access point is the central point of a wireless unit. All radio signals in the unit have to pass through it for exchange. Although a wireless local area network in a peer-to-peer mode can be formed by using only a wireless network card without using the AP, such a wireless local area network is somewhat special and is only suitable for temporary wireless connection.
After the AP is used, not only can permanent wireless connection service be obtained, but also the users can be managed in a centralized way, and the security of the wireless network is greatly improved.
In general, a wireless AP is a bridge for communication between a wireless network and a wired network. Since the coverage area of the wireless AP is a circular area spreading out, the wireless AP should be placed at the center of the wireless network as much as possible, and the linear distance between each wireless client and the wireless AP should preferably not exceed 30m, so as to avoid communication failure due to excessive attenuation of communication signals.
The WLAN mainly includes Stations (STAs), access points, a wireless medium, and a Distribution System (DS). The STA in the WLAN is generally a client, and may be a computer equipped with a wireless network card, or a smart phone with a WiFi module, and the like, which is not limited in this exemplary embodiment. The STA may be mobile or fixed, and is the most basic component of the wireless lan.
Therefore, the terminal device associated with the wireless access point is the terminal device in the wireless local area network.
After determining the terminal device associated with the wireless access point, a corresponding terminal list may be generated according to a state of whether the terminal device is online.
In an alternative embodiment, fig. 2 shows a flowchart of a method for generating a terminal list, and as shown in fig. 2, the method at least includes the following steps: in step S210, when the terminal device associated with the wireless access point is in an online state, an online terminal list is generated according to the terminal device.
When the terminal device is associated to the wireless access point, the terminal list maintenance module at one side of the wireless access point can maintain the online and offline terminal list.
When it is checked that a terminal device associated with the wireless access point is online, the terminal device is added to an online terminal list.
In step S220, when the terminal device associated with the wireless access point is in an offline state, an offline terminal list is generated according to the terminal device.
When the terminal device is associated to the wireless access point, the terminal list maintenance module at one side of the wireless access point can maintain the online and offline terminal list.
When it is checked that the terminal device associated to the radio access point is not on-line, i.e. off-line, the terminal device is added to the off-line terminal list. The offline terminal list may be a history list.
In the exemplary embodiment, the corresponding terminal list can be generated according to the online state of the terminal device associated with the wireless access point, the generation mode is simple and accurate, the current state of the terminal device can be reflected, and a differentiated processing basis is provided for subsequently updating the configuration information of the terminal devices of different groups.
After an online terminal list and an offline terminal list are respectively generated according to the terminal device, the original configuration information of the terminal device in the online terminal list and the offline terminal list can also be obtained. The original configuration information is the configuration information of the terminal equipment associated wireless access point.
In step S120, when the target configuration information is acquired, a new access point is opened at the wireless access point by using the target configuration information.
In an exemplary embodiment of the present disclosure, when the original configuration information is modified on the wireless access point side, a configuration update process of the terminal devices in the online terminal list and the offline terminal list may be triggered.
In an alternative embodiment, the original configuration information includes an original service set identification and an original password, and the target configuration information includes a target service set identification and a target password. Fig. 3 shows a flow chart of two methods for opening a new access point, and as shown in fig. 3, the method at least includes the following steps: in step S310, when the original password is modified with the target password, a new access point is opened at the wireless access point using the target configuration information.
The triggering of the configuration update process of the terminal devices in the online terminal list and the offline terminal list can be realized in two ways. When the original password is modified by the target password on one side of the wireless access point, the wireless access point can open a new access point by using the newly configured target password.
The new Access Point is started by starting a new VAP (Virtual Access Point) according to the new wireless configuration.
The virtual access point VAP is a plurality of APs virtualized on a physical entity AP, each virtualized AP is a VAP, and each VAP provides the same function as the physical entity AP. Users may create different VAPs on one AP to provide wireless access services to different user groups.
If the original password is modified with only the target password, the new VAP uses the same SSID and a different wireless password. Then, the STAs are distinguished by the MAC of the VAP.
The MAC is an address used to identify the location of the network device. In an OSI (Open System Interconnection Reference Model) Model, a third layer network layer is responsible for an IP (Internet Protocol) address, and a second layer data link layer is responsible for a MAC address.
The MAC address is used to uniquely identify a network card in the network, and if one or more network cards exist in a device, each network card needs to have a unique MAC address.
In step S320, when the original service set identifier and the original password are modified with the target service set identifier and the target password, respectively, a new access point is opened at the wireless access point using the target configuration information.
The triggering of the configuration update process of the terminal devices in the online terminal list and the offline terminal list can be realized in two ways. And when the original password is modified by the target service set identifier, the wireless access point can open a new access point by using the newly configured target password.
The SSID technology can divide a wireless local area network into a plurality of sub-networks which need different authentication, each sub-network needs independent authentication, and only users who pass the authentication can enter the corresponding sub-network, so that unauthorized users are prevented from entering the network.
When the original service set identifier is modified by the target service set identifier and the original password is modified by the target password, the wireless access point can open a new access point by using the newly configured target password. And, the opening of the new access point also opens a new V AP according to the new wireless configuration.
In the exemplary embodiment, when a new access point is opened according to the target configuration information, the triggering can be triggered in two modification modes, the triggering modes are simple and accurate, and the configuration process of the wireless access point is attached, so that the practicability is extremely high.
In step S130, the original configuration information of the terminal device is updated with the target configuration information so that the terminal device associates with the new access point.
In an exemplary embodiment of the present disclosure, after the wireless access point side acquires the target configuration information, the original configuration information configuring the terminal device may be updated with the target configuration information.
In addition, since the terminal device maintains the online terminal list and the offline terminal list according to the online state, the configuration information of the terminal device can be updated for different terminal lists.
In an alternative embodiment, fig. 4 is a flowchart illustrating a method for updating a configuration of a terminal device in an online terminal list, where as shown in fig. 4, the method at least includes the following steps: in step S410, a random number corresponding to the wireless access point is obtained, and the target configuration information is encrypted by using the original password and the random number to obtain encrypted configuration information.
The random number may be generated in real time or generated by other methods, and this exemplary embodiment is not particularly limited thereto.
After the random number is acquired, the target configuration information may be encrypted using the original password and the random number.
Specifically, the Encryption processing of the target configuration information by the original password and the random number may be implemented by a DES (Data Encryption Standard) Encryption algorithm. Among them, the DES algorithm is a block algorithm using key encryption.
For the automatic update of the wireless configuration of the terminal equipment in the online terminal list, the AP side uses the DES encryption algorithm to encrypt the new target configuration information, the first bits of the required 56-bit key may be the original password, and the remaining bits are a random number, for example, 8-bit original password + 48-bit random number.
The DES algorithm has three entry parameters, namely Key, Data and Mode. Wherein, Key is 56 bits in 7 bytes, and is a working Key of DES algorithm; data is 8 bytes of 64 bits, which are Data to be encrypted or decrypted; the Mode is the working Mode of DES, and there are two modes, namely encryption or decryption.
Two principles of block cipher design are used in the DES design, namely confusion and diffusion, in order to combat the statistical analysis of adversaries on cryptographic systems.
Obfuscation is to make the relationship between the statistical properties of the ciphertext and the value of the key as complex as possible, so that the dependencies between the key and the plaintext and ciphertext are not available to the cryptanalyst.
The effect of diffusion is to apply the influence of each bit of plaintext to more output ciphertext bits as quickly as possible to eliminate the statistical structure of plaintext in a large number of ciphertexts and to spread the influence of each bit of key to more ciphertext bits as quickly as possible to prevent the key from being broken segment by segment.
After DES encryption processing is carried out on the target configuration information by using the original password and the random number, corresponding encryption configuration information can be obtained.
In step S420, the encrypted configuration information and the random number are sent to the terminal devices in the online terminal list, so that the terminal devices in the online terminal list associate with the new access point according to the target configuration information obtained by decrypting the encrypted configuration information.
After obtaining the encryption configuration information, the encryption configuration information and the random number may be sent to the terminal device in the online terminal list over the air interface (air interface).
Among wireless communication technologies, the "air interface" defines the technical specification of an electrical wave link between a terminal device and a network device, making wireless communication as reliable as wired communication.
After the terminal device in the online terminal list receives the encrypted configuration information and the random number, the encrypted configuration information may be decrypted by using the original password and the random number to obtain the target configuration information. Further, the target configuration information is used to associate with the new access point.
When the terminal device in the online terminal list uses the decrypted target configuration information to successfully associate with the new access point, the terminal device can be removed from the online terminal list.
In an alternative embodiment, when the terminal device in the online terminal list successfully associates with the new access point, the terminal device in the online terminal list is removed from the online terminal list.
And when the terminal equipment in the online terminal list is successfully associated with the new access point, the terminal equipment in the online terminal list calls the configuration storage module to store the target configuration information. In addition, the wireless access point marks the STA to complete the configuration update and removes the STA from the list of online terminals.
When the terminal device in the online terminal list fails to associate with the new access point using the decrypted target configuration information, a retransmission mechanism of the wireless access point may also be triggered.
In an optional embodiment, when the terminal device in the online terminal list fails to associate with the new access point according to the target configuration information, the encryption configuration information is sent to the terminal device in the online terminal list again.
When the terminal equipment in the online terminal list fails to associate with the new access point, the STA discards the decrypted target configuration information, and the wireless access point retransmits the encrypted configuration information to the STA.
In the present exemplary embodiment, the target configuration information is encrypted and then sent to the terminal devices in the online terminal list, but part of the information used for decryption is not transmitted, which improves the security of the target configuration information.
For the terminal devices in the offline terminal list, considering that some terminal devices are temporarily accessed, the implementation of automatically updating the access configuration of the terminal devices in the offline terminal list can be set to be completed, and then the terminal devices are associated with the new access point.
In an alternative embodiment, fig. 5 is a flowchart illustrating a method for updating a configuration of a terminal device in an offline terminal list, where as shown in fig. 5, the method at least includes the following steps: in step S510, an update time limit corresponding to a terminal device in the offline terminal list is acquired.
The updating time limit is the realization of automatically updating the access configuration of the terminal equipment in the set off-line terminal list. Also, the update time limit may be determined in consideration of sleep periods of IoT devices within the network.
For example, when the sleep period of the IoT devices in the network is one month, the update time limit may be set to one month.
In step S520, when the terminal device in the offline terminal list is on-line within the update time limit and associates the old access point corresponding to the new access point with the original configuration information, the random number corresponding to the wireless access point is obtained.
When the terminal devices in the offline terminal list come on line within the update time limit and are associated with the old access point through the original configuration information, a random number can be acquired.
The random number may be generated in real time or generated by other methods, and this exemplary embodiment is not particularly limited thereto.
In step S530, the target configuration information is encrypted by using the original password and the random number to obtain encrypted configuration information, and the encrypted configuration information and the random number are sent to the terminal devices in the offline terminal list, so that the terminal devices in the offline terminal list associate with the new access point according to the target configuration information obtained by decrypting the encrypted configuration information.
After the random number is acquired, the target configuration information may be encrypted using the original password and the random number.
Specifically, the encryption processing of the target configuration information by the original password and the random number may be implemented by a DES encryption algorithm.
After DES encryption processing is carried out on the target configuration information by using the original password and the random number, corresponding encryption configuration information can be obtained.
After the encryption configuration information is obtained, the encryption configuration information and the random number may be sent to the terminal device in the offline terminal list through the air interface.
After the terminal device in the offline terminal list receives the encrypted configuration information and the random number, the terminal device may decrypt the encrypted configuration information using the original password and the random number to obtain the target configuration information. Further, the target configuration information is used to associate with the new access point.
In the exemplary embodiment, the target configuration information is encrypted and then sent to the terminal devices in the offline terminal list, so that the complexity of terminal configuration access maintenance after configuration updating is simplified, the configuration of the terminal devices in the offline terminal list is updated more conveniently, and the security of the internet of things system is enhanced.
The following describes a detailed description of a method for processing configuration information in the embodiment of the present disclosure in conjunction with an application scenario.
In the related art, there may be two methods of updating configuration information of a wireless local area network. One is to change the terminal password in an NFC contact mode, and the other is to access a hotspot without configuration input in WPS and PBC modes.
First, the password can be updated in an off-line manner by replacing the password of the terminal in an NFC contact manner, and an NFC card with new configuration information needs to be updated hi in contact with the terminal with an NFC function.
The second non-configuration input access hotspot using the WPS and PBC modes may acquire configuration in a WPS plus key mode.
Both of these two methods require configuration update operations to be performed on the terminal device one by one after the wireless access point updates the access configuration information.
However, the first method of replacing the terminal password by the NFC contact method is to wirelessly transmit an encrypted password message of an old password, and the response message is encrypted by a new password, which also requires modifying the flow of the 802.11 protocol. Compared with the prior art, the configuration information processing method disclosed by the invention does not transmit the password in the air interface, the STA can decrypt the received message to obtain the new configuration information, and the security is better.
And transmitting the WiFi password encrypted by the MAC of the connection state terminal in a broadcast and multicast mode by using a WPS (wireless personal communication system) and PBC (physical broadcast station) mode without configuration input access hotspot, and decrypting by using the MAC and replacing the original WiFi password by the terminal.
In the second method, since the MAC of the target STA is used for encryption, different data packets need to be sent for each terminal, which increases air interface overhead. And, because the target MAC encryption is adopted, but the transmitted protocol frame has the target MAC, the security is poor.
Compared with the second hotspot access mode, the configuration information processing method disclosed by the invention adopts a broadcast or multicast mode to transmit the configuration information, so that the air interface overhead is saved. In addition, the air interface transmits the encryption configuration information and the random number, and part of information used for decryption is not transmitted at the air interface, so that the security is higher.
Besides, the method for processing the configuration information can update the SSID, and the first mode of replacing the terminal password by the NFC contact mode and the second mode of accessing the hotspot without configuration input by using the WPS and PBC modes cannot be realized.
The method for processing the configuration information in the application scene comprises two main modules which are respectively positioned at an STA side and an AP side.
The main module at one side of the wireless access point comprises a terminal list maintenance module, a WLAN driving module, an encryption and decryption module and a configuration reading module. The master module at the side of the wireless access point may implement the maintenance of the online terminal list and the offline terminal list. And when the configuration of the original password or SSID is updated, calling an interface of the WLAN driving module to hide the old access point and open the access point of new configuration information, and also encrypting the new target configuration information by using the random number and the original password and sending the encrypted configuration information in an air interface.
The main module at one side of the terminal device mainly comprises a WLAN driving module, an encryption and decryption module and a configuration storage module. The main module at the side of the terminal device may receive the encrypted configuration information when updating the original password or SSID, and decrypt the encrypted configuration information to associate the newly configured access point with the decrypted target configuration information, and may also store the new target configuration information, thereby replacing the old configuration information.
Fig. 6 shows a schematic flowchart of a terminal maintenance procedure in an application scenario, and as shown in fig. 6, the terminal maintenance procedure mainly involves two modules of a wireless access point, namely a terminal list maintenance module and a WLAN driver module.
After determining the terminal device associated with the wireless access point, a corresponding terminal list may be generated according to a state of whether the terminal device is online.
In step S610, the online terminal list is updated.
And when the terminal equipment associated with the wireless access point is in an online state, generating an online terminal list according to the terminal equipment.
When the terminal device is associated to the wireless access point, the terminal list maintenance module at one side of the wireless access point can maintain the online and offline terminal list.
When it is checked that a terminal device associated with the wireless access point is online, the terminal device is added to the online terminal list.
In step S620, it is checked whether the terminal is online.
In step S630, the terminal is put in the history list.
And when the terminal equipment associated with the wireless access point is in an off-line state, generating an off-line terminal list according to the terminal equipment.
When the terminal device is associated to the wireless access point, the terminal list maintenance module at one side of the wireless access point can maintain the online and offline terminal list.
When it is checked that the terminal device associated to the radio access point is not on-line, i.e. off-line, the terminal device is added to the off-line terminal list. The offline terminal list may be a history list.
Fig. 7 is a flowchart illustrating an overall flow of updating configuration in an application scenario, and as shown in fig. 7, after an online terminal list and an offline terminal list are respectively generated according to terminal devices, original configuration information of the terminal devices in the online terminal list and the offline terminal list may also be obtained. The original configuration information is the configuration information of the terminal equipment associated wireless access point.
When the original configuration information is modified at the side of the wireless access point, the configuration updating process of the terminal equipment in the online terminal list and the offline terminal list can be triggered.
In step S710, the AP updates the access point configuration.
The triggering of the configuration update process of the terminal devices in the online terminal list and the offline terminal list can be realized in two ways.
When the original password is modified by the target password on one side of the wireless access point, the AP updates the password configuration of the access point.
And when the original password is modified by the target password at one side of the wireless access point and the original service set identifier is modified by the target service set identifier, the AP updates the password configuration and the service set identifier configuration of the access point simultaneously.
In step S720, the newly configured access point is turned on.
When the original password is modified by the target password on the side of the wireless access point, the wireless access point can open a new access point by using the newly configured target password. The opening of the new access point is to open a new VAP according to the new radio configuration.
If the original password is modified with only the target password, the new VAP uses the same SSID and a different wireless password. Then, the STAs are distinguished by the MAC of the VAP.
And when the original password is modified by the target password at one side of the wireless access point and the original service set identification is modified by the target service set identification, the wireless access point can open a new access point by using the newly configured target password.
When the original service set identifier is modified by the target service set identifier and the original password is modified by the target password, the wireless access point can open a new access point by using the newly configured target password. And, the opening of the new access point also opens a new V AP according to the new wireless configuration.
In step S730, the online terminal updates the access configuration.
And acquiring a random number corresponding to the wireless access point, and encrypting the target configuration information by using the original password and the random number to obtain encrypted configuration information.
The random number may be generated in real time or generated by other methods, and this exemplary embodiment is not particularly limited thereto.
After the random number is acquired, the target configuration information may be encrypted using the original password and the random number.
Specifically, the encryption processing of the target configuration information by the original password and the random number may be implemented by a DES encryption algorithm.
For the automatic update of the wireless configuration of the terminal equipment in the online terminal list, the AP side uses the DES encryption algorithm to encrypt the new target configuration information, the first bits of the required 56-bit key may be the original password, and the remaining bits are a random number, for example, 8-bit original password + 48-bit random number.
After DES encryption processing is carried out on the target configuration information by using the original password and the random number, corresponding encryption configuration information can be obtained.
And sending the encrypted configuration information and the random number to the terminal equipment in the online terminal list so that the terminal equipment in the online terminal list is associated with the new access point according to the target configuration information obtained by decrypting the encrypted configuration information.
After the encryption configuration information is obtained, the encryption configuration information and the random number may be sent to the terminal device in the online terminal list through the air interface.
Among wireless communication technologies, the "air interface" defines the technical specification of an electrical wave link between a terminal device and a network device, making wireless communication as reliable as wired communication.
After the terminal device in the online terminal list receives the encrypted configuration information and the random number, the encrypted configuration information may be decrypted by using the original password and the random number to obtain the target configuration information. Further, the target configuration information is used to associate with the new access point.
And when the terminal equipment in the online terminal list is successfully associated with the new access point, removing the terminal equipment in the online terminal list from the online terminal list.
And when the terminal equipment in the online terminal list is successfully associated with the new access point, the terminal equipment in the online terminal list calls the configuration storage module to store the target configuration information. In addition, the wireless access point marks the STA to complete the configuration update and removes the STA from the list of online terminals.
And when the terminal equipment in the online terminal list fails to associate with the new access point according to the target configuration information, the encrypted configuration information is sent to the terminal equipment in the online terminal list again.
When the terminal equipment in the online terminal list fails to associate with the new access point, the STA discards the decrypted target configuration information, and the wireless access point retransmits the encrypted configuration information to the STA.
In step S740, the offline terminal updates the access configuration.
After the terminal devices in the online terminal list complete configuration update, the configuration update process of the terminal devices in the offline terminal list and the like can be entered.
And acquiring an updating time limit corresponding to the terminal equipment in the offline terminal list.
The updating time limit is the realization of automatically updating the access configuration of the terminal equipment in the set off-line terminal list. Also, the update time limit may be determined in consideration of sleep periods of IoT devices within the network.
And when the terminal equipment in the offline terminal list is on line within the updating time limit and the old access point corresponding to the new access point is associated by using the original configuration information, acquiring the random number corresponding to the wireless access point.
When the terminal devices in the offline terminal list come on line within the update time limit and are associated with the old access point through the original configuration information, a random number can be acquired.
The random number may be generated in real time or generated by other methods, and this exemplary embodiment is not particularly limited thereto.
And encrypting the target configuration information by using the original password and the random number to obtain encrypted configuration information, and sending the encrypted configuration information and the random number to the terminal equipment in the offline terminal list, so that the terminal equipment in the offline terminal list is associated with a new access point according to the target configuration information obtained by decrypting the encrypted configuration information.
After the random number is acquired, the target configuration information may be encrypted using the original password and the random number.
Specifically, the encryption processing of the target configuration information by the original password and the random number may be implemented by a DES encryption algorithm.
After DES encryption processing is carried out on the target configuration information by using the original password and the random number, corresponding encryption configuration information can be obtained.
After the encryption configuration information is obtained, the encryption configuration information and the random number may be sent to the terminal device in the offline terminal list through the air interface.
After the terminal device in the offline terminal list receives the encrypted configuration information and the random number, the terminal device may decrypt the encrypted configuration information using the original password and the random number to obtain the target configuration information. Further, the target configuration information is used to associate with the new access point.
In step S750, the old access point is closed.
After the configuration update of the terminal device in the offline terminal list is completed, the old access point may be closed to complete the overall flow of updating the configuration.
Fig. 8 is a flowchart illustrating a method for updating configuration of a terminal device in an online terminal list in an application scenario, where as shown in fig. 8, after target configuration information is acquired by a wireless access point, original configuration information of the terminal device may be updated and configured by using the target configuration information. In addition, since the terminal device maintains the online terminal list and the offline terminal list according to the online state, the configuration information of the terminal device can be updated for different terminal lists.
In step S810, the AP transmits the configuration information to the STA.
And acquiring a random number corresponding to the wireless access point, and encrypting the target configuration information by using the original password and the random number to obtain encrypted configuration information.
The random number may be generated in real time or generated by other methods, and this exemplary embodiment is not particularly limited thereto.
After the random number is acquired, the target configuration information may be encrypted using the original password and the random number.
Specifically, the encryption processing of the target configuration information by the original password and the random number may be implemented by a DES encryption algorithm.
After DES encryption processing is carried out on the target configuration information by using the original password and the random number, corresponding encryption configuration information can be obtained.
After the encryption configuration information is obtained, the encryption configuration information and the random number may be sent to the terminal device in the online terminal list through the air interface.
In step S820, the STA receives the configuration information.
The terminal devices in the online terminal list may receive the encryption configuration information and the random number.
In step S830, the STA associates using the new configuration information.
After the terminal device in the online terminal list receives the encrypted configuration information and the random number, the encrypted configuration information may be decrypted by using the original password and the random number to obtain the target configuration information. Further, the target configuration information is used to associate with the new access point.
And when the terminal equipment in the online terminal list is successfully associated with the new access point, removing the terminal equipment in the online terminal list from the online terminal list.
And when the terminal equipment in the online terminal list is successfully associated with the new access point, the terminal equipment in the online terminal list calls the configuration storage module to store the target configuration information. In addition, the wireless access point marks the STA to complete the configuration update and removes the STA from the list of online terminals.
When the terminal device in the online terminal list fails to associate with the new access point using the decrypted target configuration information, a retransmission mechanism of the wireless access point may also be triggered.
And when the terminal equipment in the online terminal list fails to associate with the new access point according to the target configuration information, the encrypted configuration information is sent to the terminal equipment in the online terminal list again.
When the terminal equipment in the online terminal list fails to associate with the new access point, the STA discards the decrypted target configuration information, and the wireless access point retransmits the encrypted configuration information to the STA.
In step S840, it is checked whether the terminal in the online list completes updating.
The AP checks whether the terminal devices in the online terminal list complete the configuration update and repeats steps S810-S830 until the online terminal devices in the online terminal list are empty.
Fig. 9 is a schematic flowchart illustrating a method for updating configuration of a terminal device in an offline terminal list in an application scenario, where as shown in fig. 9, when the terminal device in the offline terminal list is on line within an update time limit and an old access point corresponding to a new access point is associated with original configuration information, an AP updates configuration information for the terminal device using an online terminal configuration update procedure shown in fig. 8.
Considering that some terminal devices in the offline terminal list are temporarily accessed, the implementation of automatically updating the access configuration of the terminal devices in the offline terminal list can be configured to be completed, and then the terminal devices are associated with the new access point.
In step S910, an offline terminal update access configuration countdown is started.
Wherein the update access configuration countdown is an update time limit. The updating time limit is the realization of automatically updating the access configuration of the terminal equipment in the set off-line terminal list. Also, the update time limit may be determined in consideration of sleep periods of IoT devices within the network.
For example, when the sleep period of the IoT devices in the network is one month, the update time limit may be set to one month.
In step S920, it is determined whether or not the time limit has elapsed.
When the update access configuration countdown does not reach the update time limit, indicating that the update access configuration is still within the update time limit; when the update access configuration countdown has reached the update time limit, indicating that the update time limit has been exceeded.
In step S930, it is checked whether the terminal completes updating in the history list.
The AP checks whether the terminal devices in the offline terminal list complete the configuration update. When the terminal equipment still exists in the offline terminal list, the terminal equipment indicates that all the terminals in the history list are not completely updated.
In step S940, offline terminal online is waited.
In step S950, the access configuration update process is completed using the online terminal.
When the terminal devices in the offline terminal list come on line within the update time limit and are associated with the old access point through the original configuration information, a random number can be acquired.
The random number may be generated in real time or generated by other methods, and this exemplary embodiment is not particularly limited thereto.
And encrypting the target configuration information by using the original password and the random number to obtain encrypted configuration information, and sending the encrypted configuration information and the random number to the terminal equipment in the offline terminal list, so that the terminal equipment in the offline terminal list is associated with a new access point according to the target configuration information obtained by decrypting the encrypted configuration information.
After the random number is acquired, the target configuration information may be encrypted using the original password and the random number.
Specifically, the encryption processing of the target configuration information by the original password and the random number may be implemented by a DES encryption algorithm.
After DES encryption processing is carried out on the target configuration information by using the original password and the random number, corresponding encryption configuration information can be obtained.
After the encryption configuration information is obtained, the encryption configuration information and the random number may be sent to the terminal device in the offline terminal list through the air interface.
After the terminal device in the offline terminal list receives the encrypted configuration information and the random number, the terminal device may decrypt the encrypted configuration information using the original password and the random number to obtain the target configuration information. Further, the target configuration information is used to associate with the new access point.
Based on this, the AP side can maintain a terminal list, which is an online terminal list and an offline terminal list, respectively, and update in real time.
And when the terminal equipment associated with the wireless access point is in an online state, generating an online terminal list according to the terminal equipment.
When the terminal device is associated to the wireless access point, the terminal list maintenance module at one side of the wireless access point can maintain the online and offline terminal list.
When it is checked that a terminal device associated with the wireless access point is online, the terminal device is added to the online terminal list.
And when the terminal equipment associated with the wireless access point is in an off-line state, generating an off-line terminal list according to the terminal equipment.
When the terminal device is associated to the wireless access point, the terminal list maintenance module at one side of the wireless access point can maintain the online and offline terminal list.
When it is checked that the terminal device associated to the radio access point is not on-line, i.e. off-line, the terminal device is added to the off-line terminal list. The offline terminal list may be a history list.
The wireless access information is modified at the AP side, wherein the original password can be modified by using the target password, or the original service set identifier and the original password can be modified by using the target service set identifier and the target password respectively.
The AP side does not directly change the configuration of the original wireless access point, but opens the new access point according to the new target configuration information, and starts the wireless configuration updating process of the terminal equipment in the online terminal list and the offline terminal list. After the wireless configuration automatic updating process is completed, the old access point is closed.
And acquiring a random number corresponding to the wireless access point, and encrypting the target configuration information by using the original password and the random number to obtain encrypted configuration information.
The random number may be generated in real time or generated by other methods, and this exemplary embodiment is not particularly limited thereto.
After the random number is acquired, the target configuration information may be encrypted using the original password and the random number.
Specifically, the encryption processing of the target configuration information by the original password and the random number may be implemented by a DES encryption algorithm.
For the automatic update of the wireless configuration of the terminal equipment in the online terminal list, the AP side uses the DES encryption algorithm to encrypt the new target configuration information, the first bits of the required 56-bit key may be the original password, and the remaining bits are a random number, for example, 8-bit original password + 48-bit random number.
Then, the random number and the encryption configuration information are multicast-transmitted to the online STA according to the online terminal list. Specifically, the encryption configuration information and the random number are sent to the terminal device in the online terminal list through the air interface.
After the STA in the online terminal list receives the random number and the encryption configuration information, the STA may encrypt the random number and the encryption configuration information in combination with the original password to obtain the target configuration information. Further, the target configuration information is used to associate with the new access point.
And when the terminal equipment in the online terminal list successfully associates the new access point, the AP side removes the STA from the online terminal list.
Specifically, the terminal device in the online terminal list calls the configuration storage module to store the target configuration information. In addition, the wireless access point marks the STA to complete the configuration update and removes the STA from the list of online terminals.
And, the process is repeated until all terminal devices in the online terminal list access the new access point.
For the automatic update of the wireless configuration of the terminal devices in the offline terminal list, an update time limit for the offline update may be set. The updating time limit is the realization of automatically updating the access configuration of the terminal equipment in the set off-line terminal list. Also, the update time limit may be determined in consideration of sleep periods of IoT devices within the network.
And when the updating time limit is reached, waiting for the terminal equipment in the offline terminal list to be online.
And when the terminal equipment in the offline terminal list is on line within the updating time limit and the old access point corresponding to the new access point is associated by using the original configuration information, acquiring the random number corresponding to the wireless access point.
When the terminal devices in the offline terminal list come on line within the update time limit and are associated with the old access point through the original configuration information, a random number can be acquired.
The random number may be generated in real time or generated by other methods, and this exemplary embodiment is not particularly limited thereto.
And encrypting the target configuration information by using the original password and the random number to obtain encrypted configuration information, and sending the encrypted configuration information and the random number to the terminal equipment in the offline terminal list, so that the terminal equipment in the offline terminal list is associated with a new access point according to the target configuration information obtained by decrypting the encrypted configuration information.
After the random number is acquired, the target configuration information may be encrypted using the original password and the random number.
Specifically, the encryption processing of the target configuration information by the original password and the random number may be implemented by a DES encryption algorithm.
After DES encryption processing is carried out on the target configuration information by using the original password and the random number, corresponding encryption configuration information can be obtained.
After the encryption configuration information is obtained, the encryption configuration information and the random number may be sent to the terminal device in the offline terminal list point to point through an air interface.
After the terminal device in the offline terminal list receives the encrypted configuration information and the random number, the terminal device may decrypt the encrypted configuration information using the original password and the random number to obtain the target configuration information. Further, the target configuration information is used to associate with the new access point.
When the terminal device in the offline terminal list is successfully associated with the new access point, the AP side may remove the terminal device from the offline terminal list. And repeating the process until the terminal devices in the offline terminal list are all accessed to the new access point or the update time limit of offline update is reached.
When the terminal device in the offline terminal list reaches or exceeds the update time limit, the terminal device needs to be manually associated to a new access point.
The method for processing the configuration information in the application scenario includes different processes applicable to the online terminal and the offline terminal, and is therefore applicable to the internet of things scenario, as well as to a common home or other conventional scenarios, which is not particularly limited in this exemplary embodiment.
When the method for processing the configuration information in the application scene is applied to a home WLAN scene, the configuration information of wireless access configuration can be automatically updated, the complexity of updating the configuration information of wireless access by Internet of things equipment is reduced, and the access of terminals of old people and children in the home WLAN scene is facilitated, so that the password changing frequency of the WLAN is improved, and the safety of the WLAN in the home scene is also improved.
According to the method for processing the configuration information in the application scene, the original configuration information is uniformly and automatically updated by using the target configuration information, the complexity of changing the wireless access configuration information by the Internet of things equipment and other terminal equipment is reduced, the terminal access process in a household scene and other scenes is facilitated, the frequency of updating the configuration information by the wireless local area network is further improved, the safety of the wireless local area network is improved, and the reflux degree of a user is improved to a certain extent.
Fig. 10 shows a schematic structural diagram of a configuration information processing apparatus, and as shown in fig. 10, the configuration information processing apparatus 1000 may include: a terminal determination module 1010, a configuration modification module 1020, and a configuration update module 1030. Wherein:
a terminal determining module 1010 configured to determine a terminal device associated with the wireless access point and obtain original configuration information of the terminal device;
a configuration modification module 1020 configured to, when target configuration information is obtained, start a new access point at the wireless access point using the target configuration information;
a configuration updating module 1030 configured to update the original configuration information of the terminal device with the target configuration information, so that the terminal device associates with the new access point.
In an exemplary embodiment of the invention, after the determining the terminal device associated with the wireless access point, the method further comprises:
when the terminal equipment associated with the wireless access point is in an online state, generating an online terminal list according to the terminal equipment;
and when the terminal equipment associated with the wireless access point is in an off-line state, generating an off-line terminal list according to the terminal equipment.
In one exemplary embodiment of the present invention, the original configuration information includes an original service set identification and an original password, the target configuration information includes a target service set identification and a target password,
when the target configuration information is obtained, starting a new access point at the wireless access point by using the target configuration information, including:
when the original password is modified by the target password, a new access point is opened at the wireless access point by the target configuration information;
and when the original service set identification and the original password are respectively modified by using the target service set identification and the target password, starting a new access point at the wireless access point by using the target configuration information.
In an exemplary embodiment of the present invention, the updating the original configuration information of the terminal device by using the target configuration information to enable the terminal device to associate with the new access point includes:
acquiring a random number corresponding to the wireless access point, and encrypting the target configuration information by using the original password and the random number to obtain encrypted configuration information;
and sending the encrypted configuration information and the random number to terminal equipment in the online terminal list so that the terminal equipment in the online terminal list is associated with the new access point according to the target configuration information after the encrypted configuration information is decrypted.
In an exemplary embodiment of the invention, the method further comprises:
and when the terminal equipment in the online terminal list is successfully associated with the new access point, removing the terminal equipment in the online terminal list from the online terminal list.
In an exemplary embodiment of the invention, the method further comprises:
and when the terminal equipment in the online terminal list fails to associate the new access point according to the target configuration information, the encryption configuration information is sent to the terminal equipment in the online terminal list again.
In an exemplary embodiment of the present invention, the updating the original configuration information of the terminal device by using the target configuration information to enable the terminal device to associate with the new access point includes:
acquiring an updating time limit corresponding to the terminal equipment in the offline terminal list;
when the terminal equipment in the offline terminal list is on-line in the updating time limit and the original configuration information is used for associating with the old access point corresponding to the new access point, acquiring the random number corresponding to the wireless access point;
and encrypting the target configuration information by using the original password and the random number to obtain encrypted configuration information, and sending the encrypted configuration information and the random number to terminal equipment in the offline terminal list, so that the terminal equipment in the offline terminal list is associated with the new access point according to the target configuration information after decrypting the encrypted configuration information.
The details of the configuration information processing apparatus 1000 are already described in detail in the corresponding configuration information processing method, and therefore are not described herein again.
It should be noted that although several modules or units of the processing device 1000 of configuration information are mentioned in the above detailed description, such division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
In addition, in an exemplary embodiment of the present disclosure, an electronic device capable of implementing the above method is also provided.
An electronic device 1100 according to such an embodiment of the invention is described below with reference to fig. 11. The electronic device 1100 shown in fig. 11 is only an example and should not bring any limitations to the function and the scope of use of the embodiments of the present invention.
As shown in fig. 11, electronic device 1100 is embodied in the form of a general purpose computing device. The components of the electronic device 1100 may include, but are not limited to: the at least one processing unit 1110, the at least one memory unit 1120, a bus 1130 connecting different system components (including the memory unit 1120 and the processing unit 1110), and a display unit 1140.
Wherein the storage unit stores program code that is executable by the processing unit 1110 to cause the processing unit 1110 to perform steps according to various exemplary embodiments of the present invention as described in the above section "exemplary methods" of the present specification.
The storage unit 1120 may include readable media in the form of volatile storage units, such as a random access memory unit (RAM)1121 and/or a cache memory unit 1122, and may further include a read-only memory unit (ROM) 1123.
The storage unit 1120 may also include a program/utility 1124 having a set (at least one) of program modules 1125, such program modules 1125 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 1130 may be representative of one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 1100 may also communicate with one or more external devices 1300 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 1100, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 1100 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 1150. Also, the electronic device 1100 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the internet) via the network adapter 1160. As shown, the network adapter 1160 communicates with the other modules of the electronic device 1100 over the bus 1130. It should be appreciated that although not shown, other hardware and/or software modules may be used in conjunction with the electronic device 1100, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a terminal device, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
In an exemplary embodiment of the present disclosure, there is also provided a computer-readable storage medium having stored thereon a program product capable of implementing the above-described method of the present specification. In some possible embodiments, aspects of the invention may also be implemented in the form of a program product comprising program code means for causing a terminal device to carry out the steps according to various exemplary embodiments of the invention described in the above-mentioned "exemplary methods" section of the present description, when said program product is run on the terminal device.
Referring to fig. 12, a program product 1200 for implementing the above method according to an embodiment of the present invention is described, which may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product of the present invention is not limited in this regard and, in the present document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
A computer readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (10)

1. A method for processing configuration information, which is applied to a wireless access point, the method comprising:
determining terminal equipment associated with the wireless access point, and acquiring original configuration information of the terminal equipment;
when target configuration information is acquired, a new access point is started at the wireless access point by using the target configuration information;
and updating the original configuration information of the terminal equipment by using the target configuration information so as to enable the terminal equipment to be associated with the new access point.
2. The method for processing configuration information according to claim 1, wherein after said determining the terminal device associated with the wireless access point, the method further comprises:
when the terminal equipment associated with the wireless access point is in an online state, generating an online terminal list according to the terminal equipment;
and when the terminal equipment associated with the wireless access point is in an off-line state, generating an off-line terminal list according to the terminal equipment.
3. The method of claim 2, wherein the original configuration information comprises an original service set identifier and an original password, and the target configuration information comprises a target service set identifier and a target password,
when the target configuration information is obtained, starting a new access point at the wireless access point by using the target configuration information, including:
when the original password is modified by the target password, a new access point is opened at the wireless access point by the target configuration information;
and when the original service set identification and the original password are respectively modified by using the target service set identification and the target password, starting a new access point at the wireless access point by using the target configuration information.
4. The method for processing the configuration information according to claim 3, wherein the updating the original configuration information of the terminal device with the target configuration information to enable the terminal device to associate with the new access point comprises:
acquiring a random number corresponding to the wireless access point, and encrypting the target configuration information by using the original password and the random number to obtain encrypted configuration information;
and sending the encrypted configuration information and the random number to terminal equipment in the online terminal list so that the terminal equipment in the online terminal list is associated with the new access point according to the target configuration information after the encrypted configuration information is decrypted.
5. The method for processing configuration information according to claim 3, wherein the method further comprises:
and when the terminal equipment in the online terminal list is successfully associated with the new access point, removing the terminal equipment in the online terminal list from the online terminal list.
6. The method for processing configuration information according to claim 3, wherein the method further comprises:
and when the terminal equipment in the online terminal list fails to associate the new access point according to the target configuration information, the encryption configuration information is sent to the terminal equipment in the online terminal list again.
7. The method for processing the configuration information according to claim 3, wherein the updating the original configuration information of the terminal device with the target configuration information to enable the terminal device to associate with the new access point comprises:
acquiring an updating time limit corresponding to the terminal equipment in the offline terminal list;
when the terminal equipment in the off-line terminal list is on-line in the updating time limit and the original configuration information is used for associating the old access point corresponding to the new access point, acquiring a random number corresponding to the wireless access point;
and encrypting the target configuration information by using the original password and the random number to obtain encrypted configuration information, and sending the encrypted configuration information and the random number to terminal equipment in the offline terminal list, so that the terminal equipment in the offline terminal list is associated with the new access point according to the target configuration information after decrypting the encrypted configuration information.
8. An apparatus for processing configuration information, applied to a wireless access point, includes:
a terminal determining module configured to determine a terminal device associated with the wireless access point and acquire original configuration information of the terminal device;
the configuration modification module is configured to utilize the target configuration information to start a new access point at the wireless access point when the target configuration information is acquired;
a configuration update module configured to update original configuration information of the terminal device with the target configuration information to associate the terminal device with the new access point.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the method of processing configuration information according to any one of claims 1 to 7.
10. An electronic device, comprising:
a processor;
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the method of processing configuration information of any one of claims 1-7 via execution of the executable instructions.
CN202111543627.8A 2021-12-16 2021-12-16 Configuration information processing method and device, storage medium and electronic equipment Pending CN114189859A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111543627.8A CN114189859A (en) 2021-12-16 2021-12-16 Configuration information processing method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111543627.8A CN114189859A (en) 2021-12-16 2021-12-16 Configuration information processing method and device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN114189859A true CN114189859A (en) 2022-03-15

Family

ID=80544184

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111543627.8A Pending CN114189859A (en) 2021-12-16 2021-12-16 Configuration information processing method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN114189859A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7636338B1 (en) * 2004-07-09 2009-12-22 Marvell International Ltd. Access point configuration
CN107135529A (en) * 2017-04-27 2017-09-05 深圳市友华通信技术有限公司 Realize the method that AP and STA connects simultaneously synchronous AP configuration modifications automatically
CN110460995A (en) * 2018-05-07 2019-11-15 中国移动通信有限公司研究院 A kind of wireless connection method, internet of things equipment and client device
CN111356149A (en) * 2018-12-24 2020-06-30 中兴通讯股份有限公司 Wireless network configuration method and device
CN113660661A (en) * 2020-04-28 2021-11-16 华为技术有限公司 Modification method of terminal network configuration and related equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7636338B1 (en) * 2004-07-09 2009-12-22 Marvell International Ltd. Access point configuration
CN107135529A (en) * 2017-04-27 2017-09-05 深圳市友华通信技术有限公司 Realize the method that AP and STA connects simultaneously synchronous AP configuration modifications automatically
CN110460995A (en) * 2018-05-07 2019-11-15 中国移动通信有限公司研究院 A kind of wireless connection method, internet of things equipment and client device
CN111356149A (en) * 2018-12-24 2020-06-30 中兴通讯股份有限公司 Wireless network configuration method and device
CN113660661A (en) * 2020-04-28 2021-11-16 华为技术有限公司 Modification method of terminal network configuration and related equipment

Similar Documents

Publication Publication Date Title
US8208455B2 (en) Method and system for transporting configuration protocol messages across a distribution system (DS) in a wireless local area network (WLAN)
US9479935B2 (en) Configurator forced client network rejoining
CN110798833B (en) Method and device for verifying user equipment identification in authentication process
JP4299102B2 (en) Wireless network handoff encryption key
EP1484856A1 (en) The method for distributes the encrypted key in wireless lan
CN106921963A (en) A kind of smart machine accesses the method and device of WLAN
WO2019004929A2 (en) Network slice allocation method, device and system
US7653036B2 (en) Method and system for automatic registration security
US11871223B2 (en) Authentication method and apparatus and device
KR20090115292A (en) Method and apparatus for setting wireless LAN using button
CN113543126B (en) Key obtaining method and device
CN109479193B (en) Communication system, subscriber information management device, information acquisition method, non-transitory computer-readable medium, and communication terminal
CN105636040A (en) Device networking method and system
JP2012134703A (en) Wireless lan connection method, wireless lan client, and wireless lan access point
EP3637815A1 (en) Data transmission method, and device and system related thereto
US20060039305A1 (en) Method and system for EAP encapsulation exchange for a setup configuration protocol in a WLAN
JP4659864B2 (en) Communication system, authentication server, and communication method
CN108834143B (en) Network expansion method, terminal and system
US20110314136A1 (en) Method and System for Improved Communication Network Setup
JP5721183B2 (en) Wireless LAN communication system, wireless LAN base unit, communication connection establishment method, and program
US20130191635A1 (en) Wireless authentication terminal
KR101500118B1 (en) Data sharing method and data sharing system
KR20240002666A (en) Method, system and non-transitory computer-readable recording medium for providing messenger service
CN114189859A (en) Configuration information processing method and device, storage medium and electronic equipment
CN110896683A (en) Data protection method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination