Embodiment
The embodiment of the invention provides the method for the network equipment and configure network devices, by judging user device type, and different cipher key lifetimes is set according to different user device type, comprise: when described user device type is first device type, the cipher key lifetimes of described subscriber equipment is configured to first cipher key lifetimes; When described user device type is second device type, the cipher key lifetimes of described subscriber equipment is configured to second cipher key lifetimes, second cipher key lifetimes is less than first cipher key lifetimes.This method can be provided with cipher key lifetimes as required more neatly.
For the purpose, technical scheme and the advantage that make the embodiment of the invention more cheer and bright, below with reference to accompanying drawing, the embodiment of the invention is elaborated:
With reference to Fig. 1, be method one flow chart of configure network devices in the embodiment of the invention, below be elaborated by concrete steps:
S101, judgement user device type are long-term connection device or short-term connection device, if long-term connection device, then execution in step S102; If short-term connection device, then execution in step S103;
Specifically can judge by AP or Register.
S102, the cipher key lifetimes of described subscriber equipment is configured to first cipher key lifetimes;
S103, the cipher key lifetimes of described subscriber equipment is configured to second cipher key lifetimes, described second cipher key lifetimes is less than described first cipher key lifetimes.
For user device type in the infrastructure network is that the equipment of long-term connection device should be the long-term member in this network, so the cipher key lifetimes of this subscriber equipment should be long, for example, above-mentioned first cipher key lifetimes can be made as 3 months; And provide short cipher key lifetimes for the short-term connection device of temporary visit infrastructure network, i.e. second cipher key lifetimes, so that under the situation of user's nonintervention, just can make this interim subscriber equipment that adds network can't enter network once more over time automatically, for example can be provided with 4 hours.
For the subscriber equipment in the infrastructure may be long-term member in this network, it also may be the short-term connection device of this network of temporary visit, therefore come to be user device configuration one is long and the other is short two cipher key lifetimes according to these characteristics of subscriber equipment, for user device type is the subscriber equipment of long-term connection device, long cipher key lifetimes is set can be avoided network to remove in the long time and make in the network credential of any two equipment rooms invalid, and make the user have to reconfigure, be user-friendly to, can improve user experience; For user device type is the subscriber equipment of short-term connection device, because cipher key lifetimes is shorter, when network is removed, subscriber equipment is even without the announcement information of receiving that network is removed, equally can make credential invalid because of key is expired at short notice, can not cause producing from being dynamically connected once more between the equipment network security problem.Therefore present embodiment can improve user experience and guarantee network security.
The present inventor finds, under the peer-to-peer network model of interim networking always, as dedicated mode/telecommunication integrated service support system (ad hoc/IBSS, ad hoc/Independent Basic Service Set) under the model, credential between any two equipment should not be permanently effective, under the situation that network is removed, credential between any two equipment of original this network of adding should lose efficacy, and this can receive the notice that network is removed temporarily or detect network voluntarily and delete already present credential information when not existed automatically at equipment.Yet equipment also may detect network and not exist under the situation of interim deviated from network, and need reconfigure when deletion credential information can cause it to get back to network once more automatically this moment, uses inconvenience.And peer-to-peer network generally is made up of handheld devices such as portable terminals, the situation that interim deviated from network of equipment is got back to network then again is easy to take place, therefore the mode that can use the cipher key lifetimes automatically renewed and upgrade automatically is relatively more friendly for the user.Under the situation of using shorter cipher key lifetimes, after network is removed, all devices equally can make credential invalid because of key is expired even without the announcement information of receiving that network is removed at short notice, can not cause producing from being dynamically connected once more between the equipment safety problem.
When specific implementation, can adopt the cipher key lifetimes of button arrangement mode configure user equipment, " long-term connection device " and " short-term connection device " two for example can be set on Register join button, and respectively corresponding one is long and the other is short two default cipher key lifetimes (for example, long-term connection device is 3 months, and the short-term connection device is 3 hours).Long-term member's user presses " long-term connection device " button and carries out the WPS configuration, and the user of short-term connection device presses " short-term connection device " button and carries out the WPS configuration.For different WPS configuration, can adopt different cipher key lifetimes handling processes, below be elaborated with reference to Fig. 2 and Fig. 3 respectively:
With reference to Fig. 2, be the method two flow chart of configure network devices in the embodiment of the invention, when pressing " long-term connection device " button, can be according to steps of processing:
S201, receive and press " long-term connection device " button message;
S202, hold consultation with subscriber equipment, issue credential;
The cipher key lifetimes of S203, configure user equipment is the first cipher key lifetimes LT;
The first for example default cipher key lifetimes is 3 months.
S204, obtain the time status of the first cipher key lifetimes LT;
If the time status of S205, the judgement first cipher key lifetimes LT is first cipher key lifetimes LT timing end, then execution in step S206; If the first cipher key lifetimes LT timing does not finish, then re-execute step S204;
S206, judge whether subscriber equipment is online, if, execution in step S207 then; If not, execution in step 208 then;
S207, new key more, and execution in step S203 automatically;
When subscriber equipment is issued credential, can produce a plurality of netkeys at Register.General only need of subscriber equipment done follow-up network connection with one of them netkey.The way of Register acquiescence is to bring subscriber equipment a netkey in M8 message, and the netkey that has more generally abandons.But Register can be in M8 message brings subscriber equipment 2 or above netkey, and arranges call number to them, and one of them can be as the spare key of new key more automatically.Therefore, if in the EAP negotiations process, preserved backup keys, then can be the negotiation backup keys of preserving in advance with key updating.
S208, startup time-delay (DT, Delay Time) timing, and execution in step S209;
S209, obtain time-delay DT time status;
S210, judge whether the time-delay time status finishes, if, execution in step S211 then; If not, execution in step S212 then;
Credential and process ends that S211, deletion subscriber equipment connect;
S212, judge whether subscriber equipment is got back in the network, if, execution in step S207 then; If not, then re-execute step S209.
As seen, equipment is online when working as the first cipher key lifetimes timing end of being disposed in the present embodiment, perhaps subscriber equipment comes back in the network before the time-delay timing that is provided with finishes, automatically the key that upgrades described subscriber equipment helps maintaining network safety, and just can reconfigure and can add network, therefore relatively friendly to the user.And when the delay time that is provided with finished, the credential that the deletion subscriber equipment connects because the cipher key lifetimes of the subscriber equipment that is provided with is out of date, therefore can guarantee network security.
The cipher key lifetimes that delay time DT represents subscriber equipment postpones to delete automatically the time of the credential of this equipment to after date, by system's setting, be understandable that in the present embodiment, also can be by the User Defined setting, for example, the user is provided with delay time in request temporarily when leaving.Delay time DT specifically can be fixed as the first cipher key lifetimes LT or be 1/2nd of LT, the perhaps twice of LT, also can be by the User Defined setting, the embodiment of the invention is not made concrete regulation, but the inventor thinks should the such value of variation: can avoid belonging to long-term connection equipment credential cipher key lifetimes once overtime cause deleted, have to when networking once more reconfigure, its configuration information of equipment of also avoiding the user to abandon simultaneously for good and all is present in the network.Equipment is reached the standard grade and still can be used former credential to be connected to network before time-delay DT is overtime, but the key in the credential upgraded immediately automatically, if the overtime equipment afterwards of time-delay DT is not still reached the standard grade, then system deletes its configuration information automatically.
The handling process that the cipher key lifetimes of subscriber equipment is configured to the first long cryptographic key existence after date has more than been described, and under the situation for shorter cipher key lifetimes (for example 1 hour), the physical presence of peer-to-peer network may surpass second cipher key lifetimes that is provided with, this moment, key needed to upgrade, if upgrade credential, can make troubles to the user by the mode that reconfigures.In addition, in it leaves the period, may just cross over the original cipher key expiration time point of life cycle, after that time point, cipher key lifetimes is extended because of network exists for subscriber equipment away from keyboard in the peer-to-peer network.Subscriber equipment away from keyboard because think that network has not existed in cipher key lifetimes to the after date credential of deletion and miscellaneous equipment automatically.Equipment in the network interrupts because detect with being connected of equipment away from keyboard, can not upgrade cipher key lifetimes with the credential of equipment away from keyboard, and deleting the dependent credit shape automatically to after date with the cipher key lifetimes of equipment away from keyboard, at this moment, subscriber equipment can not return network, if want to get back to network, must reconfigure, this is friendly inadequately to the user.Followingly describe cipher key lifetimes with subscriber equipment with reference to Fig. 3 and be configured to the second short cryptographic key existence after date and specifically how handle and overcome the above problems:
With reference to Fig. 3, be method three flow charts of configure network devices in the embodiment of the invention, specify the handling process of short-term connection device member cipher key lifetimes:
S301, receive and press " short-term connection device " button message;
S302, hold consultation with subscriber equipment, issue credential;
The cipher key lifetimes of S303, configure user equipment is the second cipher key lifetimes ST;
For example, the second default cipher key lifetimes ST can be set to 3 hours.
