CN105357740B - Wireless network access method and wireless access node - Google Patents

Wireless network access method and wireless access node Download PDF

Info

Publication number
CN105357740B
CN105357740B CN201510613462.5A CN201510613462A CN105357740B CN 105357740 B CN105357740 B CN 105357740B CN 201510613462 A CN201510613462 A CN 201510613462A CN 105357740 B CN105357740 B CN 105357740B
Authority
CN
China
Prior art keywords
access node
wireless access
identification information
temporary
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510613462.5A
Other languages
Chinese (zh)
Other versions
CN105357740A (en
Inventor
张毅
陆苏
胡胜钢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TCL Mobile Communication Technology Ningbo Ltd
Original Assignee
TCL Mobile Communication Technology Ningbo Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TCL Mobile Communication Technology Ningbo Ltd filed Critical TCL Mobile Communication Technology Ningbo Ltd
Priority to CN201510613462.5A priority Critical patent/CN105357740B/en
Publication of CN105357740A publication Critical patent/CN105357740A/en
Priority to PCT/CN2016/088365 priority patent/WO2017049984A1/en
Application granted granted Critical
Publication of CN105357740B publication Critical patent/CN105357740B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a wireless network access method and a wireless access node.A fixed user list, a temporary user list and corresponding identification information are preset in an AP (access point), and the identification information of a device to be connected is compared with the preset identification information, so that whether the device to be connected is a temporary device, a fixed device or a non-trusted device is distinguished. The invention can meet the user requirements that the temporary equipment is disconnected with the AP after exceeding the preset time or the disconnection and the fixed equipment is connected with the AP for a long time, reduces the complicated manual operation and brings great convenience to the user.

Description

Wireless network access method and wireless access node
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an Access method for a wireless network and an Access Point (AP).
Background
With the rise of the internet of things industry, intelligent household appliances gradually enter the lives of people, and how to establish connection between intelligent equipment and an AP becomes a technical point which is worthy of consideration at present. Currently, a connection is generally established between a smart device and an AP in a two-dimensional code scanning manner, specifically, a connected (smart) device maps a BSSID (Basic Service Set Identifier) code and a connection password, for example, a PIN (Personal Identification Number) code, of the AP, to a two-dimensional code graph, so as to generate a security key for encrypting a message, and the like, and the to-be-connected (smart) device may connect the AP and access a wireless network by scanning the two-dimensional code.
Although the above connection method omits a tedious link of manually inputting a connection password by a user, and brings great convenience to the user, other problems are also generated, typically, as long as the smart device scanning the two-dimensional code can connect the AP and access the wireless network, and the smart device stores the connection password after connection, however, if a user (e.g., a house owner) of the wireless network only wants the connection password stored by some temporary devices to fail after a period of time, and wants some other fixed devices to connect for a long time, the connection method cannot be implemented, and at this time, the user must modify the connection password to disconnect the access of some devices, or clear the smart device which does not want to access for a long time through a control interface of a login router.
Disclosure of Invention
In view of this, embodiments of the present invention provide an access method for a wireless network and a wireless access node, which can distinguish whether a device to be connected is a temporary device or a fixed device, and meet a user requirement that the temporary device is disconnected from an AP after a preset time or disconnection, and the fixed device is connected to the AP for a long time, thereby reducing manual operations and bringing great convenience to users.
The embodiment of the invention provides an access method of a wireless network, which is applied to a wireless access node, and comprises the following steps: the wireless access node broadcasts a beacon message; the wireless access node receives a request message sent by the device to be connected according to the beacon message, wherein the request message comprises identification information of the device to be connected; the wireless access node searches identification information of the equipment to be connected in the fixed user list and the temporary user list, if the identification information of the equipment to be connected is found in the fixed user list, the equipment to be connected is determined to be the fixed equipment, if the identification information of the equipment to be connected is found in the temporary user list, the equipment to be connected is determined to be the temporary equipment, if the identification information of the equipment to be connected is not found in the fixed user list and the temporary user list, the equipment to be connected is determined to be the untrusted equipment, wherein the identification information of the connecting equipment with long-term effective trust state is recorded in the fixed user list, and the identification information of the connecting equipment with failure after the trust state exceeds preset time or the connection is disconnected is recorded in the temporary user list.
Optionally, after the wireless access node determines that the device to be connected is a fixed device, the method further includes: the wireless access node sends access information to the first connected device, wherein the access information comprises identification information of the wireless access node and a fixed connection password, so that the first connected device generates a two-dimensional code graph according to the identification information of the wireless access node and the fixed connection password and displays the two-dimensional code graph in a display of the first connected device, the device to be connected obtains the identification information of the wireless access node and the fixed connection password by scanning the two-dimensional code image, and the wireless access node is accessed according to the identification information of the wireless access node and the fixed connection password.
Optionally, after the wireless access node determines that the device to be connected is a temporary device, the method further includes: the wireless access node sends access information to the first connected device, wherein the access information comprises identification information of the wireless access node and a temporary connection password, so that the first connected device generates a two-dimensional code graph according to the identification information of the wireless access node and the temporary connection password and displays the two-dimensional code graph in a display of the first connected device, the device to be connected is made to obtain the identification information of the wireless access node and the temporary connection password by scanning the two-dimensional code image, and the wireless access node is accessed according to the identification information of the wireless access node and the temporary connection password.
Optionally, the method further comprises: and when the wireless access node detects that the equipment to be connected stops accessing the wireless access node or accesses the wireless access node for more than preset time, the wireless access node disables the temporary connection password.
Optionally, after the wireless access node determines that the device to be connected is an untrusted device, the method further includes: the wireless access node sends information to second connected equipment, wherein the information comprises identification information of equipment to be accessed, so that the second connected equipment requests a user to select the equipment to be connected as fixed equipment or temporary equipment, receives a selection result input by the user, and sends selection information comprising the selection result to the wireless access node; and the wireless access node receives the selection information, adds the identification information of the equipment to be connected into the fixed equipment list when the selection result is that the equipment to be connected is selected as the fixed equipment, and adds the identification information of the equipment to be connected into the temporary equipment list when the selection result is that the equipment to be connected is selected as the temporary equipment.
An embodiment of the present invention provides a wireless access node, including: a sending module for broadcasting a beacon message; the device comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a request message sent by the device to be connected according to the beacon message, and the request message comprises identification information of the device to be connected; the storage module is used for storing a fixed user list and a temporary user list, wherein the fixed user list records identification information of the connecting equipment with a long-term effective trust state, and the temporary user list records identification information of the connecting equipment with a trust state exceeding a preset time or losing effectiveness after disconnection; the device to be connected is determined to be a fixed device if the identification information of the device to be connected is found in the fixed user list, is determined to be a temporary device if the identification information of the device to be connected is found in the temporary user list, and is determined to be a non-trusted device if the identification information of the device to be connected is not found in both the fixed user list and the temporary user list.
Optionally, the sending module is further configured to send access information to the first connected device, where the access information includes identification information of the wireless access node and a fixed connection password, so that the first connected device generates a two-dimensional code graph according to the identification information of the wireless access node and the fixed connection password and displays the two-dimensional code graph in a display of the first connected device, and further, the device to be connected obtains the identification information of the wireless access node and the fixed connection password by scanning the two-dimensional code image, and accesses the wireless access node according to the identification information of the wireless access node and the fixed connection password.
Optionally, the sending module is further configured to send access information to the first connected device, where the access information includes identification information of the wireless access node and a temporary connection password, so that the first connected device generates a two-dimensional code graph according to the identification information of the wireless access node and the temporary connection password and displays the two-dimensional code graph in a display of the first connected device, and further, the device to be connected obtains the identification information of the wireless access node and the temporary connection password by scanning the two-dimensional code image, and accesses the wireless access node according to the identification information of the wireless access node and the temporary connection password.
Optionally, the wireless access node further includes a detection module, where the detection module is configured to detect whether the device to be connected stops accessing the wireless access node or whether the device to be connected accesses the wireless access node for more than a predetermined time, and if so, disable the temporary connection password.
Optionally, the sending module is further configured to send device information to a second connected device, where the device information includes identification information of a device to be accessed, so that the second connected device requests a user to select the device to be connected as a fixed device or the temporary device, receives a selection result input by the user, and sends selection information including the selection result to the wireless access node; the receiving module is further configured to receive the selection information, add the identification information of the device to be connected to the fixed device list when the selection result is that the device to be connected is selected as the fixed device, and add the identification information of the device to be connected to the temporary device list when the selection result is that the device to be connected is selected as the temporary device.
In the wireless network access method and the wireless access node of the embodiment of the invention, the fixed user list, the temporary user list and the corresponding identification information are preset in the AP, and the identification information of the device to be connected is compared with the preset identification information, so that whether the device to be connected is the temporary device, the fixed device or the non-trusted device is distinguished. The invention can meet the user requirements that the temporary equipment is disconnected with the AP after exceeding the preset time or the disconnection and the fixed equipment is connected with the AP for a long time, reduces the complicated manual operation and brings great convenience to the user.
Drawings
Fig. 1 is a flowchart illustrating an access method of a wireless network according to a first embodiment of the present invention;
fig. 2 is a flowchart illustrating an access method of a wireless network according to a second embodiment of the present invention;
FIG. 3 is a schematic diagram of information interaction between devices in the method shown in FIG. 2;
fig. 4 is a flowchart illustrating an access method of a wireless network according to a third embodiment of the present invention;
FIG. 5 is a schematic diagram of information interaction between devices in the method shown in FIG. 4;
fig. 6 is a flowchart illustrating an access method of a wireless network according to a fourth embodiment of the present invention;
FIG. 7 is a schematic diagram of information interaction between devices in the method shown in FIG. 6;
fig. 8 is a schematic block diagram of a wireless access node of an embodiment of the present invention;
fig. 9 is a hardware configuration diagram of a wireless access node according to an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides an access method of a wireless network shown in fig. 1, so that a temporary device is disconnected from an AP after a preset time or disconnection is exceeded, and a fixed device can be connected with the AP for a long time and access to the wireless network such as Wi-Fi. In order to achieve the beneficial effect, the method comprises two stages, wherein the first stage is used for judging the type of the current equipment to be connected, namely judging whether the current equipment to be connected is temporary equipment or fixed equipment or non-trusted equipment, and the second stage is used for carrying out corresponding connection according to the judgment result.
The core of the method is a first phase, as shown in fig. 1, comprising:
s11: the wireless access node broadcasts beacon information.
The AP may send out beacon messages, i.e., beacon messages, in Wi-Fi wireless networks or the like at a preset frequency at a preset time interval (e.g., 100 milliseconds) to inform devices to be connected in the surrounding environment that there is an accessible wireless network.
S12: and the wireless access node receives a request message sent by the device to be connected according to the beacon message, wherein the request message comprises the identification information of the device to be connected.
The device to be connected sends a request message according to the beacon message, where the request message includes Identification information of the device to be connected, where the Identification information may be a BSSID (Basic Service Set Identifier) code, a security key PIN (Personal Identification Number) code used to generate an encrypted message, or other identity information that may identify the device to be connected, such as a Media Access Control (MAC) address of the device to be connected, a user-readable device name, and the like.
S13: the wireless access node searches the identification information of the equipment to be connected in the fixed user list and the temporary user list, if the identification information of the equipment to be connected is found in the fixed user list, the equipment to be connected is determined to be the fixed equipment, if the identification information of the equipment to be connected is found in the temporary user list, the equipment to be connected is determined to be the temporary equipment, and if the identification information of the equipment to be connected is not found in the fixed user list and the temporary user list, the equipment to be connected is determined to be the untrusted equipment.
The fixed user list records identification information of the connection equipment with a long-term effective trust state, and the temporary user list records identification information of the connection equipment with a trust state which is invalid after a preset time is exceeded or the connection is disconnected.
The following clearly and completely describes the technical solutions of the embodiments of the fixed device, the temporary device, and the untrusted device, respectively, in combination with the determination result of the type of the device to be connected.
Referring to fig. 2 and 3, for the case that the AP determines that the device to be connected is a fixed device, the first phase of the access method of the embodiment of the present invention includes the following steps S21 to S23, and the second phase includes the following steps S24 to S26:
s21: the wireless access node broadcasts a beacon message.
S22: and the wireless access node receives a request message sent by the device to be connected according to the beacon message, wherein the request message comprises the identification information of the device to be connected.
S23: and the wireless access node finds the identification information of the equipment to be connected in the fixed user list, and then determines that the equipment to be connected is fixed equipment.
S24: and the wireless access node sends access information to the connected equipment, wherein the access information comprises the identification information of the wireless access node and the fixed connection password.
The fixed connection password is a long-term effective password and is used for indicating that the device to be connected can establish connection with the AP for a long time and access the wireless network for a long time according to the password.
S25: and the connected equipment generates a two-dimensional code graph according to the identification information of the wireless access node and the fixed connection password in the access information and displays the two-dimensional code graph on a display of the connected equipment.
S26: and the equipment to be connected acquires the identification information and the fixed connection password of the wireless access node by scanning the two-dimensional code image, and accesses the wireless access node according to the identification information and the fixed connection password of the wireless access node.
In the process of accessing the AP, as shown in fig. 3, the device to be connected sends a request authorization including the identification information of the wireless access node and the fixed connection password to the AP, the AP establishes a connection with the device to be connected after passing the authentication, and the device to be connected accesses the wireless network.
Referring to fig. 4 and 5, for the case that the AP determines that the device to be connected is a temporary device, the first phase of the access method according to the embodiment of the present invention includes the following steps S41 to S43, and the second phase includes the following steps S44 to S46 or includes steps S44 to S47:
s41: the wireless access node broadcasts a beacon message.
S42: and the wireless access node receives a request message sent by the device to be connected according to the beacon message, wherein the request message comprises the identification information of the device to be connected.
S43: and the wireless access node finds the identification information of the equipment to be connected in the temporary user list, and then determines that the equipment to be connected is temporary equipment.
S44: and the wireless access node sends access information to the connected equipment, wherein the access information comprises the identification information of the wireless access node and the temporary connection password.
The temporary connection password is a short-term effective password and is used for indicating that the device to be connected can establish connection with the AP within preset time and access the wireless network within the preset time according to the password, or the device to be connected can not establish connection with the AP again after establishing connection and disconnecting with the AP for the first time according to the password and cannot access the wireless network.
S45: and the connected equipment generates a two-dimensional code graph according to the identification information of the wireless access node and the temporary connection password and displays the two-dimensional code graph on a display of the connected equipment.
S46: and the equipment to be connected acquires the identification information and the temporary connection password of the wireless access node by scanning the two-dimensional code image, and accesses the wireless access node according to the identification information and the temporary connection password of the wireless access node.
In the process of accessing the AP, as shown in fig. 5, the device to be connected sends a request authorization including the identification information of the wireless access node and the temporary connection password to the AP, the AP establishes connection with the device to be connected after authentication, and the device to be connected accesses the wireless network.
Based on the function of the temporary connection password set forth in the foregoing step S44, after accessing the wireless network, the method of the embodiment of the present invention may further include step S47: and when the wireless access node detects that the equipment to be connected stops accessing the wireless access node or accesses the wireless access node for more than preset time, the wireless access node disables the temporary connection password.
For an application scenario in which a device to be connected is an untrusted device, that is, after the AP determines that the device to be connected is the untrusted device, the device to be connected may be used as a fixed device or a temporary device according to a selection result of a user, where the selection result of the user may be generated by sending of a connected device in the embodiments described in fig. 1, fig. 2, and fig. 4, or may be generated by another device, and the another device does not have to establish a connection with the AP, that is, does not have to access a wireless network, as shown in fig. 6 and fig. 7, a second stage of the access method in the embodiment of the present invention includes the following steps:
s61: the wireless access node broadcasts a beacon message.
S62: and the wireless access node receives a request message sent by the device to be connected according to the beacon message, wherein the request message comprises the identification information of the device to be connected.
S63: and if the wireless access node cannot find the identification information of the equipment to be connected in the fixed user list and the temporary user list, determining that the equipment to be connected is the non-trusted equipment.
S64: and the wireless access node sends information to the connected equipment, wherein the information comprises identification information of the equipment to be accessed.
S65: the connected device identification information requests a user to select a device to be connected as a fixed device or a temporary device, receives a selection result input by the user, and sends selection information including the selection result to the wireless access node.
Specifically, the connected device may display a piece of information through a screen to ask the user to select the device to be currently accessed as the fixed device or the temporary device. Further, the user may be prompted to make a selection by means of a sound, flashing lights, etc.
S66: and the wireless access node receives the selection information, adds the identification information of the equipment to be connected into the fixed equipment list when the selection result is that the equipment to be connected is selected as the fixed equipment, and adds the identification information of the equipment to be connected into the temporary equipment list when the selection result is that the equipment to be connected is selected as the temporary equipment.
The same steps as in the embodiments of fig. 2 and 4 are then performed correspondingly. It should be noted that the connected device in the step performed after step S66 corresponds to the first connected device, and the connected device in the previous step corresponds to the second connected device. Preferably, the first connected device may be a smart tv and the second connected device may be a smartphone used by the owner of the wireless access node.
Of course, the embodiment of the present invention may also directly deny the access of the device to be connected after the wireless access node determines that the device to be connected is an untrusted device.
Fig. 8 is a schematic block diagram of a wireless access node according to an embodiment of the present invention. As shown in fig. 8, the wireless access node (AP)81 includes:
a transmitting module 811 for broadcasting the beacon message.
A receiving module 812, configured to receive a request message sent by the device to be connected 82 according to the beacon message, where the request message includes identification information of the device to be connected 82.
The determining module 813 is configured to search for identification information of the device 82 to be connected in a fixed user list and a temporary user list, where the fixed user list and the temporary user list may be stored in the storage module 814 of the fixed user list and the temporary user list, where the fixed user list records identification information of the connection device 82 whose trust status is valid for a long time, and the temporary user list records identification information of a connection device whose trust status is invalid after exceeding a preset time or being disconnected.
If the identification information of the device to be connected 82 is found in the fixed user list, the determining module 813 determines that the device to be connected 82 is a fixed device; if the identification information of the device to be connected 82 is found in the temporary user list, the determining module 813 determines that the device to be connected 82 is a temporary device; if the identification information of the device to be connected 82 cannot be found in both the fixed user list and the temporary user list, the determining module 813 determines that the device to be connected 82 is an untrusted device.
In the case where the determination block 813 determines that the device to be connected 82 is a fixed device,
the sending module 811 is further configured to send access information to the connected device 83, where the access information includes identification information of the wireless access node and a fixed connection password, so that the connected device 83 generates a two-dimensional code graph according to the identification information of the wireless access node 81 and the fixed connection password and displays the two-dimensional code graph on a display of the connected device, and further, the device to be connected 82 obtains the identification information and the fixed connection password of the wireless access node 81 by scanning the two-dimensional code image and accesses the wireless access node 81 according to the identification information of the wireless access node 81 and the fixed connection password.
In the case where the determination block 813 determines that the device to be connected 82 is a temporary device,
the sending module 811 is further configured to send access information to the connected device 83, where the access information includes the identification information of the wireless access node 81 and the temporary connection password, so that the connected device 83 generates a two-dimensional code graph according to the identification information of the wireless access node 81 and the temporary connection password and displays the two-dimensional code graph on a display of the connected device, and further, the device to be connected 82 obtains the identification information and the temporary connection password of the wireless access node 81 by scanning the two-dimensional code image and accesses the wireless access node 81 according to the identification information of the wireless access node 81 and the temporary connection password.
The temporary connection password is a short-term valid password, and is used to indicate that the device to be connected 82 can establish a connection with the AP within a predetermined time and access the wireless network within the predetermined time by using the password, or the device to be connected cannot establish a connection with the AP again after establishing and disconnecting the connection with the AP for the first time by using the password and cannot access the wireless network. Based on this, after accessing the wireless network, the detection module 815 of the wireless access node 81 is configured to detect whether the to-be-connected device 82 has stopped accessing the wireless access node 81 or whether it has accessed the wireless access node 81 for more than a predetermined time, and if so, disable the temporary connection password.
For the case that the determining module 813 determines that the device 82 to be connected is an untrusted device, the device 82 to be connected may be used as a fixed device or a temporary device according to a selection result of the user, where the selection result of the user may be generated by sending the connected device 83 or by generating the other device 84, and the other device 84 does not have to establish a connection with the AP, i.e., does not have to access the wireless network, if the other device 84 accesses the wireless network, the other device 84 is equivalent to a second connected device (described below with the connected device 84), and correspondingly, the connected device 83 is equivalent to a first connected device.
In this embodiment, the sending module 811 is further configured to send information to the connected device 84, where the information includes identification information of the device to be connected 82, so that the connected device 84 requests the user to select the device to be connected 82 as a fixed device or the temporary device, receives a selection result input by the user, and sends selection information including the selection result to the wireless access node 81.
The receiving module 812 of the wireless access node 81 is further configured to receive the selection information, add the identification information of the device to be connected 82 to the fixed device list when the selection result is that the device to be connected 82 is selected as the fixed device, and add the identification information of the device to be connected 82 to the temporary device list when the selection result is that the device to be connected 82 is selected as the temporary device.
The above-described structure of the modules of the radio access node 81 correspondingly performs the access method described in the above embodiments, and has the same technical effect.
It should be understood that the above-described embodiment of the wireless access node 81 is merely illustrative, and the division of the modules is only one logical functional division, and that in actual implementation, there may be other divisions, for example, two modules may be integrated into another system, or some features may be omitted, or not implemented. In addition, the modules may be connected to each other through some interfaces, and may be in an electrical or other form. The above modules, which are used as the components of the wireless access node 81, may or may not be physical blocks, may be located in one place, or may be distributed on multiple network units, and may be implemented in the form of software function blocks or hardware.
For example, as shown in fig. 9, an embodiment of the present invention provides a hardware configuration diagram of a wireless access node 81. May include at least one processor (e.g., CPU), at least one network interface or other communication interface, memory, and at least one communication bus for enabling communications among the devices. The processor is used to execute executable modules, such as computer programs, stored in the memory. The Memory may comprise a Random Access Memory (RAM) and may also include a non-volatile Memory, such as at least one disk Memory. The communication connection between the system gateway and at least one other network element is realized through at least one network interface (which can be wired or wireless), and the internet, a wide area network, a local network, a metropolitan area network and the like can be used.
The memory stores program instructions, and the program instructions may be executed by the processor, where the program instructions may include each unit indicated in the above embodiments of the present invention, and specific implementation manners of each unit may refer to corresponding contents in the above embodiments of the present invention, and are not described herein again.
The device described in this embodiment includes a device to be accessed and an accessed device (83, 84), and may be any terminal having a display function, such as a mobile phone, a PDA (Personal Digital Assistant or tablet computer), a portable communication device, or wearable devices such as a smart band, and wearable devices embedded in clothing accessories such as clothes and jewelry.
In addition, if the above functions of this embodiment are implemented in the form of software functional units and sold or used as a stand-alone product, the functions may be stored in a computer readable storage medium, that is, the embodiments of the present invention may be embodied in the form of a software product, which includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention.
On the basis of the above, the above mentioned embodiments are only examples of the present invention, and not intended to limit the scope of the present invention, and all equivalent structures or equivalent flow transformations made by using the contents of the present specification and the drawings, such as the combination of technical features between the embodiments, or the direct or indirect application to other related technical fields, are included in the scope of the present invention.

Claims (2)

1. An access method of a wireless network, the method being applied to a wireless access node, the method comprising:
the wireless access node broadcasts a beacon message;
the wireless access node receives a request message sent by a device to be connected according to the beacon message, wherein the request message contains identification information of the device to be connected;
the wireless access node searches the identification information of the equipment to be connected in a fixed user list and a temporary user list, if the identification information of the equipment to be connected is found in the fixed user list, determining that the device to be connected is a fixed device, if the identification information of the device to be connected is found in the temporary user list, determining that the device to be connected is a temporary device, if the identification information of the device to be connected cannot be found in the fixed user list and the temporary user list, determining that the device to be connected is a non-trusted device, wherein the fixed user list records identification information of connected devices with long-term effective trust status, the temporary user list records identification information of the connection equipment with the trust state being invalid after exceeding the preset time or being disconnected;
after the wireless access node determines that the equipment to be connected is fixed equipment, the wireless access node sends access information to first connected equipment, wherein the access information comprises identification information of the wireless access node and a fixed connection password, so that the first connected equipment generates a two-dimensional code graph according to the identification information of the wireless access node and the fixed connection password and displays the two-dimensional code graph on a display of the first connected equipment, the equipment to be connected is further enabled to obtain the identification information of the wireless access node and the fixed connection password by scanning the two-dimensional code graph, and the wireless access node is accessed according to the identification information of the wireless access node and the fixed connection password;
after the wireless access node determines that the device to be connected is a temporary device, the wireless access node sends access information to a first connected device, wherein the access information comprises identification information of the wireless access node and a temporary connection password, so that the first connected device generates a two-dimensional code graph according to the identification information of the wireless access node and the temporary connection password and displays the two-dimensional code graph on a display of the first connected device, the device to be connected obtains the identification information of the wireless access node and the temporary connection password by scanning the two-dimensional code graph, and the wireless access node is accessed according to the identification information of the wireless access node and the temporary connection password;
when the wireless access node detects that the equipment to be connected stops accessing the wireless access node or accesses the wireless access node for more than preset time, the wireless access node disables the temporary connection password;
after the wireless access node determines that the device to be connected is an untrusted device, the wireless access node sends information to a second connected device, wherein the information includes identification information of the device to be connected, so that the second connected device requests a user to select the device to be connected as the fixed device or the temporary device, receives a selection result input by the user, and sends selection information including the selection result to the wireless access node;
and the wireless access node receives the selection information, adds the identification information of the equipment to be connected into the fixed equipment list when the selection result is that the equipment to be connected is selected as the fixed equipment, and adds the identification information of the equipment to be connected into the temporary equipment list when the selection result is that the equipment to be connected is selected as the temporary equipment.
2. A wireless access node, comprising:
a sending module for broadcasting a beacon message;
a receiving module, configured to receive a request message sent by a device to be connected according to the beacon message, where the request message includes identification information of the device to be connected;
the device comprises a storage module and a processing module, wherein the storage module is used for storing a fixed user list and a temporary user list, identification information of connecting equipment with a long-term effective trust state is recorded in the fixed user list, and identification information of connecting equipment with a trust state of exceeding a preset time or failing after disconnection is recorded in the temporary user list;
a determining module, configured to search the identifier information of the device to be connected in the fixed user list and the temporary user list, determine that the device to be connected is a fixed device if the identifier information of the device to be connected is found in the fixed user list, determine that the device to be connected is a temporary device if the identifier information of the device to be connected is found in the temporary user list, and determine that the device to be connected is a non-trusted device if the identifier information of the device to be connected is not found in both the fixed user list and the temporary user list;
the sending module is further configured to send access information to a first connected device, where the access information includes identification information of the wireless access node and a fixed connection password, so that the first connected device generates a two-dimensional code graph according to the identification information of the wireless access node and the fixed connection password and displays the two-dimensional code graph on a display of the first connected device, and further causes the device to be connected to obtain the identification information of the wireless access node and the fixed connection password by scanning the two-dimensional code image, and access the wireless access node according to the identification information of the wireless access node and the fixed connection password;
the sending module is further configured to send access information to a first connected device, where the access information includes identification information of the wireless access node and a temporary connection password, so that the first connected device generates a two-dimensional code graph according to the identification information of the wireless access node and the temporary connection password and displays the two-dimensional code graph on a display of the first connected device, and further causes the device to be connected to obtain the identification information of the wireless access node and the temporary connection password by scanning the two-dimensional code image, and access the wireless access node according to the identification information of the wireless access node and the temporary connection password;
the detection module is used for detecting whether the equipment to be connected stops accessing the wireless access node or whether the equipment to be connected accesses the wireless access node for more than preset time after the judgment module determines that the equipment to be connected is temporary equipment, and if so, the temporary connection password is invalid;
the sending module is further configured to send information to a second connected device, where the information includes identification information of the device to be connected, so that the second connected device requests a user to select the device to be connected as the fixed device or the temporary device, receives a selection result input by the user, and sends selection information including the selection result to the wireless access node;
the receiving module is further configured to receive the selection information, add the identification information of the device to be connected to the fixed device list when the selection result is that the device to be connected is selected as the fixed device, and add the identification information of the device to be connected to the temporary device list when the selection result is that the device to be connected is selected as the temporary device.
CN201510613462.5A 2015-09-23 2015-09-23 Wireless network access method and wireless access node Active CN105357740B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510613462.5A CN105357740B (en) 2015-09-23 2015-09-23 Wireless network access method and wireless access node
PCT/CN2016/088365 WO2017049984A1 (en) 2015-09-23 2016-07-04 Wireless network access method and wireless access node

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510613462.5A CN105357740B (en) 2015-09-23 2015-09-23 Wireless network access method and wireless access node

Publications (2)

Publication Number Publication Date
CN105357740A CN105357740A (en) 2016-02-24
CN105357740B true CN105357740B (en) 2020-09-25

Family

ID=55333566

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510613462.5A Active CN105357740B (en) 2015-09-23 2015-09-23 Wireless network access method and wireless access node

Country Status (2)

Country Link
CN (1) CN105357740B (en)
WO (1) WO2017049984A1 (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105357740B (en) * 2015-09-23 2020-09-25 Tcl移动通信科技(宁波)有限公司 Wireless network access method and wireless access node
CN105916151A (en) * 2016-06-06 2016-08-31 惠州Tcl移动通信有限公司 Intelligent equipment wireless network access method and system thereof
CN107659936A (en) * 2016-07-25 2018-02-02 中兴通讯股份有限公司 A kind of cut-in method and device of control WiFi access devices
CN106535190A (en) * 2016-11-24 2017-03-22 北京小米移动软件有限公司 Network connection method and apparatus
CN106550383B (en) * 2016-11-25 2020-06-19 北京小米移动软件有限公司 Network connection method and intelligent device
CN108616885A (en) * 2016-12-06 2018-10-02 中兴通讯股份有限公司 a kind of authentication method and device
CN108207018A (en) * 2016-12-16 2018-06-26 中兴通讯股份有限公司 Wireless connection method and device
CN106454454A (en) * 2016-12-27 2017-02-22 深圳Tcl数字技术有限公司 Wireless network access method and system
CN106879006A (en) * 2017-01-19 2017-06-20 杰发科技(合肥)有限公司 Radio reception device and its wireless connection management method
US20210051469A1 (en) * 2018-02-19 2021-02-18 Freebit Co., Ltd. Computer software program for controlling data communication and terminal function of portable information terminal, and data communication control server
TWI695645B (en) * 2018-07-06 2020-06-01 小白投資有限公司 Wireless network identification method
CN111148095A (en) * 2020-01-03 2020-05-12 华为技术有限公司 Method for establishing Wi-Fi connection between terminal and wireless access point
CN112351424B (en) * 2020-07-28 2024-03-12 深圳Tcl新技术有限公司 Wireless networking management method, system, device and computer readable storage medium
CN113438712A (en) * 2021-06-07 2021-09-24 上海龙旗科技股份有限公司 Wireless connection method and device
CN114257458A (en) * 2022-01-08 2022-03-29 广州市成格信息技术有限公司 Multifunctional gateway of all-optical network
CN115174388B (en) * 2022-07-01 2024-03-26 杭州涂鸦信息技术有限公司 Network updating method, device, equipment and storage medium for networking intelligent equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604523A (en) * 2003-09-30 2005-04-06 华为技术有限公司 Network access method for wireless terminal
CN101127666A (en) * 2006-08-15 2008-02-20 索尼株式会社 Communication system, wireless-communication device, and control method therefor
CN102724668A (en) * 2012-06-15 2012-10-10 惠州Tcl移动通信有限公司 Method and system for sharing WIFI (wireless fidelity) network information on basis of two-dimensional code graphs
CN104581726A (en) * 2015-01-15 2015-04-29 天地融科技股份有限公司 Authentication method and system

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101404643B (en) * 2008-11-13 2011-09-14 中国移动通信集团福建有限公司 Wireless single-point login system based on IPSEC technology and its operation method
CN102187714A (en) * 2011-04-29 2011-09-14 华为终端有限公司 Method, equipment and communication system for mobile terminal accessing to a wireless network
JP5994390B2 (en) * 2012-05-24 2016-09-21 株式会社バッファロー Authentication method and wireless connection device
US9084122B2 (en) * 2012-07-31 2015-07-14 Qualcomm Incorporated Processing of access point crowdsourcing data
CN103702291B (en) * 2012-09-27 2017-06-09 中兴通讯股份有限公司 A kind of method and WiFi direct-connected devices that group is set up based on Wi Fi
CN103327644B (en) * 2013-05-24 2016-03-30 华为技术有限公司 A kind of method and apparatus of wireless connections
CN103415012A (en) * 2013-08-15 2013-11-27 惠州Tcl移动通信有限公司 Authentication method and authentication device of wireless router
CN103475996B (en) * 2013-08-19 2017-06-16 小米科技有限责任公司 Method for connecting network, network share method and device
WO2015157942A1 (en) * 2014-04-16 2015-10-22 华为终端有限公司 Device and method for accessing wireless network
CN105357740B (en) * 2015-09-23 2020-09-25 Tcl移动通信科技(宁波)有限公司 Wireless network access method and wireless access node

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604523A (en) * 2003-09-30 2005-04-06 华为技术有限公司 Network access method for wireless terminal
CN101127666A (en) * 2006-08-15 2008-02-20 索尼株式会社 Communication system, wireless-communication device, and control method therefor
CN102724668A (en) * 2012-06-15 2012-10-10 惠州Tcl移动通信有限公司 Method and system for sharing WIFI (wireless fidelity) network information on basis of two-dimensional code graphs
CN104581726A (en) * 2015-01-15 2015-04-29 天地融科技股份有限公司 Authentication method and system

Also Published As

Publication number Publication date
WO2017049984A1 (en) 2017-03-30
CN105357740A (en) 2016-02-24

Similar Documents

Publication Publication Date Title
CN105357740B (en) Wireless network access method and wireless access node
US11310239B2 (en) Network connection method, hotspot terminal and management terminal
US11089476B2 (en) Network access control method and apparatus
US11165593B2 (en) System and method for wireless network management
JP6386069B2 (en) Connection management method, apparatus, electronic equipment, program, and recording medium
US9705883B2 (en) Communications terminal and system and rights management method
KR20160114620A (en) Methods, devices and systems for dynamic network access administration
WO2018000834A1 (en) Wifi hotspot information modification method and device
JP2018527794A (en) Rogue access point profiling
US9967099B2 (en) Method and apparatus for providing information
US10542433B2 (en) Connection establishment method, device, and system
CN102204304A (en) Support of multiple pre-shared keys in access point
JP2016537894A (en) Security gateway for local / home networks
CN104093164A (en) Wireless network access control method and system thereof
KR101528851B1 (en) Apc(access point controller), control method thereof, and recording medium for recording program for executing the control method
US20160330239A1 (en) Hacking prevention system for mobile terminal and method therefor
CN106452999B (en) Intelligent household appliance and method and device for safely accessing intelligent household appliance
CN106658488B (en) Intelligent household appliance and method and device for safely accessing intelligent household appliance
US20190349334A1 (en) Wifiwall
JP6169642B2 (en) Screen sharing server, screen sharing method, and screen sharing program
US20160308870A1 (en) Network access method and apparatus
CN103259785A (en) Authentication method and system of virtual token
JP2018097821A (en) Control device and communication control method
CN108076009B (en) Resource sharing method, device and system
CN113038464A (en) Information transmission method and equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TA01 Transfer of patent application right

Effective date of registration: 20200907

Address after: 315000 10 / F, No. 5, Lane 999, Yangfan Road, hi tech Zone, Ningbo City, Zhejiang Province

Applicant after: TCL mobile communication technology (Ningbo) Co.,Ltd.

Address before: 516006 Guangdong province Huizhou City Zhongkai high tech Zone and seven West Road No. 86

Applicant before: HUIZHOU TCL MOBILE COMMUNICATION Co.,Ltd.

TA01 Transfer of patent application right