CN104410970A - Wireless intelligent accessing method - Google Patents

Wireless intelligent accessing method Download PDF

Info

Publication number
CN104410970A
CN104410970A CN201410814476.9A CN201410814476A CN104410970A CN 104410970 A CN104410970 A CN 104410970A CN 201410814476 A CN201410814476 A CN 201410814476A CN 104410970 A CN104410970 A CN 104410970A
Authority
CN
China
Prior art keywords
frame
wireless network
data
secret key
wireless
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410814476.9A
Other languages
Chinese (zh)
Inventor
宋杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING JIKEJIKE TECHNOLOGY Co Ltd
Original Assignee
BEIJING JIKEJIKE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING JIKEJIKE TECHNOLOGY Co Ltd filed Critical BEIJING JIKEJIKE TECHNOLOGY Co Ltd
Priority to CN201410814476.9A priority Critical patent/CN104410970A/en
Publication of CN104410970A publication Critical patent/CN104410970A/en
Priority to PCT/CN2015/078713 priority patent/WO2016101494A1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/14Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention relates to the field of wireless communication and discloses a wireless intelligent accessing method. The method comprises the following steps: step S1, broadcasting an address of decrypting equipment by decrypting equipment to be accessed to a wireless network; step S2, receiving the address of the decrypting equipment by the encrypting equipment and encrypting and/or verifying to-be-encrypted data which at least include a wireless network name (SSID) and a wireless network password so as to form a data frame, and sending out an encrypted data packet which at least includes the data frame and is carried in a multicast packet consisting of MAC addresses; step S3, receiving the encrypted data packet by the decrypting equipment and decrypting the received encrypted data packet by the decrypting equipment to obtain wireless network configuration parameter information; and step S4, accessing the decrypting equipment to the wireless network by utilizing the access information obtained in the step S3. By using the method disclosed by the invention, steps carried out by a user for accessing the wireless network can be simplified, and the on-line experience of the user is improved.