S304, obtain the second cipher key lifetimes ST time status;
S305, judge whether the timing of the second cipher key lifetimes ST finishes, if, execution in step S306 then; If not, then re-execute step S304;
S306, judge whether subscriber equipment is online, if, execution in step S307 then; If not, execution in step S310 then;
S307, the cipher key lifetimes that automatically prolongs time are ST;
S308, judge cipher key lifetimes time expand length overall whether greater than the cipher key lifetimes upper limit time (Root Key) that is provided with, if, execution in step S309 then; If not, then re-execute S303;
In concrete the application, cipher key lifetimes upper limit time Root Key can be set to equate that with first cipher key lifetimes user also can be provided with as required voluntarily that as 2 months, the embodiment of the invention was not made concrete regulation.
S309, new key more, and execution in step 302 automatically;
S310, judge whether subscriber equipment has asked to leave temporarily, if, execution in step S311 then; If not, execution in step S312 then;
S311, delay time DT are set to the User Defined value;
The User Defined value is ST in the present embodiment, therefore delay time DT is made as ST, and particular user can carry out the adaptability setting time away from keyboard on the estimation.
S312, delay time DT are set to system default value ST;
S313, obtain the time-delay DT time status;
S314, judge whether the time-delay timing finishes, if, execution in step S315 then; If not, execution in step S316 then;
Credential and process ends that S315, deletion subscriber equipment connect;
S316, judge whether subscriber equipment is got back in the network, if, execution in step S317 then; If not, then re-execute step S313;
S317, use original cipher key reconnect network and execution in step S304.
As seen, because cipher key lifetimes is shorter, so fail safe is higher relatively, and when the second cipher key lifetimes timing finished, if the user is still online, the cipher key lifetimes of the described subscriber equipment that automatically prolongs was simple.And, in order further to improve security performance, the embodiment of the invention provides a cipher key lifetimes upper limit time, be that key can not infinitely prolong, when the cipher key lifetimes time expand length overall of using surpasses the cipher key lifetimes upper limit of this setting during the time, cipher key lifetimes can not prolong again, and new key more.
In concrete the application, in order to guarantee that subscriber equipment holds effective credential, can be in credential be about to lose efficacy the long credential of time delay life cycle of original key, also can in time upgrade the key in the credential automatically, if the latter, then cipher key lifetimes reclocking.
In addition, because equipment away from keyboard can be checked cipher key lifetimes remaining time when leaving, initiatively send message in case of necessity to network, informing network is away from keyboard and estimates how long leave, in this time period, if network exists not deletion and this device-dependent credential, therefore as long as in the default time period, get back in the network, just can avoid being configured again, improve user experience.And if the user is not provided with defer time when away from keyboard, then can be set to system default value.Be understandable that,, also can no longer delay time, directly delete the credential that subscriber equipment connects if defer time is not set when the user is away from keyboard.
With reference to Fig. 4, it is the network negotiate flow chart behind the user equipment requests network away from keyboard in the embodiment of the invention, for equipment away from keyboard, be called for short temporarily from equipment, when in the network temporarily when equipment is wanted this network away from keyboard, to current network broadcasting or to one of Register clean culture temporarily from message, carry this in this message and estimate temporary time D T from equipment temporarily from network.Concrete steps are as follows:
S401, receive the user and determine that this equipment is temporarily from the message of network;
S402, prompting user import the time away from keyboard;
Time D T away from keyboard can be imported when asking deviated from network by the user, also can remove a default value.If have the interface editing ability from equipment self temporarily, " temporarily from network " such button can be set on the equipment, it will allow the user to import the time that expectation is left after will pressing " temporarily from network " button the user, otherwise DT gets a default value, for example always 30 minutes.
S403, receive the time D T away from keyboard of user input;
S404, temporarily from equipment to resident device broadcasts equipment temporarily from message, carry general unique identification identifier (UUID, Universal Unique Identifier) in the message and estimate time D T away from keyboard;
S405, resident equipment temporarily from message, carry UUID and time D T away from keyboard to the Register forwarding unit in the message;
In the IBSS network, if send temporarily from message with broadcast mode from equipment temporarily, receiving temporary equipment from message can be with this forwards to Register.
S406, the Register resident equipment sending message in network, notice has equipment network away from keyboard, carries UUID and time D T away from keyboard in the message;
Register no matter directly receive temporary from message still from miscellaneous equipment receive there forwarding temporarily from message, all need this message is informed all devices in the network.
Temporarily when equipment returns network, can press WPS configuration button simply, perhaps reuse " temporarily from network " button, use processes such as original key authenticates to add network again from equipment this moment temporarily, and adopt and notify Register with temporary from the identical mode of message, step S407~S411 is temporary operating process after equipment returns network again:
S407, receive the user and determine that the equipment of the described UUID of being designated returns network;
The authentication and the association process of network got back in S408, execution;
S409, get back to message in the network once more from equipment temporarily temporarily, carry temporary UUID in the message from equipment from the resident equipment light of equipment all in network bag;
S410, resident equipment transmit to Register and get back to message in the network from equipment temporarily, carry temporary UUID from equipment in the message;
S411, the Register resident equipment sending message in network, notice comes back in the network from equipment temporarily, carries temporary UUID from equipment in the message.
Be understandable that, among the above embodiment by subscriber equipment being divided into two types, and be user device configuration one is long and the other is short two cipher key lifetimes according to different types, be understandable that, in concrete the application, also can be as required, subscriber equipment is divided into type more than three kinds or three kinds, and different cipher key lifetimes is set at dissimilar, illustrate no longer one by one here.
Except the mode that adopts button arrangement, also can adopt other mode that concrete device type is offered the user for user's selection, and be chosen as the different cipher key lifetimes of user device configuration according to the user.
More than the method that the network equipment is set in the embodiment of the invention is described in detail, for those skilled in the art being understood better and realize the embodiment of the invention, below with reference to accompanying drawing, the network equipment in the embodiment of the invention is carried out correspondence describes:
With reference to Fig. 5, be the network equipment one structural representation in the embodiment of the invention, this network equipment comprises: first judging unit 501, first dispensing unit 502, second dispensing unit 503, wherein:
First judging unit 501 is used to judge that user device type is long-term connection device or short-term connection device, if user device type is long-term connection device, then triggers first dispensing unit 502; If user device type is the short-term connection device, then trigger second dispensing unit 503;
First dispensing unit 502 is used for the cipher key lifetimes of described subscriber equipment is configured to first cipher key lifetimes;
Second dispensing unit 503 is used for the cipher key lifetimes of described subscriber equipment is configured to second cipher key lifetimes, and described second cipher key lifetimes is less than first cipher key lifetimes.
For the subscriber equipment in the infrastructure may be long-term member in this network, it also may be the short-term connection device of this network of temporary visit, therefore the network equipment in the present embodiment comes to be user device configuration one is long and the other is short two cipher key lifetimes according to these characteristics of subscriber equipment, for user device type is the subscriber equipment of long-term connection device, the long cipher key lifetimes of setting can be avoided the network dismounting and make the credential of any two equipment rooms in the network invalid in the long time, and make the user have to reconfigure, be user-friendly to, can improve user experience; For user device type is the subscriber equipment of short-term connection device, because cipher key lifetimes is shorter, when network is removed, subscriber equipment is even without the announcement information of receiving that network is removed, equally can make credential invalid because of key is expired at short notice, can not cause producing from being dynamically connected once more between the equipment network security problem.Therefore present embodiment can improve user experience and guarantee network security.
With reference to Fig. 6, be the network equipment two structural representations in the embodiment of the invention, on the network equipment one basis, also can expand first timing unit 601, second judging unit 602 and first key updating units 603, wherein:
First timing unit 601 is used for carrying out timing when the cipher key lifetimes of described subscriber equipment is set to first cipher key lifetimes, and when timing finishes, triggers second judging unit 602;
Second judging unit 602, be used for judging subscriber equipment whether online or before the time-delay timing that is provided with finishes subscriber equipment whether get back to network; If subscriber equipment is online or the preceding subscriber equipment of time-delay timing end is got back in the network, then trigger first key updating units 603;
First key updating units 603 is used to upgrade the key of described subscriber equipment.
Delay time DT specifically can be by system's setting, for example be fixed as the first cipher key lifetimes LT or be 1/2nd of LT, the perhaps twice of LT, also can be by the User Defined setting, the embodiment of the invention is not made concrete regulation, but the inventor thinks should the such value of variation: the Device keys that can avoid belonging to long-term connection is deleted once the overtime configuration information that causes its life cycle, have to when networking once more reconfigure, its configuration information of equipment of also avoiding the user to abandon simultaneously for good and all is present in the network.Equipment is reached the standard grade and still can be used original cipher key to be connected to network before time-delay DT is overtime, but key upgraded immediately automatically, if the overtime equipment afterwards of time-delay DT is not still reached the standard grade, then system deletes its configuration information automatically.
As seen, for the network equipment described in the present embodiment, equipment is online when the first cipher key lifetimes timing of being disposed finishes, perhaps subscriber equipment comes back in the network before the time-delay timing that is provided with finishes, the mode of the key by the described subscriber equipment of automatic renewal helps maintaining network safety, and just need not reconfigure and can add network, therefore relatively friendly to the user.
Can on the network equipment one and the network equipment two bases, do further to optimize, with reference to Fig. 7, be the network equipment three structural representations in the embodiment of the invention, be the expansion of on the network equipment one basis, carrying out, be with the difference of the network equipment one, also comprise second timing unit 701, the 3rd judging unit 702 and cipher key lifetimes extension unit 703, wherein:
Second timing unit 701 is used for carrying out timing when the cipher key lifetimes of described subscriber equipment is configured to second cipher key lifetimes, when timing finishes, triggers the 3rd judging unit 702;
The 3rd judging unit 702 is used to judge whether subscriber equipment is online, and when subscriber equipment is online, triggers cipher key lifetimes extension unit 703;
Cipher key lifetimes extension unit 703, the cipher key lifetimes that is used to prolong subscriber equipment.
When the second cipher key lifetimes timing end and subscriber equipment when still online by prolonging cipher key lifetimes, can avoid reconfiguring the credential of subscriber equipment, improve user experience.
With reference to Fig. 8, be the network equipment four structural representations in the embodiment of the invention, on the network equipment four bases, also can expand time expand judging unit 801 and second key updating units 802, wherein:
Time expand judging unit 801, be used to judge whether cipher key lifetimes time expand of described subscriber equipment surpasses the cipher key lifetimes time expand that is provided with, and when surpassing, trigger second key updating units 802;
Second key updating units 802 is used to upgrade the key of described subscriber equipment.
Present embodiment can be avoided unlimited prolongation of cipher key lifetimes of subscriber equipment and bring network security problem, and cipher key lifetimes can not infinitely prolong.Can realize that also when surpassed described total cipher key lifetimes key service time of subscriber equipment, then cipher key lifetimes no longer prolonged, but upgrades the key of described subscriber equipment by a total cipher key lifetimes is set.
Can also be on the network equipment three or four bases, further expand, with reference to Fig. 9, be the network equipment five structural representations in the embodiment of the invention, be the schematic diagram of on the network equipment four bases, expanding, be with the difference of the network equipment four, also comprise the 4th judging unit 901 and network connection unit 902
Described the 3rd judging unit 702 also is used for triggering the 4th judging unit 901 when subscriber equipment is not online;
Described the 4th judging unit 901 is used for judging at the time-delay timing subscriber equipment that is provided with whether get back to network, and in getting back to network the time, trigger network linkage unit 902;
Described network connection unit 902 is used to use original cipher key to reconnect network.
For the described network equipment of present embodiment, when subscriber equipment during temporarily from network, if subscriber equipment turns back in the network in the delay time that is provided with, can use original cipher key to reconnect network, thereby can avoid reconfiguring the credential of subscriber equipment, therefore can further improve user experience.
In concrete the application, the above-mentioned network equipment specifically can be a Register, also can be AP.
More than the network equipment that the embodiment of the invention provided and the method for configure network devices are described in detail, used specific case herein principle of the present invention and execution mode are set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, the part that all can change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention.