CN104410970A - Wireless intelligent accessing method - Google Patents
Wireless intelligent accessing method Download PDFInfo
- Publication number
- CN104410970A CN104410970A CN201410814476.9A CN201410814476A CN104410970A CN 104410970 A CN104410970 A CN 104410970A CN 201410814476 A CN201410814476 A CN 201410814476A CN 104410970 A CN104410970 A CN 104410970A
- Authority
- CN
- China
- Prior art keywords
- frame
- wireless network
- data
- secret key
- wireless
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/14—Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention relates to the field of wireless communication and discloses a wireless intelligent accessing method. The method comprises the following steps: step S1, broadcasting an address of decrypting equipment by decrypting equipment to be accessed to a wireless network; step S2, receiving the address of the decrypting equipment by the encrypting equipment and encrypting and/or verifying to-be-encrypted data which at least include a wireless network name (SSID) and a wireless network password so as to form a data frame, and sending out an encrypted data packet which at least includes the data frame and is carried in a multicast packet consisting of MAC addresses; step S3, receiving the encrypted data packet by the decrypting equipment and decrypting the received encrypted data packet by the decrypting equipment to obtain wireless network configuration parameter information; and step S4, accessing the decrypting equipment to the wireless network by utilizing the access information obtained in the step S3. By using the method disclosed by the invention, steps carried out by a user for accessing the wireless network can be simplified, and the on-line experience of the user is improved.
Description
Technical field
The present invention relates to wireless communication field, particularly a kind of intelligent wireless cut-in method.
Background technology
In current life, popularizing as the public brings great convenience of wireless network.But, in the process of wireless device connecting wireless network, need the wireless network name (SSID) of first specifying needs to connect, and correctly fill in the radio configuration that key waits for access network, then initiate connection request, after these Information Authentications are passed through, wireless device just allows access network.This reciprocal process is a process very consuming time, troublesome for user, some even needs to be configured by this wireless device on other equipment connections, in this case, operate and will more bother, and user also must must guarantee that the configuration information oneself filled in is correct, has had a strong impact on the experience of user.In a word, user, in order to allow wireless device access network, just must allow the configuration information getting this network.
In prior art, there is the Smart Config technology of WPS technology and TI for promoting Consumer's Experience during access of radio network.Although above two kinds of prior aries can allow user exempt from configuration and get final product connecting wireless network, all there is shortcoming in these two kinds of existing methods.
In WPS technology, after wireless device and the network equipment that will access all open WPS function, both sides can transmit radio configuration information by WPS agreement, thus allow wireless device connect upper wireless network.But connect both sides all to need to open WPS function, therefore user needs the unlatching being triggered WPS function by the similar operation that touches the button, and some settings also need to fill in PIN code to guarantee safety.
In the Smart Config technology of TI, this function broadcasts out after the configuration of wireless network being encrypted by means of mobile phone, thus allow wireless device obtain this configuration to connect.Although the Smart Config function connection procedure of TI does not have WPS so to bother, the method be the length of usage data bag to store radio configuration, a packet can only carry the data of a byte, and efficiency is very low, and there is not data length checking procedure.
Summary of the invention
The problem to be solved in the present invention is, simplify user by the step of wireless device access of radio network, namely by means of other equipment (router, mobile phone etc.) by the radio configuration of correspondence encryption and data broadcast is gone out, wireless device receives these data and is decrypted, the corresponding configuration information of automatic acquisition also connects, to promote Consumer's Experience.
The present invention can provide a brand-new wireless network access method, wireless device only needs to power on just can connecting wireless network, significantly alleviates the running cost of user, accomplishes easily, access network efficiently, user can be felt at ease, the facility that satisfied enjoyment wireless technology is brought.
For solving the problem, the invention provides a kind of intelligent wireless cut-in method, described intelligent wireless cut-in method comprises:
S1: decryption device address is broadcasted by the decryption device of wireless network to be accessed;
S2: encryption device receiving and deciphering device address, and according to the secret key of static state or dynamic secret key form, the be-encrypted data at least comprising wireless network name (SSID) and wireless network password is encrypted and/or verifies formation Frame, and the encrypted packets at least comprising Frame is carried at MAC Address composition multicast packets in send;
S3: decryption device receives encrypted packets, and according to the secret key of static state or dynamic secret key form, it is decrypted, obtain the access information at least comprising wireless network name (SSID) and wireless network password;
S4: the access information access of radio network that decryption device utilizes step S3 to obtain.
Preferably, in described step S2, described encrypted packets specifically comprises:
Synchronization frame: for unlabeled data synchronizing information;
Secret key frame: for storing secret key information;
Type frame: for storage encryption type and data frame length;
Frame: for the wireless network access parameters information after storage encryption.
Preferably, the Frame in described step S2 specifically comprises: wireless network name (SSID), wireless network password, the network address to be accessed, encryption type.
Preferably, in described Frame, before wireless network name (SSID), wireless network password, the network address to be accessed, encryption type, add respective data code and length data respectively.
Preferably, described synchronization frame length is 2 bytes, and described cipher key frame length is 4 bytes, and described type frame length is 2 bytes.
Preferably, described type frame prev word feast-brand mark shows secret key type, a rear byte unlabeled data frame length.
Preferably, described decryption device address is the MAC Address of decryption device.
Preferably, the described network address to be accessed is the MAC Address of network to be accessed.
Preferably, in described step S2, cipher mode is AES encryption, and verification mode is CRC check.
Preferably, in described step S2, latter two byte of MAC Address carries the data of encrypted packets, and third from the bottom byte carries frame number.
In the present invention, relevant technical terms is explained as follows:
(1) SSID:Service Set Identifier, service set, is also often called wireless network name
Be used for distinguishing different networks, can have at most 32 characters, wireless network card is provided with different SSID just can enter heterogeneous networks, and SSID is broadcast out by AP usually, can be checked the SSID in current region by the scan function of wireless device.
(2) WPS:Wi-Fi Protected Setup, Wi-Fi protection setting
Be the authentication item organized and implemented by Wi-Fi Alliance, be mainly devoted to the installation and the security performance configuration effort that simplify WLAN (wireless local area network).WPS can help the automatic configuration network name (SSID) of client user and air encryption key.
(3) MAC:Media Access Control, hardware address
Be used for representing the identifier of each website on the Internet, adopt hexadecimal number to represent, totally six bytes.Wherein, first three byte is the adaptor interface that after being responsible for by the registration management mechanism RA of IEEE the code distributed to different manufacturers, three bytes are assigned to production voluntarily by each producer, is called extended identifier.
(4) AES:Advanced Encryption Standard, Advanced Encryption Standard
Also known as Rijndael enciphered method in cryptography, it is a kind of block encryption standard that Federal Government adopts.This standard is used for alternative original DES, in many ways analyzed and widely the whole world use.Advanced Encryption Standard becomes one of most popular algorithm in symmetric key encryption already.
(5) CRC:Cyclic Redundancy Check, cyclic redundancy check (CRC) code
Be a kind of error check code the most frequently used in data communication field, it is characterized in that the length of information field and check field can be selected arbitrarily.Cyclical Redundancy Check (CRC) is a kind of transfer of data error detection function, carries out polynomial computation to data, and is attached to after frame by the result obtained, and receiving equipment also performs similar algorithm, to ensure correctness and the integrality of transfer of data.
Accompanying drawing explanation
Fig. 1 is intelligent wireless cut-in method flow chart in a preferred embodiment of the present invention;
Fig. 2 is encrypted packets structure chart in a preferred embodiment of the present invention;
Fig. 3 is the be-encrypted data structure chart for the formation of Frame in a preferred embodiment of the present invention;
Fig. 4 is multicast packets structure chart in a preferred embodiment of the present invention;
Fig. 5 be in a preferred embodiment of the present invention in multicast packets for carrying the single MAC Address structure chart of data.
Embodiment
Following examples only for technical scheme of the present invention is clearly described, and can not limit the scope of the invention with this.Specification subsequent descriptions is for implementing better embodiment of the present invention, and right described description still to illustrate for the purpose of rule of the present invention, and is not used to limit scope of the present invention.Protection scope of the present invention is when being as the criterion depending on the claims person of defining.
See Fig. 1, embodiments provide a kind of intelligent wireless cut-in method, described intelligent wireless cut-in method includes:
S1: decryption device address is broadcasted by the decryption device of wireless network to be accessed; What this decryption device was wireless network to be accessed can only equipment, and decryption device address can be MAC Address, such as EE:07:02:02:02 (D4EE07020202);
S2: encryption device receiving and deciphering device address, and according to the secret key of static state or dynamic secret key form, the be-encrypted data at least comprising wireless network name (SSID) and wireless network password is encrypted and/or verifies formation Frame, and the encrypted packets at least comprising Frame is carried at MAC Address composition multicast packets in send;
Such as, wireless network name (SSID) can be hello (ASCII:68656C6C6F), wireless network password can be 12345678 (ASCII:3132333435363738), in addition be-encrypted data can also comprise the network address to be accessed, such as MAC Address EE:07:01:01:01 (D4EE07010101), and encryption type encryption (ASCII:656E6372797074696F6E).
Be-encrypted data can also add respective data code and length data at above wireless network name (SSID), spider lines password, the network address to be accessed, encryption type on this basis, hereinafter will describe in detail.
Can be encrypted be-encrypted data and/or form Frame after verification operation, such as, adopting AES encryption mode and CRC check mode.Then encrypted packets is formed together in conjunction with synchronization frame, secret key frame, type frame.
S3: decryption device receives encrypted packets, and according to the secret key of static state or dynamic secret key form, it is decrypted, obtain the access information at least comprising wireless network name (SSID) and wireless network password, after decryption device receives data, judge whether synchronization frame to be detected, if receive synchronization frame, receive follow-up data further, and according to data length information decision data integrity degree in type frame, be decrypted according to the secret key of the static state of carrying in type frame or dynamic secret key type subsequently, dynamic secret key is generally 16 bytes, wherein front 6 bytes are fixed, encryption device and decryption device all grasp this 6 fixed byte, middle 4 bytes are the random secret key of encryption device stochastic generation, can be carried in secret key frame and send to decryption device, last 6 bytes are the MAC Address of decryption device self, encryption device is encrypted process according to the MAC Address of decryption device, the decryption device only with correct MAC Address could access of radio network.Static secret key is not limited to the decryption device with particular mac address, it is generally similarly 16 bytes, the wherein information of 12 fixed byte information and 4 byte stochastic generation, 4 byte random secret key of stochastic generation can adopt the mode being similar to dynamic secret key to be carried in the cipher key frame of encrypted packets, the fixed byte information of a decryption device GPRS 12 byte, and the 4 byte random keys of resolving stochastic generation in cipher key frame can be monitored, can to decrypt data.Certainly, the order of above-described fixed byte, stochastic generation byte and MAC Address byte can not be fixed, and it can arbitrarily combine.
S4: the access information access of radio network that decryption device utilizes step S3 to obtain
Further, see Fig. 2, in intelligent wireless cut-in method step S2, encrypted packets is made up of synchronization frame, cipher key frame, type frame and Frame.
Wherein synchronization frame occupies 2 bytes, and it can be such as 1C-1C.
Secret key frame occupies 4 bytes, that includes the random secret key of 4 bytes in such as dynamic secret key, the such as form of dynamic secret key is 010203040506 (fixing secret key) 0A0B0C0D (random secret key) D4EE07020202 (decryption device MAC Address), then the form of secret key frame is 0A0B0C0D; Static secret key form is similar with dynamic secret key, and only the secret key of last 6 bytes is similarly fixing secret key, and irrelevant with the MAC Address of decryption device.
Type frame occupies 2 bytes, and comprises two parts, and last byte is secret key type, such as 0x01, the length of a rear byte representation subsequent data frame, such as 0x18, the length computation mode of this Frame can be such as, multicast packets is carried by MAC Address, each MAC Address can carry 2 byte datas, and the ciphertext length of AES encryption is the multiple of 16, and therefore the length of Frame is 48 bytes, it is carried by 48/2=24 MAC Address, adopts 16 systems to be expressed as 0x18.
Therefore, the form of encrypted packets can be 1C1C0A0B0C0D0118xxx...xxx, and wherein xxx...xxx is Frame.For showing data structure more clearly, adding the data mode after relevant explanation is, 1C1C (synchronization frame) 0A0B0C0D (secret key frame) 0118 (type+length: type frame) xxx...xxx (Frame).
Frame is formed through encryption and/or verification by be-encrypted data in step S2, and it will be described in detail later in this article.
Further, see Fig. 3, wireless network name, wireless network password, access network address and encryption type can be comprised by encrypting and/or verify in the be-encrypted data for generating Frame.
Such as, wireless network name (SSID) is hello (ASCII:68656C6C6F), wireless network password is 12345678 (ASCII:3132333435363738), the network address to be accessed, such as MAC Address EE:07:01:01:01 (D4EE07010101), encryption type is encryption (ASCII:656E6372797074696F6E)
Further can add data type and data length respectively for before above Various types of data, the such as data code of wireless network name (SSID): 01, the data code of wireless network password: 02, the data code of the network address to be accessed: 03, the data code of encryption type: 04.
Therefore, the form of be-encrypted data is:
010568656C6C6F020831323334353637380306D4EE07010101040A656E6372797074696F6E;
In order to more clearly represent this be-encrypted data, adding the data mode after relevant explanation is:
01 (data type) 05 (data length) 68656C6C6F (wireless network name) 02 (data type) 08 (data length) 3132333435363738 (wireless network password) 03 (data type) 06 (data length) D4EE07010101 (network address to be accessed) 04 (data type) 0A (data length) 656E6372797074696F6E (encryption type).
By above-mentioned be-encrypted data being carried out the encryption of the forms such as AES, and/or just define for Frame after verification.
Further, see Fig. 4, Fig. 5, in the multicast packets that in intelligent wireless cut-in method step S2, MAC Address forms, in each MAC Address, rear three bytes carry data, the 3rd byte be wherein positioned in the middle of MAC Address denotes frame number, and it is 1C, 1D, 1E, 1F etc.Latter two byte carries the data content in encrypted packets, and each MAC Address can carry the information of 2 bytes, concrete can such as:
Synchronization frame: object MAC is the multicast frame of 01-00-5E-1C-1C-1C, and decrypted program is just activated after receiving this packet, starts to receive follow-up data.
Cipher key frame: object MAC is the multicast frame of 01-00-5E-1D-XX-XX, 01-00-5E-1E-XX-XX, and key always has 16 bytes, wherein has 4 bytes to be stochastic generation, and subsidiary in cipher key frame.
Type frame: object MAC is the multicast frame of 01-00-5E-1F-XX-XX, previous byte-identifier Key Tpe, static keys or dynamic key.The number of a rear byte-identifier Frame.
Frame: object MAC is the multicast frame of 01-00-5E-1F-XX-XX ~ 01-00-5E-FF-XX-XX, radio configuration can be encrypted in the mode of AES, just be stored in Frame after adding CRC check to the ciphertext after encryption, cipher mode, verification are not limited only to AES and CRC, and other modes also can.
Compared with prior art, the invention provides a kind of intelligent wireless cut-in method, encryption can by information such as radio configuration parameters by form composition encrypted packets such as encryption, verifications, and carried by MAC Address and send with the form of multicast packets, decryption device is decrypted automatic connecting wireless network after receiving, which simplify the step of user's access of radio network, improve Consumer's Experience.
Although below invention has been described in conjunction with the preferred embodiments, but it should be appreciated by those skilled in the art, method and system of the present invention is not limited to the embodiment described in embodiment, when not deviating from the spirit and scope of the invention be defined by the appended claims, can various amendment, increase be made to the present invention and replace.
Claims (10)
1. an intelligent wireless cut-in method, is characterized in that, described method comprises:
S1: decryption device address is broadcasted by the decryption device of wireless network to be accessed;
S2: encryption device receiving and deciphering device address, and according to the secret key of static state or dynamic secret key form, the be-encrypted data at least comprising wireless network name (SSID) and wireless network password is encrypted and/or verifies formation Frame, and the encrypted packets at least comprising Frame is carried at MAC Address composition multicast packets in send;
S3: decryption device receives encrypted packets, and according to the secret key of static state or dynamic secret key form, it is decrypted, obtain the access information at least comprising wireless network name (SSID) and wireless network password;
S4: the access information access of radio network that decryption device utilizes step S3 to obtain.
2. intelligent wireless cut-in method as claimed in claim 1, it is characterized in that, in described step S2, described encrypted packets specifically comprises:
Synchronization frame: for unlabeled data synchronizing information;
Secret key frame: for storing secret key information;
Type frame: for storage encryption type and data frame length;
Frame: for the wireless network access parameters information after storage encryption.
3. intelligent wireless cut-in method as claimed in claim 1 or 2, it is characterized in that, the Frame in described step S2 specifically comprises: wireless network name (SSID), wireless network password, the network address to be accessed, encryption type.
4. intelligent wireless cut-in method as claimed in claim 3, it is characterized in that, in described Frame, before wireless network name (SSID), wireless network password, the network address to be accessed, encryption type, add respective data code and length data respectively.
5. intelligent wireless cut-in method according to claim 2, is characterized in that, described synchronization frame length is 2 bytes, and described cipher key frame length is 4 bytes, and described type frame length is 2 bytes.
6. intelligent wireless cut-in method according to claim 5, is characterized in that, described type frame prev word feast-brand mark shows secret key type, a rear byte unlabeled data frame length.
7. the intelligent wireless cut-in method described in claim 1 or 2, is characterized in that, described decryption device address is the MAC Address of decryption device.
8. intelligent wireless cut-in method according to claim 3, is characterized in that, the described network address to be accessed is the MAC Address of network to be accessed.
9. the intelligent wireless cut-in method described in claim 1 or 2, is characterized in that, in described step S2, cipher mode is AES encryption, and verification mode is CRC check.
10. the intelligent wireless cut-in method described in claim 1 or 2, is characterized in that, in described step S2, latter two byte of MAC Address carries the data of encrypted packets, and third from the bottom byte carries frame number.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410814476.9A CN104410970A (en) | 2014-12-23 | 2014-12-23 | Wireless intelligent accessing method |
PCT/CN2015/078713 WO2016101494A1 (en) | 2014-12-23 | 2015-05-12 | Wireless intelligent access method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410814476.9A CN104410970A (en) | 2014-12-23 | 2014-12-23 | Wireless intelligent accessing method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104410970A true CN104410970A (en) | 2015-03-11 |
Family
ID=52648552
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410814476.9A Pending CN104410970A (en) | 2014-12-23 | 2014-12-23 | Wireless intelligent accessing method |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104410970A (en) |
WO (1) | WO2016101494A1 (en) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104703176A (en) * | 2015-03-18 | 2015-06-10 | 北京联盛德微电子有限责任公司 | Configuration method of wireless network, intelligent terminal and wireless network equipment |
CN104754496A (en) * | 2015-03-18 | 2015-07-01 | 联想(北京)有限公司 | Smart household device connecting method and smart terminal |
CN104780587A (en) * | 2015-03-27 | 2015-07-15 | 深圳市江波龙电子有限公司 | AP (access point) accessing method and system for WiFi (wireless fidelity) equipment in Internet of Things |
CN104993981A (en) * | 2015-05-14 | 2015-10-21 | 小米科技有限责任公司 | Method and apparatus for controlling access of device |
CN105120456A (en) * | 2015-09-08 | 2015-12-02 | 南京创维信息技术研究院有限公司 | Method and system for intelligent device to access to wireless network quickly |
CN105517102A (en) * | 2015-11-20 | 2016-04-20 | 青岛海信移动通信技术股份有限公司 | Method, device and equipment for enabling wireless network equipment to be connected with hot spot |
CN105704679A (en) * | 2016-05-04 | 2016-06-22 | 深圳市蜂联科技有限公司 | Method for quickly connecting AP and SD with confirming function under uncorrelated WIFI environment |
WO2016101494A1 (en) * | 2014-12-23 | 2016-06-30 | 北京极科极客科技有限公司 | Wireless intelligent access method |
CN106254147A (en) * | 2016-09-08 | 2016-12-21 | 珠海全志科技股份有限公司 | A kind of collocation method for Wi Fi network, internet-of-things terminal and control end |
CN106412882A (en) * | 2016-10-19 | 2017-02-15 | 深圳市晟碟半导体有限公司 | Method and system for accessing intelligent equipment into wireless network |
CN106714092A (en) * | 2017-02-13 | 2017-05-24 | 惠州Tcl移动通信有限公司 | Mobile terminal-based WIFI data processing method and system |
US9723486B2 (en) | 2015-01-29 | 2017-08-01 | Xiaomi Inc. | Method and apparatus for accessing network |
CN107277808A (en) * | 2017-07-27 | 2017-10-20 | 中兴软创科技股份有限公司 | A kind of method that wireless terminal accesses wireless network using independent dynamic key |
CN108012265A (en) * | 2017-12-15 | 2018-05-08 | 北京坤腾畅联科技有限公司 | Automatic connection method and system based on WIFI |
CN108599927A (en) * | 2018-03-23 | 2018-09-28 | 北京智芯微电子科技有限公司 | The protective relaying device of integrated national secret algorithm security module |
CN108616521A (en) * | 2018-04-12 | 2018-10-02 | 青岛海尔科技有限公司 | Method for network access, device, equipment and readable storage medium storing program for executing |
CN110636588A (en) * | 2018-06-25 | 2019-12-31 | 阿里巴巴集团控股有限公司 | Data communication method and device |
CN113286294A (en) * | 2020-02-18 | 2021-08-20 | 华为技术有限公司 | Equipment wireless network information configuration method and device |
CN115225417A (en) * | 2021-03-29 | 2022-10-21 | 南宁富联富桂精密工业有限公司 | Smart home equipment networking method, electronic device and storage medium |
CN116528225A (en) * | 2023-07-03 | 2023-08-01 | 广东电网有限责任公司珠海供电局 | Data security management method, system and device for WAPI terminal access network |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107645416B (en) * | 2017-09-28 | 2021-08-17 | 联想(北京)有限公司 | Network configuration method and electronic equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140065964A1 (en) * | 2012-09-06 | 2014-03-06 | Nokia Corporation | Method, apparatus, and computer program product for the exchanging of information between wireless devices for joining |
CN103825788A (en) * | 2014-01-29 | 2014-05-28 | 北京睿通慧联科技有限公司 | WIFI network configuration method and system |
US20140226817A1 (en) * | 2013-02-11 | 2014-08-14 | Broadcom Corporation | Apparatus and method to register wi-fi clients on a wi-fi network |
CN104202796A (en) * | 2014-09-16 | 2014-12-10 | 杭州古北电子科技有限公司 | Method of utilizing router to notifying other devices of wireless network configuration rapidly |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104410970A (en) * | 2014-12-23 | 2015-03-11 | 北京极科极客科技有限公司 | Wireless intelligent accessing method |
-
2014
- 2014-12-23 CN CN201410814476.9A patent/CN104410970A/en active Pending
-
2015
- 2015-05-12 WO PCT/CN2015/078713 patent/WO2016101494A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140065964A1 (en) * | 2012-09-06 | 2014-03-06 | Nokia Corporation | Method, apparatus, and computer program product for the exchanging of information between wireless devices for joining |
US20140226817A1 (en) * | 2013-02-11 | 2014-08-14 | Broadcom Corporation | Apparatus and method to register wi-fi clients on a wi-fi network |
CN103825788A (en) * | 2014-01-29 | 2014-05-28 | 北京睿通慧联科技有限公司 | WIFI network configuration method and system |
CN104202796A (en) * | 2014-09-16 | 2014-12-10 | 杭州古北电子科技有限公司 | Method of utilizing router to notifying other devices of wireless network configuration rapidly |
Cited By (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016101494A1 (en) * | 2014-12-23 | 2016-06-30 | 北京极科极客科技有限公司 | Wireless intelligent access method |
US9723486B2 (en) | 2015-01-29 | 2017-08-01 | Xiaomi Inc. | Method and apparatus for accessing network |
CN104754496A (en) * | 2015-03-18 | 2015-07-01 | 联想(北京)有限公司 | Smart household device connecting method and smart terminal |
CN104703176B (en) * | 2015-03-18 | 2023-11-10 | 北京联盛德微电子有限责任公司 | Configuration method of wireless network, intelligent terminal and wireless network equipment |
CN104703176A (en) * | 2015-03-18 | 2015-06-10 | 北京联盛德微电子有限责任公司 | Configuration method of wireless network, intelligent terminal and wireless network equipment |
CN104780587A (en) * | 2015-03-27 | 2015-07-15 | 深圳市江波龙电子有限公司 | AP (access point) accessing method and system for WiFi (wireless fidelity) equipment in Internet of Things |
CN104993981B (en) * | 2015-05-14 | 2018-12-11 | 小米科技有限责任公司 | Control the method and device of equipment access |
CN104993981A (en) * | 2015-05-14 | 2015-10-21 | 小米科技有限责任公司 | Method and apparatus for controlling access of device |
CN105120456A (en) * | 2015-09-08 | 2015-12-02 | 南京创维信息技术研究院有限公司 | Method and system for intelligent device to access to wireless network quickly |
CN105517102A (en) * | 2015-11-20 | 2016-04-20 | 青岛海信移动通信技术股份有限公司 | Method, device and equipment for enabling wireless network equipment to be connected with hot spot |
CN105704679A (en) * | 2016-05-04 | 2016-06-22 | 深圳市蜂联科技有限公司 | Method for quickly connecting AP and SD with confirming function under uncorrelated WIFI environment |
CN105704679B (en) * | 2016-05-04 | 2019-04-16 | 深圳市蜂联科技有限公司 | A method of AP and there is the SD of confirmation function quickly to connect under the WIFI environment of onrelevant |
CN106254147B (en) * | 2016-09-08 | 2019-06-28 | 珠海全志科技股份有限公司 | It is a kind of for the configuration method of Wi-Fi network, internet-of-things terminal and control terminal |
CN106254147A (en) * | 2016-09-08 | 2016-12-21 | 珠海全志科技股份有限公司 | A kind of collocation method for Wi Fi network, internet-of-things terminal and control end |
CN106412882A (en) * | 2016-10-19 | 2017-02-15 | 深圳市晟碟半导体有限公司 | Method and system for accessing intelligent equipment into wireless network |
CN106412882B (en) * | 2016-10-19 | 2020-01-24 | 深圳市晟碟半导体有限公司 | Method and system for intelligent equipment to access wireless network |
CN106714092A (en) * | 2017-02-13 | 2017-05-24 | 惠州Tcl移动通信有限公司 | Mobile terminal-based WIFI data processing method and system |
CN107277808A (en) * | 2017-07-27 | 2017-10-20 | 中兴软创科技股份有限公司 | A kind of method that wireless terminal accesses wireless network using independent dynamic key |
CN108012265A (en) * | 2017-12-15 | 2018-05-08 | 北京坤腾畅联科技有限公司 | Automatic connection method and system based on WIFI |
CN108599927A (en) * | 2018-03-23 | 2018-09-28 | 北京智芯微电子科技有限公司 | The protective relaying device of integrated national secret algorithm security module |
CN108616521A (en) * | 2018-04-12 | 2018-10-02 | 青岛海尔科技有限公司 | Method for network access, device, equipment and readable storage medium storing program for executing |
CN110636588A (en) * | 2018-06-25 | 2019-12-31 | 阿里巴巴集团控股有限公司 | Data communication method and device |
CN113286294B (en) * | 2020-02-18 | 2022-12-27 | 华为技术有限公司 | Equipment wireless network information configuration method and device |
CN113286294A (en) * | 2020-02-18 | 2021-08-20 | 华为技术有限公司 | Equipment wireless network information configuration method and device |
CN115225417A (en) * | 2021-03-29 | 2022-10-21 | 南宁富联富桂精密工业有限公司 | Smart home equipment networking method, electronic device and storage medium |
CN116528225A (en) * | 2023-07-03 | 2023-08-01 | 广东电网有限责任公司珠海供电局 | Data security management method, system and device for WAPI terminal access network |
CN116528225B (en) * | 2023-07-03 | 2023-09-08 | 广东电网有限责任公司珠海供电局 | Data security management method, system and device for WAPI terminal access network |
Also Published As
Publication number | Publication date |
---|---|
WO2016101494A1 (en) | 2016-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104410970A (en) | Wireless intelligent accessing method | |
CN102130768B (en) | Terminal equipment having capability of encrypting and decrypting link layer and data processing method thereof | |
CN103686709B (en) | A kind of wireless mesh network authentication method and system | |
CA2662841C (en) | Method and system for secure processing of authentication key material in an ad hoc wireless network | |
CN104427501B (en) | Method for network access, device and system | |
CN104584602B (en) | Encrypting a service announcement message in a discovery packet | |
CN105656941B (en) | Identification authentication system and method | |
CN102594555B (en) | Security protection method for data, entity on network side and communication terminal | |
CN108391238A (en) | Wireless MESH network matches network method | |
CN105933895A (en) | Transmission method of WIFI network configuration data, intelligent device, and intelligent terminal | |
CN105323754B (en) | A kind of distributed method for authenticating based on wildcard | |
US20210306308A1 (en) | Communication method between mesh network and cloud server, mesh network system and node device thereof | |
CN105744596B (en) | WiFi equipment network access method and device | |
CN108092958B (en) | Information authentication method and device, computer equipment and storage medium | |
CN105007163B (en) | Transmission, acquisition methods and the transmission of wildcard, acquisition device | |
US20240107313A1 (en) | Control frame processing method, control frame generating method, station, access point, and storage medium | |
CN102884756A (en) | Communication device and communication method | |
CN109151823B (en) | eSIM card authentication method and system | |
CN101888626B (en) | Method and terminal equipment for realizing GBA key | |
CN104812093B (en) | Method and device for accessing WIFI equipment of smart home to network | |
CN108306793B (en) | Intelligent device, intelligent home gateway, and method and system for establishing connection | |
CN110943835A (en) | Distribution network encryption method and system for sending wireless local area network information | |
CN109962781B (en) | Digital certificate distributing device | |
US8948389B2 (en) | Wireless network connection method, wireless network apparatus and wireless network access point (AP) applying the method | |
CN113473468B (en) | Broadband cognitive wireless communication method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150311 |