Description

A kind of intelligent wireless cut-in method
Technical field
The present invention relates to wireless communication field, particularly a kind of intelligent wireless cut-in method.
Background technology
In current life, popularizing as the public brings great convenience of wireless network.But, in the process of wireless device connecting wireless network, need the wireless network name (SSID) of first specifying needs to connect, and correctly fill in the radio configuration that key waits for access network, then initiate connection request, after these Information Authentications are passed through, wireless device just allows access network.This reciprocal process is a process very consuming time, troublesome for user, some even needs to be configured by this wireless device on other equipment connections, in this case, operate and will more bother, and user also must must guarantee that the configuration information oneself filled in is correct, has had a strong impact on the experience of user.In a word, user, in order to allow wireless device access network, just must allow the configuration information getting this network.
In prior art, there is the Smart Config technology of WPS technology and TI for promoting Consumer's Experience during access of radio network.Although above two kinds of prior aries can allow user exempt from configuration and get final product connecting wireless network, all there is shortcoming in these two kinds of existing methods.
In WPS technology, after wireless device and the network equipment that will access all open WPS function, both sides can transmit radio configuration information by WPS agreement, thus allow wireless device connect upper wireless network.But connect both sides all to need to open WPS function, therefore user needs the unlatching being triggered WPS function by the similar operation that touches the button, and some settings also need to fill in PIN code to guarantee safety.
In the Smart Config technology of TI, this function broadcasts out after the configuration of wireless network being encrypted by means of mobile phone, thus allow wireless device obtain this configuration to connect.Although the Smart Config function connection procedure of TI does not have WPS so to bother, the method be the length of usage data bag to store radio configuration, a packet can only carry the data of a byte, and efficiency is very low, and there is not data length checking procedure.
Summary of the invention
The problem to be solved in the present invention is, simplify user by the step of wireless device access of radio network, namely by means of other equipment (router, mobile phone etc.) by the radio configuration of correspondence encryption and data broadcast is gone out, wireless device receives these data and is decrypted, the corresponding configuration information of automatic acquisition also connects, to promote Consumer's Experience.
The present invention can provide a brand-new wireless network access method, wireless device only needs to power on just can connecting wireless network, significantly alleviates the running cost of user, accomplishes easily, access network efficiently, user can be felt at ease, the facility that satisfied enjoyment wireless technology is brought.
For solving the problem, the invention provides a kind of intelligent wireless cut-in method, described intelligent wireless cut-in method comprises:
S1: decryption device address is broadcasted by the decryption device of wireless network to be accessed;
S2: encryption device receiving and deciphering device address, and according to the secret key of static state or dynamic secret key form, the be-encrypted data at least comprising wireless network name (SSID) and wireless network password is encrypted and/or verifies formation Frame, and the encrypted packets at least comprising Frame is carried at MAC Address composition multicast packets in send;
S3: decryption device receives encrypted packets, and according to the secret key of static state or dynamic secret key form, it is decrypted, obtain the access information at least comprising wireless network name (SSID) and wireless network password;
S4: the access information access of radio network that decryption device utilizes step S3 to obtain.
Preferably, in described step S2, described encrypted packets specifically comprises:
Synchronization frame: for unlabeled data synchronizing information;
Secret key frame: for storing secret key information;
Type frame: for storage encryption type and data frame length;
Frame: for the wireless network access parameters information after storage encryption.
Preferably, the Frame in described step S2 specifically comprises: wireless network name (SSID), wireless network password, the network address to be accessed, encryption type.
Preferably, in described Frame, before wireless network name (SSID), wireless network password, the network address to be accessed, encryption type, add respective data code and length data respectively.
Preferably, described synchronization frame length is 2 bytes, and described cipher key frame length is 4 bytes, and described type frame length is 2 bytes.
Preferably, described type frame prev word feast-brand mark shows secret key type, a rear byte unlabeled data frame length.
Preferably, described decryption device address is the MAC Address of decryption device.
Preferably, the described network address to be accessed is the MAC Address of network to be accessed.
Preferably, in described step S2, cipher mode is AES encryption, and verification mode is CRC check.
Preferably, in described step S2, latter two byte of MAC Address carries the data of encrypted packets, and third from the bottom byte carries frame number.
In the present invention, relevant technical terms is explained as follows:
(1) SSID:Service Set Identifier, service set, is also often called wireless network name
Be used for distinguishing different networks, can have at most 32 characters, wireless network card is provided with different SSID just can enter heterogeneous networks, and SSID is broadcast out by AP usually, can be checked the SSID in current region by the scan function of wireless device.
(2) WPS:Wi-Fi Protected Setup, Wi-Fi protection setting
Be the authentication item organized and implemented by Wi-Fi Alliance, be mainly devoted to the installation and the security performance configuration effort that simplify WLAN (wireless local area network).WPS can help the automatic configuration network name (SSID) of client user and air encryption key.
(3) MAC:Media Access Control, hardware address
Be used for representing the identifier of each website on the Internet, adopt hexadecimal number to represent, totally six bytes.Wherein, first three byte is the adaptor interface that after being responsible for by the registration management mechanism RA of IEEE the code distributed to different manufacturers, three bytes are assigned to production voluntarily by each producer, is called extended identifier.
(4) AES:Advanced Encryption Standard, Advanced Encryption Standard
Also known as Rijndael enciphered method in cryptography, it is a kind of block encryption standard that Federal Government adopts.This standard is used for alternative original DES, in many ways analyzed and widely the whole world use.Advanced Encryption Standard becomes one of most popular algorithm in symmetric key encryption already.
(5) CRC:Cyclic Redundancy Check, cyclic redundancy check (CRC) code
Be a kind of error check code the most frequently used in data communication field, it is characterized in that the length of information field and check field can be selected arbitrarily.Cyclical Redundancy Check (CRC) is a kind of transfer of data error detection function, carries out polynomial computation to data, and is attached to after frame by the result obtained, and receiving equipment also performs similar algorithm, to ensure correctness and the integrality of transfer of data.
Accompanying drawing explanation
Fig. 1 is intelligent wireless cut-in method flow chart in a preferred embodiment of the present invention;
Fig. 2 is encrypted packets structure chart in a preferred embodiment of the present invention;
Fig. 3 is the be-encrypted data structure chart for the formation of Frame in a preferred embodiment of the present invention;
Fig. 4 is multicast packets structure chart in a preferred embodiment of the present invention;
Fig. 5 be in a preferred embodiment of the present invention in multicast packets for carrying the single MAC Address structure chart of data.
Embodiment
Following examples only for technical scheme of the present invention is clearly described, and can not limit the scope of the invention with this.Specification subsequent descriptions is for implementing better embodiment of the present invention, and right described description still to illustrate for the purpose of rule of the present invention, and is not used to limit scope of the present invention.Protection scope of the present invention is when being as the criterion depending on the claims person of defining.
See Fig. 1, embodiments provide a kind of intelligent wireless cut-in method, described intelligent wireless cut-in method includes:
S1: decryption device address is broadcasted by the decryption device of wireless network to be accessed; What this decryption device was wireless network to be accessed can only equipment, and decryption device address can be MAC Address, such as EE:07:02:02:02 (D4EE07020202);
S2: encryption device receiving and deciphering device address, and according to the secret key of static state or dynamic secret key form, the be-encrypted data at least comprising wireless network name (SSID) and wireless network password is encrypted and/or verifies formation Frame, and the encrypted packets at least comprising Frame is carried at MAC Address composition multicast packets in send;
Such as, wireless network name (SSID) can be hello (ASCII:68656C6C6F), wireless network password can be 12345678 (ASCII:3132333435363738), in addition be-encrypted data can also comprise the network address to be accessed, such as MAC Address EE:07:01:01:01 (D4EE07010101), and encryption type encryption (ASCII:656E6372797074696F6E).
Be-encrypted data can also add respective data code and length data at above wireless network name (SSID), spider lines password, the network address to be accessed, encryption type on this basis, hereinafter will describe in detail.
Can be encrypted be-encrypted data and/or form Frame after verification operation, such as, adopting AES encryption mode and CRC check mode.Then encrypted packets is formed together in conjunction with synchronization frame, secret key frame, type frame.
S3: decryption device receives encrypted packets, and according to the secret key of static state or dynamic secret key form, it is decrypted, obtain the access information at least comprising wireless network name (SSID) and wireless network password, after decryption device receives data, judge whether synchronization frame to be detected, if receive synchronization frame, receive follow-up data further, and according to data length information decision data integrity degree in type frame, be decrypted according to the secret key of the static state of carrying in type frame or dynamic secret key type subsequently, dynamic secret key is generally 16 bytes, wherein front 6 bytes are fixed, encryption device and decryption device all grasp this 6 fixed byte, middle 4 bytes are the random secret key of encryption device stochastic generation, can be carried in secret key frame and send to decryption device, last 6 bytes are the MAC Address of decryption device self, encryption device is encrypted process according to the MAC Address of decryption device, the decryption device only with correct MAC Address could access of radio network.Static secret key is not limited to the decryption device with particular mac address, it is generally similarly 16 bytes, the wherein information of 12 fixed byte information and 4 byte stochastic generation, 4 byte random secret key of stochastic generation can adopt the mode being similar to dynamic secret key to be carried in the cipher key frame of encrypted packets, the fixed byte information of a decryption device GPRS 12 byte, and the 4 byte random keys of resolving stochastic generation in cipher key frame can be monitored, can to decrypt data.Certainly, the order of above-described fixed byte, stochastic generation byte and MAC Address byte can not be fixed, and it can arbitrarily combine.
S4: the access information access of radio network that decryption device utilizes step S3 to obtain
Further, see Fig. 2, in intelligent wireless cut-in method step S2, encrypted packets is made up of synchronization frame, cipher key frame, type frame and Frame.
Wherein synchronization frame occupies 2 bytes, and it can be such as 1C-1C.
Secret key frame occupies 4 bytes, that includes the random secret key of 4 bytes in such as dynamic secret key, the such as form of dynamic secret key is 010203040506 (fixing secret key) 0A0B0C0D (random secret key) D4EE07020202 (decryption device MAC Address), then the form of secret key frame is 0A0B0C0D; Static secret key form is similar with dynamic secret key, and only the secret key of last 6 bytes is similarly fixing secret key, and irrelevant with the MAC Address of decryption device.
Type frame occupies 2 bytes, and comprises two parts, and last byte is secret key type, such as 0x01, the length of a rear byte representation subsequent data frame, such as 0x18, the length computation mode of this Frame can be such as, multicast packets is carried by MAC Address, each MAC Address can carry 2 byte datas, and the ciphertext length of AES encryption is the multiple of 16, and therefore the length of Frame is 48 bytes, it is carried by 48/2=24 MAC Address, adopts 16 systems to be expressed as 0x18.
Therefore, the form of encrypted packets can be 1C1C0A0B0C0D0118xxx...xxx, and wherein xxx...xxx is Frame.For showing data structure more clearly, adding the data mode after relevant explanation is, 1C1C (synchronization frame) 0A0B0C0D (secret key frame) 0118 (type+length: type frame) xxx...xxx (Frame).
Frame is formed through encryption and/or verification by be-encrypted data in step S2, and it will be described in detail later in this article.
Further, see Fig. 3, wireless network name, wireless network password, access network address and encryption type can be comprised by encrypting and/or verify in the be-encrypted data for generating Frame.
Such as, wireless network name (SSID) is hello (ASCII:68656C6C6F), wireless network password is 12345678 (ASCII:3132333435363738), the network address to be accessed, such as MAC Address EE:07:01:01:01 (D4EE07010101), encryption type is encryption (ASCII:656E6372797074696F6E)
Further can add data type and data length respectively for before above Various types of data, the such as data code of wireless network name (SSID): 01, the data code of wireless network password: 02, the data code of the network address to be accessed: 03, the data code of encryption type: 04.
Therefore, the form of be-encrypted data is:
010568656C6C6F020831323334353637380306D4EE07010101040A656E6372797074696F6E;
In order to more clearly represent this be-encrypted data, adding the data mode after relevant explanation is:
01 (data type) 05 (data length) 68656C6C6F (wireless network name) 02 (data type) 08 (data length) 3132333435363738 (wireless network password) 03 (data type) 06 (data length) D4EE07010101 (network address to be accessed) 04 (data type) 0A (data length) 656E6372797074696F6E (encryption type).
By above-mentioned be-encrypted data being carried out the encryption of the forms such as AES, and/or just define for Frame after verification.
Further, see Fig. 4, Fig. 5, in the multicast packets that in intelligent wireless cut-in method step S2, MAC Address forms, in each MAC Address, rear three bytes carry data, the 3rd byte be wherein positioned in the middle of MAC Address denotes frame number, and it is 1C, 1D, 1E, 1F etc.Latter two byte carries the data content in encrypted packets, and each MAC Address can carry the information of 2 bytes, concrete can such as:
Synchronization frame: object MAC is the multicast frame of 01-00-5E-1C-1C-1C, and decrypted program is just activated after receiving this packet, starts to receive follow-up data.
Cipher key frame: object MAC is the multicast frame of 01-00-5E-1D-XX-XX, 01-00-5E-1E-XX-XX, and key always has 16 bytes, wherein has 4 bytes to be stochastic generation, and subsidiary in cipher key frame.
Type frame: object MAC is the multicast frame of 01-00-5E-1F-XX-XX, previous byte-identifier Key Tpe, static keys or dynamic key.The number of a rear byte-identifier Frame.
Frame: object MAC is the multicast frame of 01-00-5E-1F-XX-XX ~ 01-00-5E-FF-XX-XX, radio configuration can be encrypted in the mode of AES, just be stored in Frame after adding CRC check to the ciphertext after encryption, cipher mode, verification are not limited only to AES and CRC, and other modes also can.
Compared with prior art, the invention provides a kind of intelligent wireless cut-in method, encryption can by information such as radio configuration parameters by form composition encrypted packets such as encryption, verifications, and carried by MAC Address and send with the form of multicast packets, decryption device is decrypted automatic connecting wireless network after receiving, which simplify the step of user's access of radio network, improve Consumer's Experience.
Although below invention has been described in conjunction with the preferred embodiments, but it should be appreciated by those skilled in the art, method and system of the present invention is not limited to the embodiment described in embodiment, when not deviating from the spirit and scope of the invention be defined by the appended claims, can various amendment, increase be made to the present invention and replace.

Claims (10)

1. an intelligent wireless cut-in method, is characterized in that, described method comprises:
S1: decryption device address is broadcasted by the decryption device of wireless network to be accessed;
S2: encryption device receiving and deciphering device address, and according to the secret key of static state or dynamic secret key form, the be-encrypted data at least comprising wireless network name (SSID) and wireless network password is encrypted and/or verifies formation Frame, and the encrypted packets at least comprising Frame is carried at MAC Address composition multicast packets in send;
S3: decryption device receives encrypted packets, and according to the secret key of static state or dynamic secret key form, it is decrypted, obtain the access information at least comprising wireless network name (SSID) and wireless network password;
S4: the access information access of radio network that decryption device utilizes step S3 to obtain.
2. intelligent wireless cut-in method as claimed in claim 1, it is characterized in that, in described step S2, described encrypted packets specifically comprises:
Synchronization frame: for unlabeled data synchronizing information;
Secret key frame: for storing secret key information;
Type frame: for storage encryption type and data frame length;
Frame: for the wireless network access parameters information after storage encryption.
3. intelligent wireless cut-in method as claimed in claim 1 or 2, it is characterized in that, the Frame in described step S2 specifically comprises: wireless network name (SSID), wireless network password, the network address to be accessed, encryption type.
4. intelligent wireless cut-in method as claimed in claim 3, it is characterized in that, in described Frame, before wireless network name (SSID), wireless network password, the network address to be accessed, encryption type, add respective data code and length data respectively.
5. intelligent wireless cut-in method according to claim 2, is characterized in that, described synchronization frame length is 2 bytes, and described cipher key frame length is 4 bytes, and described type frame length is 2 bytes.
6. intelligent wireless cut-in method according to claim 5, is characterized in that, described type frame prev word feast-brand mark shows secret key type, a rear byte unlabeled data frame length.
7. the intelligent wireless cut-in method described in claim 1 or 2, is characterized in that, described decryption device address is the MAC Address of decryption device.
8. intelligent wireless cut-in method according to claim 3, is characterized in that, the described network address to be accessed is the MAC Address of network to be accessed.
9. the intelligent wireless cut-in method described in claim 1 or 2, is characterized in that, in described step S2, cipher mode is AES encryption, and verification mode is CRC check.
10. the intelligent wireless cut-in method described in claim 1 or 2, is characterized in that, in described step S2, latter two byte of MAC Address carries the data of encrypted packets, and third from the bottom byte carries frame number.
CN201410814476.9A 2014-12-23 2014-12-23 Wireless intelligent accessing method Pending CN104410970A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410814476.9A CN104410970A (en) 2014-12-23 2014-12-23 Wireless intelligent accessing method
PCT/CN2015/078713 WO2016101494A1 (en) 2014-12-23 2015-05-12 Wireless intelligent access method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410814476.9A CN104410970A (en) 2014-12-23 2014-12-23 Wireless intelligent accessing method

Publications (1)

Publication Number Publication Date
CN104410970A true CN104410970A (en) 2015-03-11

Family

ID=52648552

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410814476.9A Pending CN104410970A (en) 2014-12-23 2014-12-23 Wireless intelligent accessing method

Country Status (2)

Country Link
CN (1) CN104410970A (en)
WO (1) WO2016101494A1 (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104703176A (en) * 2015-03-18 2015-06-10 北京联盛德微电子有限责任公司 Configuration method of wireless network, intelligent terminal and wireless network equipment
CN104754496A (en) * 2015-03-18 2015-07-01 联想(北京)有限公司 Smart household device connecting method and smart terminal
CN104780587A (en) * 2015-03-27 2015-07-15 深圳市江波龙电子有限公司 AP (access point) accessing method and system for WiFi (wireless fidelity) equipment in Internet of Things
CN104993981A (en) * 2015-05-14 2015-10-21 小米科技有限责任公司 Method and apparatus for controlling access of device
CN105120456A (en) * 2015-09-08 2015-12-02 南京创维信息技术研究院有限公司 Method and system for intelligent device to access to wireless network quickly
CN105517102A (en) * 2015-11-20 2016-04-20 青岛海信移动通信技术股份有限公司 Method, device and equipment for enabling wireless network equipment to be connected with hot spot
CN105704679A (en) * 2016-05-04 2016-06-22 深圳市蜂联科技有限公司 Method for quickly connecting AP and SD with confirming function under uncorrelated WIFI environment
WO2016101494A1 (en) * 2014-12-23 2016-06-30 北京极科极客科技有限公司 Wireless intelligent access method
CN106254147A (en) * 2016-09-08 2016-12-21 珠海全志科技股份有限公司 A kind of collocation method for Wi Fi network, internet-of-things terminal and control end
CN106412882A (en) * 2016-10-19 2017-02-15 深圳市晟碟半导体有限公司 Method and system for accessing intelligent equipment into wireless network
CN106714092A (en) * 2017-02-13 2017-05-24 惠州Tcl移动通信有限公司 Mobile terminal-based WIFI data processing method and system
US9723486B2 (en) 2015-01-29 2017-08-01 Xiaomi Inc. Method and apparatus for accessing network
CN107277808A (en) * 2017-07-27 2017-10-20 中兴软创科技股份有限公司 A kind of method that wireless terminal accesses wireless network using independent dynamic key
CN108012265A (en) * 2017-12-15 2018-05-08 北京坤腾畅联科技有限公司 Automatic connection method and system based on WIFI
CN108599927A (en) * 2018-03-23 2018-09-28 北京智芯微电子科技有限公司 The protective relaying device of integrated national secret algorithm security module
CN108616521A (en) * 2018-04-12 2018-10-02 青岛海尔科技有限公司 Method for network access, device, equipment and readable storage medium storing program for executing
CN110636588A (en) * 2018-06-25 2019-12-31 阿里巴巴集团控股有限公司 Data communication method and device
CN113286294A (en) * 2020-02-18 2021-08-20 华为技术有限公司 Equipment wireless network information configuration method and device
CN115225417A (en) * 2021-03-29 2022-10-21 南宁富联富桂精密工业有限公司 Smart home equipment networking method, electronic device and storage medium
CN116528225A (en) * 2023-07-03 2023-08-01 广东电网有限责任公司珠海供电局 Data security management method, system and device for WAPI terminal access network

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107645416B (en) * 2017-09-28 2021-08-17 联想(北京)有限公司 Network configuration method and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140065964A1 (en) * 2012-09-06 2014-03-06 Nokia Corporation Method, apparatus, and computer program product for the exchanging of information between wireless devices for joining
CN103825788A (en) * 2014-01-29 2014-05-28 北京睿通慧联科技有限公司 WIFI network configuration method and system
US20140226817A1 (en) * 2013-02-11 2014-08-14 Broadcom Corporation Apparatus and method to register wi-fi clients on a wi-fi network
CN104202796A (en) * 2014-09-16 2014-12-10 杭州古北电子科技有限公司 Method of utilizing router to notifying other devices of wireless network configuration rapidly

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104410970A (en) * 2014-12-23 2015-03-11 北京极科极客科技有限公司 Wireless intelligent accessing method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140065964A1 (en) * 2012-09-06 2014-03-06 Nokia Corporation Method, apparatus, and computer program product for the exchanging of information between wireless devices for joining
US20140226817A1 (en) * 2013-02-11 2014-08-14 Broadcom Corporation Apparatus and method to register wi-fi clients on a wi-fi network
CN103825788A (en) * 2014-01-29 2014-05-28 北京睿通慧联科技有限公司 WIFI network configuration method and system
CN104202796A (en) * 2014-09-16 2014-12-10 杭州古北电子科技有限公司 Method of utilizing router to notifying other devices of wireless network configuration rapidly

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016101494A1 (en) * 2014-12-23 2016-06-30 北京极科极客科技有限公司 Wireless intelligent access method
US9723486B2 (en) 2015-01-29 2017-08-01 Xiaomi Inc. Method and apparatus for accessing network
CN104754496A (en) * 2015-03-18 2015-07-01 联想(北京)有限公司 Smart household device connecting method and smart terminal
CN104703176B (en) * 2015-03-18 2023-11-10 北京联盛德微电子有限责任公司 Configuration method of wireless network, intelligent terminal and wireless network equipment
CN104703176A (en) * 2015-03-18 2015-06-10 北京联盛德微电子有限责任公司 Configuration method of wireless network, intelligent terminal and wireless network equipment
CN104780587A (en) * 2015-03-27 2015-07-15 深圳市江波龙电子有限公司 AP (access point) accessing method and system for WiFi (wireless fidelity) equipment in Internet of Things
CN104993981B (en) * 2015-05-14 2018-12-11 小米科技有限责任公司 Control the method and device of equipment access
CN104993981A (en) * 2015-05-14 2015-10-21 小米科技有限责任公司 Method and apparatus for controlling access of device
CN105120456A (en) * 2015-09-08 2015-12-02 南京创维信息技术研究院有限公司 Method and system for intelligent device to access to wireless network quickly
CN105517102A (en) * 2015-11-20 2016-04-20 青岛海信移动通信技术股份有限公司 Method, device and equipment for enabling wireless network equipment to be connected with hot spot
CN105704679A (en) * 2016-05-04 2016-06-22 深圳市蜂联科技有限公司 Method for quickly connecting AP and SD with confirming function under uncorrelated WIFI environment
CN105704679B (en) * 2016-05-04 2019-04-16 深圳市蜂联科技有限公司 A method of AP and there is the SD of confirmation function quickly to connect under the WIFI environment of onrelevant
CN106254147B (en) * 2016-09-08 2019-06-28 珠海全志科技股份有限公司 It is a kind of for the configuration method of Wi-Fi network, internet-of-things terminal and control terminal
CN106254147A (en) * 2016-09-08 2016-12-21 珠海全志科技股份有限公司 A kind of collocation method for Wi Fi network, internet-of-things terminal and control end
CN106412882A (en) * 2016-10-19 2017-02-15 深圳市晟碟半导体有限公司 Method and system for accessing intelligent equipment into wireless network
CN106412882B (en) * 2016-10-19 2020-01-24 深圳市晟碟半导体有限公司 Method and system for intelligent equipment to access wireless network
CN106714092A (en) * 2017-02-13 2017-05-24 惠州Tcl移动通信有限公司 Mobile terminal-based WIFI data processing method and system
CN107277808A (en) * 2017-07-27 2017-10-20 中兴软创科技股份有限公司 A kind of method that wireless terminal accesses wireless network using independent dynamic key
CN108012265A (en) * 2017-12-15 2018-05-08 北京坤腾畅联科技有限公司 Automatic connection method and system based on WIFI
CN108599927A (en) * 2018-03-23 2018-09-28 北京智芯微电子科技有限公司 The protective relaying device of integrated national secret algorithm security module
CN108616521A (en) * 2018-04-12 2018-10-02 青岛海尔科技有限公司 Method for network access, device, equipment and readable storage medium storing program for executing
CN110636588A (en) * 2018-06-25 2019-12-31 阿里巴巴集团控股有限公司 Data communication method and device
CN113286294B (en) * 2020-02-18 2022-12-27 华为技术有限公司 Equipment wireless network information configuration method and device
CN113286294A (en) * 2020-02-18 2021-08-20 华为技术有限公司 Equipment wireless network information configuration method and device
CN115225417A (en) * 2021-03-29 2022-10-21 南宁富联富桂精密工业有限公司 Smart home equipment networking method, electronic device and storage medium
CN116528225A (en) * 2023-07-03 2023-08-01 广东电网有限责任公司珠海供电局 Data security management method, system and device for WAPI terminal access network
CN116528225B (en) * 2023-07-03 2023-09-08 广东电网有限责任公司珠海供电局 Data security management method, system and device for WAPI terminal access network

Also Published As

Publication number Publication date
WO2016101494A1 (en) 2016-06-30

Similar Documents

Publication Publication Date Title
CN104410970A (en) Wireless intelligent accessing method
CN102130768B (en) Terminal equipment having capability of encrypting and decrypting link layer and data processing method thereof
CN103686709B (en) A kind of wireless mesh network authentication method and system
CA2662841C (en) Method and system for secure processing of authentication key material in an ad hoc wireless network
CN104427501B (en) Method for network access, device and system
CN104584602B (en) Encrypting a service announcement message in a discovery packet
CN105656941B (en) Identification authentication system and method
CN102594555B (en) Security protection method for data, entity on network side and communication terminal
CN108391238A (en) Wireless MESH network matches network method
CN105933895A (en) Transmission method of WIFI network configuration data, intelligent device, and intelligent terminal
CN105323754B (en) A kind of distributed method for authenticating based on wildcard
US20210306308A1 (en) Communication method between mesh network and cloud server, mesh network system and node device thereof
CN105744596B (en) WiFi equipment network access method and device
CN108092958B (en) Information authentication method and device, computer equipment and storage medium
CN105007163B (en) Transmission, acquisition methods and the transmission of wildcard, acquisition device
US20240107313A1 (en) Control frame processing method, control frame generating method, station, access point, and storage medium
CN102884756A (en) Communication device and communication method
CN109151823B (en) eSIM card authentication method and system
CN101888626B (en) Method and terminal equipment for realizing GBA key
CN104812093B (en) Method and device for accessing WIFI equipment of smart home to network
CN108306793B (en) Intelligent device, intelligent home gateway, and method and system for establishing connection
CN110943835A (en) Distribution network encryption method and system for sending wireless local area network information
CN109962781B (en) Digital certificate distributing device
US8948389B2 (en) Wireless network connection method, wireless network apparatus and wireless network access point (AP) applying the method
CN113473468B (en) Broadband cognitive wireless communication method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150311