CN117580035A - Random MAC wireless access method, equipment and storage medium - Google Patents

Random MAC wireless access method, equipment and storage medium Download PDF

Info

Publication number
CN117580035A
CN117580035A CN202311390121.7A CN202311390121A CN117580035A CN 117580035 A CN117580035 A CN 117580035A CN 202311390121 A CN202311390121 A CN 202311390121A CN 117580035 A CN117580035 A CN 117580035A
Authority
CN
China
Prior art keywords
key
binding
cloud platform
connection request
sta
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311390121.7A
Other languages
Chinese (zh)
Inventor
周曦
王玉琪
赵松
罗大洪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Xingwang Intelligent Technology Co ltd
Original Assignee
Fujian Xingwang Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Xingwang Intelligent Technology Co ltd filed Critical Fujian Xingwang Intelligent Technology Co ltd
Priority to CN202311390121.7A priority Critical patent/CN117580035A/en
Publication of CN117580035A publication Critical patent/CN117580035A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/622Layer-2 addresses, e.g. medium access control [MAC] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a random MAC wireless access method, equipment and a storage medium, comprising the following steps: the STA terminal starts a random MAC function and initiates a wireless connection request to the AP; the AP judges whether the key in the received wireless connection request is contained in a binding relation table or not; if yes, judging whether the corresponding relation between the MAC address and the secret key accords with the binding relation table, if so, allowing access, and if not, refusing access; if not, judging whether the key is included in the first group key, if not, rejecting access, and if so, allowing access. The invention can realize the automatic binding of the MAC address and the secret key of the STA terminal during wireless networking, does not need an administrator to manually add the MAC address of the user terminal, and can still enable the AP to realize the one-machine one-secret networking verification function when the STA terminal is connected with the AP by adopting the random MAC address.

Description

Random MAC wireless access method, equipment and storage medium
Technical Field
The application relates to the technical field of wireless networks, in particular to a random MAC wireless access method, equipment and a storage medium.
Background
In the wireless networking technology, when a conventional one-machine-one-pad function of wireless networking is used, it is necessary to collect and configure MAC addresses of all wireless STA terminals to be connected to an AP device side, and bind a key for authentication of wireless connection for each MAC address. For example, when a new user terminal (STA terminal) is to access an AP that currently turns on the "one-machine-one-secret" function, firstly, an administrator needs to know the MAC address of the user terminal to be accessed, assign a random key to the MAC address, and then add the corresponding entry to the configuration of the AP device. However, if the user terminal itself adopts a random MAC address when connecting to wireless, the administrator cannot know the MAC address to be adopted when connecting to the AP, so the one-machine-one-secret function of the AP device cannot be used normally.
Therefore, the existing function of "one-machine-one-secret" at the AP device end has two drawbacks, namely, the MAC address of each STA terminal needs to be collected, and for the newly added terminal device needing to be connected, the MAC address is firstly queried and a key binding is added for the newly added terminal device. Secondly, the wireless terminal devices such as mobile phones and the like in the market at present support random MAC, and the MAC address is not fixed when the wireless connection is established with the AP, so that a corresponding secret key is not bound for the wireless terminal devices, and the function of one machine and one secret cannot be normally used.
Disclosure of Invention
In view of the above problems, the present application provides a random MAC wireless access method, a device, and a storage medium, which are used to solve the technical problem that the AP device cannot support one-machine one-secret networking when it has a random MAC address.
To achieve the above object, the present inventors provide a random MAC wireless access method, which includes the steps of:
distributing a first group of keys of unbound MAC addresses to more than two APs through a cloud platform;
the STA terminal starts a random MAC function and initiates a wireless connection request to the AP, wherein the wireless connection request comprises a random MAC address and a secret key;
the AP judges whether the key in the received wireless connection request is contained in a binding relation table, wherein the binding relation table stores an MAC address and a corresponding binding key;
if the key is included in the binding relation table, judging whether the corresponding relation between the MAC address and the key in the wireless connection request is consistent with the binding relation table, if so, allowing the STA terminal to access wirelessly, and if not, rejecting the STA terminal to access wirelessly;
if the key is not included in the binding relation table, judging whether the key in the wireless connection request is included in the first group key, if not, rejecting wireless access of the STA terminal, and if so, allowing wireless access of the STA terminal, and binding the MAC address in the wireless connection request with the key.
Further, the method further comprises the steps of:
the AP uploads the newly added binding to the cloud platform, the cloud platform updates the binding relation table according to the newly added binding, and the updated binding relation table is issued to each AP.
Further, the method further comprises the steps of:
when restarting or reconnecting the AP to the cloud platform, the AP actively acquires the binding relation table from the cloud platform.
Further, the cloud platform is a SIWO cloud platform, and an encryption protocol which interacts with the AP is built in the SIWO cloud platform and passes through the encryption protocol; and the first group key and the binding relation table are issued to each AP through the encryption protocol.
Further, the STA terminal includes: any one or more of a computer, a smart phone, a smart bracelet and a PDA.
In order to solve the technical problems, the present application further provides another technical scheme:
a random MAC wireless access device, configured to manage STA terminals in a wireless network, obtain a first set of keys of unbound MAC addresses, distribute the first set of keys to the STA terminals, and when a wireless connection request of the STA terminals is received, determine whether the keys in the received wireless connection request are included in a binding relationship table, where the binding relationship table stores MAC addresses and keys that are bound correspondingly;
if the key is included in the binding relation table, judging whether the corresponding relation between the MAC address and the key in the wireless connection request is consistent with the binding relation table, if so, allowing the STA terminal to access wirelessly, and if not, rejecting the STA terminal to access wirelessly;
if the key is not included in the binding relation table, judging whether the key in the wireless connection request is included in the first group key, if not, rejecting wireless access of the STA terminal, and if so, allowing wireless access of the STA terminal, and binding the MAC address in the wireless connection request with the key.
Further, the binding method is also used for uploading the newly added binding to the cloud platform, receiving the binding relation table updated by the cloud platform, or updating the binding relation table according to the newly added binding content issued by the cloud platform.
Further, when restarting or reconnecting the cloud platform, the binding relation table is actively acquired from the cloud platform.
Further, the STA terminal includes: any one or more of a computer, a smart phone, a smart bracelet and a PDA.
In order to solve the technical problems, the present application further provides another technical scheme:
a computer readable storage medium having stored therein a computer program which, when executed, performs the random MAC radio access method according to any one of the above aspects.
In the technical scheme, the AP judges whether the key in the received wireless connection request is contained in a binding relation table, wherein the binding relation table stores an MAC address and a corresponding binding key;
if the key is included in the binding relation table, judging whether the corresponding relation between the MAC address and the key in the wireless connection request is consistent with the binding relation table, if so, allowing the STA terminal to access wirelessly, and if not, rejecting the STA terminal to access wirelessly;
if the key is not included in the binding relation table, judging whether the key in the wireless connection request is included in the first group key, if not, rejecting wireless access of the STA terminal, and if so, allowing wireless access of the STA terminal, and binding the MAC address in the wireless connection request with the key. Therefore, the technical scheme can realize the automatic binding of the MAC address and the secret key of the STA terminal during wireless networking, an administrator is not required to manually add the MAC address of the user terminal, and when the STA terminal is connected with the AP by adopting the random MAC address, the AP can still enable the one-machine one-secret networking verification function.
The foregoing summary is merely an overview of the present application, and is provided to enable one of ordinary skill in the art to make more clear the present application and to be practiced according to the teachings of the present application and to make more readily understood the above-described and other objects, features and advantages of the present application, as well as by reference to the following detailed description and accompanying drawings.
Drawings
The drawings are only for purposes of illustrating the principles, implementations, applications, features, and effects of the present invention and are not to be construed as limiting the application.
In the drawings of the specification:
fig. 1 is a flowchart of a random MAC radio access method according to an embodiment;
fig. 2 is a schematic diagram of a wireless network according to an embodiment;
FIG. 3 is a flowchart of updating a binding table according to an embodiment;
fig. 4 is a schematic diagram of a random MAC wireless access device according to an embodiment;
FIG. 5 is a schematic diagram of a computer-readable storage medium according to an embodiment;
reference numerals referred to in the above drawings are explained as follows:
400. a random MAC radio access device; 500. a computer-readable storage medium;
Detailed Description
In order to describe the possible application scenarios, technical principles, practical embodiments, and the like of the present application in detail, the following description is made with reference to the specific embodiments and the accompanying drawings. The embodiments described herein are only used to more clearly illustrate the technical solutions of the present application, and are therefore only used as examples and are not intended to limit the scope of protection of the present application.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the present application. The appearances of the phrase "in various places in the specification are not necessarily all referring to the same embodiment, nor are they particularly limited to independence or relevance from other embodiments. In principle, in the present application, as long as there is no technical contradiction or conflict, the technical features mentioned in the embodiments may be combined in any manner to form a corresponding implementable technical solution.
Unless defined otherwise, technical terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which the present application pertains; the use of related terms herein is for the description of specific embodiments only and is not intended to limit the present application.
In the description of the present application, the term "and/or" is a representation for describing a logical relationship between objects, which means that there may be three relationships, e.g., a and/or B, representing: there are three cases, a, B, and both a and B. In addition, the character "/" herein generally indicates that the front-to-back associated object is an "or" logical relationship.
In this application, terms such as "first" and "second" are used merely to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply any actual number, order, or sequence of such entities or operations.
Without further limitation, the use of the terms "comprising," "including," "having," or other like open-ended terms in this application are intended to cover a non-exclusive inclusion, such that a process, method, or article of manufacture that comprises a list of elements does not include additional elements in the process, method, or article of manufacture, but may include other elements not expressly listed or inherent to such process, method, or article of manufacture.
As in the understanding of the "examination guideline," the expressions "greater than", "less than", "exceeding", and the like are understood to exclude the present number in this application; the expressions "above", "below", "within" and the like are understood to include this number. Furthermore, in the description of the embodiments of the present application, the meaning of "a plurality of" is two or more (including two), and similarly, the expression "a plurality of" is also to be understood as such, for example, "a plurality of groups", "a plurality of" and the like, unless specifically defined otherwise.
In the description of the embodiments of the present application, spatially relative terms such as "center," "longitudinal," "transverse," "length," "width," "thickness," "up," "down," "front," "back," "left," "right," "vertical," "horizontal," "vertical," "top," "bottom," "inner," "outer," "clockwise," "counter-clockwise," "axial," "radial," "circumferential," etc., are used herein as terms of orientation or positional relationship based on the specific embodiments or figures, and are merely for convenience of description of the specific embodiments of the present application or ease of understanding of the reader, and do not indicate or imply that the devices or components referred to must have a particular position, a particular orientation, or be configured or operated in a particular orientation, and therefore are not to be construed as limiting of the embodiments of the present application.
Unless specifically stated or limited otherwise, in the description of the embodiments of the present application, the terms "mounted," "connected," "affixed," "disposed," and the like are to be construed broadly. For example, the "connection" may be a fixed connection, a detachable connection, or an integral arrangement; the device can be mechanically connected, electrically connected and communicated; it can be directly connected or indirectly connected through an intermediate medium; which may be a communication between two elements or an interaction between two elements. The specific meanings of the above terms in the embodiments of the present application can be understood by those skilled in the art to which the present application pertains according to the specific circumstances.
In the related art, when STA terminals of a wireless network are networked, only a fixed MAC address AP can perform "one-machine-one-secret" networking authentication, and when STA terminals employ a random MAC address, the AP cannot perform the networking authentication by using the "one-machine-one-secret" function. And when the STA terminals are networked, an administrator is required to manually collect the MAC addresses of all the STA terminals, and the MAC addresses and the secret keys are configured at the AP end.
In view of the above technical problems, the present embodiment provides a random MAC wireless access method, so that when an STA terminal adopts a random MAC address, an AP may still use a one-machine-one-secret function to perform network authentication, and no MAC address configuration needs to be manually performed at the AP terminal. The random MAC wireless access method can be suitable for STA terminal access management in various wireless networks. The AP is a wireless access point, and is mainly used for connecting a bridge of a wireless network and a wired network, and is a key of a mobile computer user to enter the wired network; an AP is a typical application of a wireless local area network, and is mainly a bridge that provides mutual access between a wireless workstation and a wired local area network.
STA terminals, also called STA stations, refer to each terminal (e.g., notebook computers, PDAs, and other networked user devices) connected to a wireless network. The STA terminal is generally a client in the WLAN, and may be a computer with a wireless network card or a smart phone with a WiFi module. The STA may be mobile or stationary.
Referring to fig. 1, a flowchart of a random MAC radio access method according to the present embodiment is shown. The random MAC wireless access method comprises the following steps:
s101, distributing a first group of keys of unbound MAC addresses to more than two APs through a cloud platform;
s102, a STA terminal starts a random MAC function and initiates a wireless connection request to the AP, wherein the wireless connection request comprises a random MAC address and a secret key;
s103, the AP judges whether the key in the received wireless connection request is contained in a binding relation table, wherein the binding relation table stores an MAC address and a corresponding binding key;
if the key is included in the binding relation table, step S104 is executed to determine whether the corresponding relation between the MAC address in the wireless connection request and the key is consistent with the binding relation table, if so, the wireless access of the STA terminal is allowed, and if not, the wireless access of the STA terminal is denied;
if the key is not included in the binding relationship table, step S105 is executed to determine whether the key in the wireless connection request is included in the first group key, if not, wireless access of the STA terminal is denied, and if so, wireless access of the STA terminal is allowed, and the MAC address in the wireless connection request and the key are bound.
In step S102, when the random MAC function is turned on, the STA terminal randomly generates a new MAC address each time it connects to the network, and privacy protection can be improved by using the random MAC address, because a new MAC address is generated each time it connects to the network, and tracking can be avoided.
As shown in fig. 2, a plurality of APs are communicatively connected to a cloud platform, through which the plurality of APs can be managed and configured simultaneously. And the STA terminal sends a wireless connection request to a nearby AP when networking, the AP verifies the wireless connection request of the STA terminal (namely, performs one-machine one-secret verification), and the STA terminal can perform wireless networking after the verification is passed.
As shown in fig. 3, in the above embodiment, the random MAC radio access method further includes the steps of:
s301, the AP uploads the newly added binding to the cloud platform; s302, the cloud platform updates the binding relation table according to the newly added binding; s303, the cloud platform issues the updated binding relation table to each AP.
Therefore, in this embodiment, when an AP connects a new STA terminal conforming to the one-machine-one-secret authentication, the cloud platform may bind the MAC address of the newly connected STA terminal with the corresponding key, so that each AP may update the binding relationship table in time, and thus when the STA terminal accesses next time, one-machine-one-machine authentication can be performed on the STA terminal through the binding relationship table.
In some embodiments, in order to enable the AP to timely acquire the updated binding relationship table, the method further includes the steps of:
when restarting or reconnecting the AP to the cloud platform, the AP actively acquires the binding relation table from the cloud platform.
In the foregoing embodiment, the cloud platform may be a SINWO cloud platform, where an encryption protocol that interacts with the AP is built in the SINWO cloud platform, and the encryption protocol is passed through the SINWO cloud platform; and the first group key and the binding relation table are issued to each AP through the encryption protocol. The SIWO cloud platform is a platform for unified cloud management of network equipment (AC, AP) provided by Fujian star network intelligent technology limited company, and can independently develop work such as service opening configuration, daily operation and maintenance in a multi-tenant network, so that automatic deployment, service issuing and monitoring operation and maintenance of a wireless network are realized. The cloud management is carried out through the SIWO cloud platform, the wireless network can be managed anytime and anywhere through the Internet, the operation data is checked in a concentrated mode, and the network deployment and operation and maintenance cost is greatly reduced. In other embodiments, other cloud platforms that can perform encrypted transmissions with the AP may also be employed. For example, in some embodiments, a agreed encryption protocol may be added to each of the ali cloud platform and the AP, and the ali cloud platform and the AP perform transmission of the first set of keys and the binding table through the agreed encryption protocol.
In the above embodiment, the STA terminal includes: any one or more of a computer, a smart phone, a smart bracelet and a PDA. The STA terminal may be a computer with a wireless network card, or may be a smart phone with a WiFi module. The STA may be mobile or stationary.
Referring to fig. 2, the following steps of the random MAC radio access method in an embodiment are as follows:
1. the administrator adds a set of wireless connection keys (i.e., a first set of keys) to the SINWO cloud platform that do not contain a MAC.
2. The SINWO cloud platform issues a set of keys (i.e. the first set of keys) that do not contain a MAC address to the APs of the same network.
3. The STA terminal acquires a group of unused wireless connection keys from an administrator, starts a random MAC function, initiates a wireless connection request to an AP, wherein the wireless connection request comprises a randomly generated MAC address and a key; when the randomly generated MAC address is an unused MAC address, the STA terminal selects a key from the first group of keys as a key corresponding to the MAC address when making a wireless connection request.
4. When receiving the wireless connection request, the AP searches whether the wireless key (i.e. the binding relationship table) issued by the SINWO cloud platform contains the wireless key corresponding to the MAC address according to the MAC address in the wireless connection request of the STA terminal. The SIWO cloud platform issues two wireless keys, one is a first group of keys with unbound MAC addresses, the other is a second group of keys with corresponding MAC addresses bound to each key, and the second group of keys comprises the binding relation table, namely which MAC address is bound to which corresponding key. In this embodiment, the AP first looks up the key in the wireless connection request in the binding table (i.e., in the second set of keys).
(1) If so, comparing the key corresponding to the MAC address with the key when the STA terminal is accessed, if so, allowing the STA terminal to be accessed, and if not, rejecting the STA terminal to be accessed.
(2) If not, comparing the key of the STA terminal in the wireless connection request with the key (namely the first group key) which does not contain the MAC address in the wireless key issued by the SIWO platform one by one, and if not, rejecting the STA terminal to access. If one group is the same, allowing the STA terminal to access, binding the MAC and the key of the STA terminal, reporting the binding relation to the SIWO cloud platform, updating the binding relation between the local key and the MAC after the SIWO cloud platform receives the binding of the MAC and the key, simultaneously transmitting the MAC and the key to other APs in the same network, and updating a local key MAC binding database after the other APs receive the binding information of the key and the MAC.
5. When the STA connects with other or own AP next time, the step 3 is executed.
6. When the AP is restarted or is connected with the cloud SIWO platform on line again, the key group issued by the SIWO cloud platform comprises the MAC and the key which are bound before.
Therefore, in this embodiment, the automatic binding of the MAC address and the key of the STA terminal during wireless networking can be achieved, without requiring an administrator to manually add the MAC address of the user terminal, and when the STA terminal uses a random MAC address to connect to the AP, the AP can still enable a one-machine one-secret networking authentication function.
As shown in fig. 4, in an embodiment, a random MAC radio access device 400 is provided, where the random MAC radio access device 400 is used to manage STA terminals in a wireless network. The random MAC wireless access device 400 is configured to obtain a first set of keys of an unbound MAC address, distribute the first set of keys to the STA terminal, and when a wireless connection request of the STA terminal is received, determine whether the keys in the received wireless connection request are included in a binding relationship table, where the binding relationship table stores the MAC address and a corresponding bound key;
if the key is included in the binding relation table, judging whether the corresponding relation between the MAC address and the key in the wireless connection request is consistent with the binding relation table, if so, allowing the STA terminal to access wirelessly, and if not, rejecting the STA terminal to access wirelessly;
if the key is not included in the binding relation table, judging whether the key in the wireless connection request is included in the first group key, if not, rejecting wireless access of the STA terminal, and if so, allowing wireless access of the STA terminal, and binding the MAC address in the wireless connection request with the key.
The STA terminal includes: any one or more of a computer, a smart phone, a smart bracelet and a PDA. The STA terminal may be a computer with a wireless network card, or may be a smart phone with a WiFi module. The STA may be mobile or stationary.
In the foregoing embodiment, the cloud platform may be a SINWO cloud platform, where an encryption protocol that interacts with the AP is built in the SINWO cloud platform, and the encryption protocol is passed through the SINWO cloud platform; and the first group key and the binding relation table are issued to each AP through the encryption protocol. In other embodiments, other cloud platforms that can perform encrypted transmissions with the AP may also be employed.
In this embodiment, the automatic binding of the MAC address and the key of the STA terminal during wireless networking can be achieved, without requiring an administrator to manually add the MAC address of the user terminal, and when the STA terminal uses a random MAC address to connect to the AP, the AP may still enable a one-machine one-secret networking authentication function.
In an embodiment, the random MAC wireless access device 400 is further configured to upload the newly added binding to the cloud platform, and receive the binding relationship table updated by the cloud platform, or update the binding relationship table according to newly added binding content issued by the cloud platform.
In an embodiment, when restarting or reconnecting the cloud platform, the binding relationship table is actively acquired from the cloud platform.
Therefore, in this embodiment, when an AP connects a new STA terminal conforming to the one-machine-one-secret authentication, the cloud platform may bind the MAC address of the newly connected STA terminal with the corresponding key, so that each AP may update the binding relationship table in time, and thus when the STA terminal accesses next time, one-machine-one-machine authentication can be performed on the STA terminal through the binding relationship table.
As shown in fig. 5, in an embodiment, a computer readable storage medium 500 is provided, and a computer program is stored in the computer readable storage medium 500, and when the computer program is executed, the random MAC radio access method described in any one of the above embodiments is executed.
Finally, it should be noted that, although the foregoing embodiments have been described in the text and the accompanying drawings of the present application, the scope of the patent protection of the present application is not limited thereby. All technical schemes generated by replacing or modifying equivalent structures or equivalent flows based on the essential idea of the application and by utilizing the contents recorded in the text and the drawings of the application, and the technical schemes of the embodiments are directly or indirectly implemented in other related technical fields, and the like, are included in the patent protection scope of the application.

Claims (10)

1. A random MAC radio access method, comprising the steps of:
distributing a first group of keys of unbound MAC addresses to more than two APs through a cloud platform;
the STA terminal starts a random MAC function and initiates a wireless connection request to the AP, wherein the wireless connection request comprises a random MAC address and a secret key;
the AP judges whether the key in the received wireless connection request is contained in a binding relation table, wherein the binding relation table stores an MAC address and a corresponding binding key;
if the key is included in the binding relation table, judging whether the corresponding relation between the MAC address and the key in the wireless connection request is consistent with the binding relation table, if so, allowing the STA terminal to access wirelessly, and if not, rejecting the STA terminal to access wirelessly;
if the key is not included in the binding relation table, judging whether the key in the wireless connection request is included in the first group key, if not, rejecting wireless access of the STA terminal, and if so, allowing wireless access of the STA terminal, and binding the MAC address in the wireless connection request with the key.
2. The random MAC radio access method as claimed in claim 1, further comprising the step of:
the AP uploads the newly added binding to the cloud platform, the cloud platform updates the binding relation table according to the newly added binding, and the updated binding relation table is issued to each AP.
3. The random MAC radio access method as claimed in claim 2, further comprising the step of:
when restarting or reconnecting the AP to the cloud platform, the AP actively acquires the binding relation table from the cloud platform.
4. The random MAC wireless access method of claim 1, wherein the cloud platform is a SINWO cloud platform, and an encryption protocol that interacts with the AP is built in the SINWO cloud platform and passes through the encryption protocol; and the first group key and the binding relation table are issued to each AP through the encryption protocol.
5. The random MAC radio access method as claimed in claim 1, wherein the STA terminal comprises: any one or more of a computer, a smart phone, a smart bracelet and a PDA.
6. A random MAC wireless access device, configured to manage STA terminals in a wireless network, where a first set of keys for obtaining unbound MAC addresses are distributed to STA terminals, and when a wireless connection request of an STA terminal is received, determine whether the keys in the received wireless connection request are included in a binding relationship table, where the binding relationship table stores MAC addresses and corresponding bound keys;
if the key is included in the binding relation table, judging whether the corresponding relation between the MAC address and the key in the wireless connection request is consistent with the binding relation table, if so, allowing the STA terminal to access wirelessly, and if not, rejecting the STA terminal to access wirelessly;
if the key is not included in the binding relation table, judging whether the key in the wireless connection request is included in the first group key, if not, rejecting wireless access of the STA terminal, and if so, allowing wireless access of the STA terminal, and binding the MAC address in the wireless connection request with the key.
7. The random MAC wireless access device of claim 6, further configured to upload the newly added binding to a cloud platform, and receive the binding table updated by the cloud platform, or update the binding table according to newly added binding content issued by the cloud platform.
8. The random MAC wireless access device of claim 7, wherein the binding relationship table is actively obtained from the cloud platform upon restarting or reconnecting the cloud platform.
9. The random MAC radio access device of claim 6, wherein the STA terminal comprises: any one or more of a computer, a smart phone, a smart bracelet and a PDA.
10. A computer readable storage medium having stored therein a computer program, characterized in that the computer program, when executed, performs the random MAC radio access method of any of claims 1 to 5.
CN202311390121.7A 2023-10-25 2023-10-25 Random MAC wireless access method, equipment and storage medium Pending CN117580035A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311390121.7A CN117580035A (en) 2023-10-25 2023-10-25 Random MAC wireless access method, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311390121.7A CN117580035A (en) 2023-10-25 2023-10-25 Random MAC wireless access method, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117580035A true CN117580035A (en) 2024-02-20

Family

ID=89888931

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311390121.7A Pending CN117580035A (en) 2023-10-25 2023-10-25 Random MAC wireless access method, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117580035A (en)

Similar Documents

Publication Publication Date Title
EP3429274B1 (en) Methods and apparatus to provide network capabilities for connecting to an access network
US8467359B2 (en) Methods and apparatus to authenticate requests for network capabilities for connecting to an access network
US8665842B2 (en) Methods and apparatus to discover network capabilities for connecting to an access network
EP2656265B1 (en) Allocation of application identifiers
CN102970732B (en) Method, system and equipment for wireless local area network (WLAN) sharing authentication
CN103220669A (en) Share method, system, server, terminal and gateway management server of private wireless local area network (WLAN)
CN102075904A (en) Method and device for preventing re-authentication of roaming user
CN102316416A (en) Access method for terminal and wireless communication network
JP2007005892A (en) Information distribution system, information distribution method, wireless lan terminal, information acquisition method of wireless lan terminal, and access point
CN102684966B (en) Equipment method of network entry, Apparatus and system
CN105827463A (en) Method, device and system for configuring business of client
CN104079325B (en) A kind of method of information sharing and electronic equipment
CN117580035A (en) Random MAC wireless access method, equipment and storage medium
US20140357264A1 (en) Method and Arrangement For Connectivity in a Communication Network
CN102740329A (en) Method and apparatus of parameter distribution, and method and apparatus of parameter configuration
CN109246673A (en) A kind of connection method and its system of wireless aps
CN113891291B (en) Service opening method and device
JP2006100970A (en) Communication terminal, wireless lan system, and communication method
CN102045894A (en) Method and device for updating closed subscriber group information (CSG)
EP1521429A1 (en) Delivering additional information needed in connection setup

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination